1. Purpose
This policy establishes security guidelines for Wi-Fi networks within Speak AI Inc., ensuring the confidentiality, integrity, and availability of wireless communications by enforcing authentication requirements, encryption standards, and access controls.
2. Scope
This policy applies to all wireless network devices, access points, and users connecting to Speak AI Inc.'s Wi-Fi networks, including corporate, guest, and employee networks.
3. Security Requirements
3.1 Authentication & Access Control
Wireless access must be restricted to authorized users and devices only.
Multi-Factor Authentication (MFA) must be enforced for administrative access to wireless network devices.
Role-Based Access Control (RBAC) must be implemented to limit access based on user privileges.
3.2 Encryption Standards
All corporate Wi-Fi networks must use WPA3 encryption. If WPA3 is unavailable, WPA2-Enterprise must be used.
Guest networks must be separated from internal corporate networks and must use WPA3 or WPA2-Personal at a minimum.
Open or WEP-encrypted networks are strictly prohibited.
3.3 Network Segmentation
Corporate and guest networks must be logically separated to prevent unauthorized access to internal resources.
IoT and other non-secure devices must be isolated on a dedicated network segment.
3.4 Monitoring & Logging
Wireless network activity must be monitored for anomalies and unauthorized access attempts.
Logs of wireless authentication and access must be retained in accordance with the Records Retention Policy.
3.5 Device Configuration & Patch Management
Default credentials must be changed before deployment of any wireless access points.
Wireless network devices must be kept up to date with the latest security patches and firmware updates.
3.6 Guest Wi-Fi Access
Guest users must authenticate via a captive portal with time-limited access.
Guest network access must be monitored and restricted from connecting to internal systems.
4. Compliance & Enforcement
Regular security audits must be performed to ensure adherence to this policy.
Non-compliant devices must be reconfigured or removed from the network.
Violations of this policy may result in disciplinary action or network access restrictions.
5. References & Supporting Documents
Speak AI Network Security Policy: https://help.speakai.co/en/articles/9363486-network-security-policy
Speak AI Access Management Policy: https://help.speakai.co/en/articles/9363448-access-management-policy
Speak AI Encryption Policy: https://help.speakai.co/en/articles/9367850-encryption-policy
6. Contact Information For any questions or concerns regarding wireless security, please contact [email protected].
This policy is subject to periodic review and updates to align with evolving security best practices and industry regulations.