Skip to main content
All CollectionsSecurity & Privacy
Wireless Security Policy
Wireless Security Policy

Establishes security guidelines for Wi-Fi networks, including authentication requirements, encryption standards, and access controls.

Tyler Bryden avatar
Written by Tyler Bryden
Updated over 3 weeks ago

1. Purpose

This policy establishes security guidelines for Wi-Fi networks within Speak AI Inc., ensuring the confidentiality, integrity, and availability of wireless communications by enforcing authentication requirements, encryption standards, and access controls.

2. Scope

This policy applies to all wireless network devices, access points, and users connecting to Speak AI Inc.'s Wi-Fi networks, including corporate, guest, and employee networks.

3. Security Requirements

3.1 Authentication & Access Control

  • Wireless access must be restricted to authorized users and devices only.

  • Multi-Factor Authentication (MFA) must be enforced for administrative access to wireless network devices.

  • Role-Based Access Control (RBAC) must be implemented to limit access based on user privileges.

3.2 Encryption Standards

  • All corporate Wi-Fi networks must use WPA3 encryption. If WPA3 is unavailable, WPA2-Enterprise must be used.

  • Guest networks must be separated from internal corporate networks and must use WPA3 or WPA2-Personal at a minimum.

  • Open or WEP-encrypted networks are strictly prohibited.

3.3 Network Segmentation

  • Corporate and guest networks must be logically separated to prevent unauthorized access to internal resources.

  • IoT and other non-secure devices must be isolated on a dedicated network segment.

3.4 Monitoring & Logging

  • Wireless network activity must be monitored for anomalies and unauthorized access attempts.

  • Logs of wireless authentication and access must be retained in accordance with the Records Retention Policy.

3.5 Device Configuration & Patch Management

  • Default credentials must be changed before deployment of any wireless access points.

  • Wireless network devices must be kept up to date with the latest security patches and firmware updates.

3.6 Guest Wi-Fi Access

  • Guest users must authenticate via a captive portal with time-limited access.

  • Guest network access must be monitored and restricted from connecting to internal systems.

4. Compliance & Enforcement

  • Regular security audits must be performed to ensure adherence to this policy.

  • Non-compliant devices must be reconfigured or removed from the network.

  • Violations of this policy may result in disciplinary action or network access restrictions.

5. References & Supporting Documents

6. Contact Information For any questions or concerns regarding wireless security, please contact [email protected].


This policy is subject to periodic review and updates to align with evolving security best practices and industry regulations.

Did this answer your question?