Preview

NT 2799 Bluetooth Baseline Requirements Policy

Good Essays
Open Document
Open Document
644 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT 2799 Bluetooth Baseline Requirements Policy
Bluetooth Baseline Requirements Policy
1. Overview Bluetooth enabled devices are exploding on the Internet at an astonishing rate. At the range of connectivity has increased substantially. Insecure Bluetooth connections can introduce a number of potential serious security issues. Hence, there is a need for a minimum standard for connecting Bluetooth enable devices.
2. Purpose
The purpose of this policy is to provide a minimum baseline standard for connecting Bluetooth enabled devices to the Corona District High School network or Corona District High School owned devices. The intent of the minimum standard is to ensure sufficient protection Personally Identifiable Information (PII) and confidential Corona District High School data.
3. Scope
This policy applies to any Bluetooth enabled device that is connected to Corona District High School network or owned devices.
4. Policy
4.1 Version
No Bluetooth Device shall be deployed on Corona District High School equipment that does not meet a minimum of Bluetooth v2.1 specifications without written authorization from the Infosec Team. Any Bluetooth equipment purchased prior to this policy must comply with all parts of this policy except the Bluetooth version specifications.
4.2 Pins and Pairing
When pairing your Bluetooth unit to your Bluetooth enabled equipment (i.e. phone, laptop, etc.), ensure that you are not in a public area where you PIN can be compromised.
If your Bluetooth enabled equipment asks for you to enter your pin after you have initially paired it, you must refuse the pairing request and report it to Infosec, through your Help Desk, immediately.
4.3 Device Security Settings
All Bluetooth devices shall employ ‘security mode 3’ which encrypts traffic in both directions, between your Bluetooth Device and its paired equipment.
Use a minimum PIN length of 8. A longer PIN provides more security.
Switch the Bluetooth device to use the hidden mode (non-discoverable)
Only activate Bluetooth only when it

You May Also Find These Documents Helpful

  • Powerful Essays

    Week 6 Assignment It/286

    • 1310 Words
    • 6 Pages

    |2) Julie’s notebook does not support Bluetooth®. Suggest a device she can purchase that will use a USB port and allow her to |…

    • 1310 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Next we would like to equip each truck with Bluetooth technology to seamlessly keep our customers connected with our drivers via phone. Our drivers are already using cellphones, however, with the current law, only Bluetooth devices are legal to use in our trucks. We are proposing purchasing Aliph Jawbone Era Bluetooth…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)…

    • 355 Words
    • 3 Pages
    Best Essays
  • Better Essays

    NETW471 Course Project

    • 2998 Words
    • 9 Pages

    When two devices are equipped with Bluetooth, usually one of them will to be set to be discoverable, which means it will show up in a list of Bluetooth devices in the area on your controlling device. Using that example, the wireless speaker would be discoverable, and it will be able to be controlled by a Bluetooth-equipped device. The speaker/ Bluetooth capable device, sends out a signal with a little bit of information to alert other nearby devices of its presence and capabilities. The phone then connects, and the two devices form a personal area network, also known as piconet (A piconet is a network that is created using a wireless Bluetooth connection. A piconet consists of two or more devices occupying the same physical channel (synchronized to a common clock and hopping sequence ). Now that this process happened…

    • 2998 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Cellular telephones or other electronics shall not be on during classroom/academic learning times. These items shall be subject to confiscation and shall not be returned to the student, but only to the legal parent or guardian upon coming to the school site and signing a return of property form. A second offense will be subject to After School Detention or Out of School Suspension. The school shall not be responsible for any damage, theft, or loss of any electronic device brought to the school property or at any school related function.…

    • 10347 Words
    • 52 Pages
    Powerful Essays
  • Satisfactory Essays

    It 241 Week 1 Cp

    • 928 Words
    • 4 Pages

    The speed of the Bluetooth technology depends on the version, being speeds of 1mb/s, in access of 3 mb’s/s. The distance can be as great as 100 meters.…

    • 928 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The use of wireless technology in business and everday life is prevelant in today’s society as a whole. I have a wireless phone use, use Bluetooth and wireless internet on my laptop, as well as being able to transmit ans share internet, in my home and…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tda 2.8 1.1

    • 1256 Words
    • 6 Pages

    • that users may only access the school’s networks through a properly enforced password protection policy,…

    • 1256 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    It is estimated that Bluetooth wireless speakers alone will generate roughly $430 billion in revenue worldwide in 2014 alone (Cassagnol & Joseph, 2014). Bluetooth Technology Bluetooth technology is also found in computers and computer accessories, like mice and headsets for video games Bluetooth technology is now also found in many places in the medical field, for example in bedside telemetry monitoring equipment that remote transmits a patient’s cardiac rhythm to the monitor room and nurse’s station simultaneously in real time, alerting medical personal immediately of…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Issued: April 2012 Last Updated: March 2012 Co-ordinators: Sarah Jacobs and Pat Andrews Governors: This policy is communicated to: • Governors via Curriculum Committee and Full Governing Body Meeting • Staff through the Virtual Staff Handbook in the MLE. • Parents/Carers with parental responsibility via school website • Students verbally by all staff inside and outside the classroom, classroom display and Student Planners.…

    • 1832 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Once all the information is ironed out I will position each specific user group based on their role for eligibility. I will ensure all wireless and mobile devices are company owned. Write a policy against transferring their personal number to their company owned mobile device. This will help in keeping the company wireless environment protected and secure. Policy will also cover the health of the devices. Maintaining it for a year contract. A policy for storing inappropriate photographs/ images is prohibited. I will also include policies against texting and driving unless you use a hands free device…..but express the usage and a risk in such an event or situation is needed.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This policy is mainly responsible for making sure that all the security detail such as password and user accounts are secure so you have to make sure that you are the only person that uses the account. IT systems Acceptable usage policy requires from users to log off the computer as inappropriate people could get the access to the data that they shouldn’t. The user also shouldn’t install the unauthorized software as this could lead to the issues such as making the equipment unusable by affecting it performance. The users also have to make sure that the equipment is secure during the use of it and after. The users within college are not allowed to connect they own device to the college network if they don’t get…

    • 1668 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    I hope that very soon, the board has a meeting and makes the use of cell phones legal in classrooms and…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This policy applies to all staff, volunteers, supply staff, parents and pupils, and is intended to encourage staff to raise concerns within the school, rather than outside.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When you are not in class, during breaks between classes or after hours, in the library, or in a study space, you will be able to use these devices and have full access to the network. It is only during class sessions that their use will be limited.…

    • 591 Words
    • 3 Pages
    Good Essays