UW-Madison - IT - Wireless Spectrum Conflict Resolution Procedure
The Wireless Spectrum Conflict Resolution Procedure supports the UW-Madison Wireless Spectrum Resources Coordination Policy Policy
Surrounding text in italics is not part of the official document.
Procedure Statement
The Wireless Spectrum Resources Coordination Policy establishes a framework for deployment and operation of wireless equipment in UW–Madison spaces. Supporting the Wireless Spectrum Resources Coordination Policy, the Wireless Equipment Implementation Standard further specifies requirements for deploying equipment to facilitate peaceful cohabitation of multiple operators within the wireless space. In recognition that some interference between operators is nevertheless inevitable, this Wireless Spectrum Conflict Resolution Procedure describes steps for addressing such conflicts.
Who Is Affected by This Procedure?
Procedure Detail
Responsibilities of Wireless Equipment Operators
Whenever possible, operators shall work directly with other operators to avoid and resolve interference.
If working directly with another operator is not feasible or does not produce a solution, the operator may seek assistance from their local IT staff or school, college, or division (S/C/D) IT leadership, who may facilitate engagement between operators or propose alternate solutions. In cases where it is not feasible to engage local IT staff or S/C/D IT leadership, an operator may alternatively contact the DoIT Help Desk for additional resources.
If local IT staff or S/C/D IT leadership cannot facilitate a resolution or the DoIT Help Desk is unable to identify local IT staff or S/C/D IT leadership to assist an equipment operator, the matter may be referred to DoIT Network Services. DoIT Network Services staff shall attempt to work with all parties to resolve the issue.
If, despite best efforts, Network Services is unable to facilitate resolution, the matter will be referred to the advisory group designated under Section I of the Wireless Spectrum Resources Coordination Policy. The advisory group shall propose a solution to the VP-IT (CIO). The VP-IT/CIO will, as appropriate, work with other senior leaders and consult with the university IT Committee (ITC) to resolve the issue.
Consideration Requirements
The advisory group shall consider the following in developing proposed solutions. However, in all cases, the advisory group shall have the latitude to propose the solution most appropriate for the specific circumstances.
-
Relative priority of use - Uses should generally be prioritized in the following order:
-
Safety and security: Uses that facilitate prevention of harm, including loss of life or limb, serious impairment of health, or loss of property (e.g., e911 Wi-Fi calling, opioid rescue boxes, security cameras, electronic door locks)
-
University mission: Uses that advance:
-
Research
-
Teaching and learning or the accessibility thereof (e.g., live captioning)
-
Outreach
-
-
Community support: Uses that provide information or services to the university community
-
Microwaves, wireless HDMI transmitters, and other equipment that does not communicate directly with a receiver (i.e., “non-cooperative emitters”) shall be given the lowest priority.
-
Relative time-sensitivity of the activities being supported by use of the wireless spectrum
-
Relative risks inherent to the operators’ inability to use the spectrum as desired
-
Available solutions - The full range of available solutions should be considered and their feasibility assessed, including potential consequences of each solution (e.g., expenses incurred for adjustments, reputational harm caused by research delays, loss of data due to disruptions).
-
Compliance - Operators who can demonstrate compliance with the Wireless Spectrum Resources Coordination Policy, including this procedure and the Wireless Equipment Implementation Standard, should be given priority over those who have not complied with these policy documents.
Whenever possible, recommended solutions shall allow all operators to continue using their equipment (e.g., by operating at different times of day or in alternative locations). Taking equipment offline without an operator’s consent is an extreme solution and shall be recommended only when no other reasonable option is available.
Roles and Responsibilities
Table 1 defines roles and responsibilities for effectively sharing wireless resources.
| Entity | Role | Responsibilities |
|---|---|---|
| Wireless Equipment Operator | Avoid or resolve wireless conflicts |
|
| Local IT Staff or S/C/D IT Leadership | Assist wireless equipment operators with avoiding or resolving conflicts |
|
| DoIT Help Desk | Assist wireless equipment operators with avoiding or resolving conflicts |
|
| DoIT Network Services | Act as a resource for effective shared use of the wireless spectrum on the UW–Madison campus |
|
| Advisory Group | Advise the VP-IT/CIO and other responsible leaders on coordinating use of wireless spectrum resources | Apply the Wireless Spectrum Resources Coordination Policy and its related documents (e.g., standards, procedures) to recommend a path for resolving any conflict not successfully resolved at lower levels |
| Vice Provost for Information Technology (VP-IT) & Chief Information Officer (CIO) | Manage wireless spectrum resources in alignment with UW–Madison strategic goals | Make final decisions for resolving wireless spectrum conflicts, in consultation with the advisory group, the university Information Technology Committee (ITC), and relevant senior leaders |
Contact
Please address questions or comments to itpolicy@cio.wisc.edu.
Related References
Wireless Spectrum Resources Coordination Policy
Wireless Equipment Implementation Standard
Wireless Equipment Directory (in development)
Regent Policy Document 25-3 Acceptable Use of Information Technology Resources
UW System Administrative Policy 1038, Information Security: Network Protection (SYS 1038)
System Administrative Policy 1038.A, Information Security: Network Protection Standard (SYS 1038.A)
UW System Administrative Policy 1039, Information Security: Risk Management (SYS 1039)
UW System Administrative Policy 1039.A, Risk Management Procedure (SYS 1039.A)
UW System Administrative Policy 1039.B, Notification of Risk Acceptance (SYS 1039.B)
UW System Administrative Policy 1042, Information Security: Threat & Vulnerability Management (SYS 1042)
UW System Administrative Policy 1042.A, Threat & Vulnerability Management Standard (SYS 1042.A)
