Antivirus Protection Policy
The purpose of this policy is to ensure antivirus software is installed to detect, prevent, and remove malicious software from the University’s IT Resources.
This IT Policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
- All University IT Resources must maintain up-to-date antivirus software.
- The University provides antivirus software. To obtain a copy:
- Individuals who use personal IT Resources and choose to use other antivirus solutions should refer to the documentation provided with the software.
- They are responsible for maintaining and updating the software they have installed.
- All users are required to configure the antivirus software, so the software automatically updates virus definitions at least daily.
- Uninstalling or disabling the antivirus product, for any reason, is prohibited.
- This policy applies to all IT Resources connected to the University network, including but not limited to, computers situated behind firewalls, Network Address Translation (NAT) devices, or use of a Virtual Private Network (VPN).
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
|Responsible Person||Director, IT Security|
|Approval Date||January 8, 2018|
|1.0.1||01/15/2016||Supersedes version from February 1, 2011. Minor changes for posting on new policy pages on website.|
|2.0||01/08/2018||Template change, updated disclaimer statement, updated scope, added IT Resources definition, edits to language using IT Resources, edits to policy statement removing references to specific software.|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.