Personal Firewall Guidelines
|Audience||Faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors.|
Review Frequency: Triennial
Responsible Person: Director, IT Risk and Data Integrity
Approved By: CISO
|Background Information||The purpose of this guideline is to ensure that appropriate measures are taken to protect IT Resources from malicious and unauthorized activity.|
Firewalls are used to prevent unauthorized access to IT Resources.
IT Resources include computing, networking, communications, application, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
- Firewall software should be installed on all IT Resources that connect to the University’s networks.
- For information on the University’s standard firewall software, call IT Customer Care at 718-817-3999 or email HelpIT@fordham.edu to obtain a copy or update software.
- If applicable, enable your operating system’s (i.e., Windows®1, Mac OS®2) built-in firewall.
- Fordham no longer provides firewall software for personal devices. Users should install a firewall solution and refer to the documentation provided with their software.
Related Policies, Procedures, and Forms
|1.1.2||11/13/2019||Update to links|
|1.1.3||02/05/2021||Updated review frequency and statement|