Skip to main content

Anti-Spyware Guidelines

Sponsor Fordham IT
Audience Faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors.
Effective Date 02/11/2011
Review Date 05/10/2018
Implementation History Review Frequency: Annual

Responsible Person: Director, IT Risk and Data Integrity
Background Information The purpose of these guidelines is to ensure appropriate measures are taken to protect University Information and IT Resources from malware.


Information refers to a body of knowledge or data obtained, produced, organized, shared, or managed throughout its business operations. Information may be shared or stored physically or electronically. Information is not easily replaced without funding, skill, knowledge, resources, time, or any combination of these factors. Therefore, Information is considered a critical resource used to build knowledge and sustain and create organizational value.

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software (e.g., computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware). It can take the form of executable code, scripts, active content, and other software. Malware is defined by its malicious intent, acting against the requirements of the computer user.

Guidelines Statement

  • Departments and individuals should contact IT Customer Care at 718-817-3999 or to have the approved anti-spyware software installed.
  • Users should report suspicious activity to IT Customer Care at 718-817-3999 or
  • Per Acceptable Use of IT Infrastructure and Resources policy, knowingly or negligently running, installing, uploading, posting, emailing, or otherwise transmitting any computer code, file, or program, including, but not limited to, computer viruses, Trojan horses, worms, or any other malware, which damages, exposes to unauthorized access, disrupt, or places excessive load on any computer system, network, or other IT Resource.
  • Do not allow downloads from unknown or untrusted sites.
  • Be aware of browser warnings when a website asks for additional access to your computer.
  • Be aware of spyware or adware on your computer. These types of software often have adverse effects on a computer, including, but not limited to:
    • pop-ups or unsolicited tabs in a web browser,
    • sluggish computer performance, or multiple unrequested browser windows.

Related Policies, Procedures, and Forms

Revision History

Version Date Description
1.1 02/01/2011 Initial document
1.2 05/10/2018 Updated guidelines
1.3 01/16/2020 Updated statement