I. STANDARD STATEMENT
A significant threat to UTSA data and computing resources is the propagation of malware
(malicious software) through network connections.
II. RATIONALE
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy
III. SCOPE
This standard applies to all UTSA faculty, staff, and students.
IV. CONTACTS
The Office of Information Security
informationsecurity@utsa.edu
V. PROCEDURES
With the goal of data integrity, reliability and system performance, the University
Technology Solutions (UTS) manages a virus protection program for all UTSA-owned computers, including home computers and portable computing devices.
Because of the critical nature of malware protection, UTS will establish and maintain
a baseline of protection that must be met by computer users and systems
administrators.
- All workstations, whether connected to the network or standalone, must use
data protection software approved by UTS. - The data protection software must not be disabled or bypassed.
- The data protection software must not be altered in such a manner that the
effectiveness of the software is diminished. - The software’s automatic feature must not be altered to reduce the frequency
of updates. - All UTSA servers attached to the network must utilize UTS-approved data
protection software. - Email gateways must utilize UTS approved email virus protection software in
accordance with UTS rules for the setup and use of the software. - Procedures for handling malware are established in the Standard for Incident
Response.
OIS 31 – Standard for Protection against Malware
Effective Date: December 1, 2013
Last Revised: August 4, 2020