I. STANDARD STATEMENT
A significant threat to UTSA data and computing resources is the propagation of malware
(malicious software) through network connections.
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy
This standard applies to all UTSA faculty, staff, and students.
The Office of Information Security
With the goal of data integrity, reliability and system performance, the University
Technology Solutions (UTS) manages a virus protection program for all UTSA-owned computers, including home computers and portable computing devices.
Because of the critical nature of malware protection, UTS will establish and maintain
a baseline of protection that must be met by computer users and systems
- All workstations, whether connected to the network or standalone, must use
data protection software approved by UTS.
- The data protection software must not be disabled or bypassed.
- The data protection software must not be altered in such a manner that the
effectiveness of the software is diminished.
- The software’s automatic feature must not be altered to reduce the frequency
- All UTSA servers attached to the network must utilize UTS-approved data
- Email gateways must utilize UTS approved email virus protection software in
accordance with UTS rules for the setup and use of the software.
- Procedures for handling malware are established in the Standard for Incident
OIS 31 – Standard for Protection against Malware
Effective Date: December 1, 2013
Last Revised: August 4, 2020