I. STANDARD STATEMENT
A significant threat to UTSA data and computing resources is the propagation of malware (malicious software) through network connections.
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy.
This standard applies to all UTSA faculty, staff, and students.
Contact the following office The Office of Information Security at firstname.lastname@example.org
With the goal of data integrity, reliability and system performance, the Office of Information Technology (OIT) manages a virus protection program for all UTSA-owned computers, including home computers and portable computing devices. Because of the criticality of malware protection, OIT will establish and maintain a baseline of protection that must be met by computer users and systems administrators.
- All workstations, whether connected to the network or standalone, must use data protection software approved by OIT.
- The data protection software must not be disabled or bypassed.
- The data protection software must not be altered in such a manner that the effectiveness of the software is diminished.
- The software’s automatic feature must not be altered to reduce the frequency of updates.
- All UTSA servers attached to the network must utilize OIT-approved data protection software.
- Email gateways must utilize OIT approved email virus protection software in accordance with OIT rules for the setup and use of the software.
- Procedures for handling malware are established in the Standard for Incident Response.
Effective Date: December 1, 2013
Last Revised: June 9, 2020