A significant threat to UTSA data and computing resources is the propagation of malware (malicious software) through network connections.


This standard supports HOP Policy 8-12 Information Resources Use and Security Policy.


This standard applies to all UTSA faculty, staff, and students.


Contact the following office The Office of Information Security at informationsecurity@utsa.edu


With the goal of data integrity, reliability and system performance, the Office of Information Technology (OIT) manages a virus protection program for all UTSA-owned computers, including home computers and portable computing devices. Because of the criticality of malware protection, OIT will establish and maintain a baseline of protection that must be met by computer users and systems administrators.

  1. All workstations, whether connected to the network or standalone, must use data protection software approved by OIT.
  2. The data protection software must not be disabled or bypassed.
  3. The data protection software must not be altered in such a manner that the effectiveness of the software is diminished.
  4. The software’s automatic feature must not be altered to reduce the frequency of updates.
  5. All UTSA servers attached to the network must utilize OIT-approved data protection software.
  6. Email gateways must utilize OIT approved email virus protection software in accordance with OIT rules for the setup and use of the software.
  7. Procedures for handling malware are established in the Standard for Incident Response.

 Effective Date: December 1, 2013

Last Revised: June 9, 2020