Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

Information Security - Virus Protection Procedure

Section 1 - Summary

(1) List the application of the procedure to university policy and the policy purposes/objectives.

(2) This purpose of the Virus Protection Procedure and Guidelines is to ensure the effective and efficient prevention, containment or minimisation of damage to the organisation from computer viruses.

(3) The Virus Protection Procedure and Guidelines supports the IT Appropriate Use Policy and the Information Security Policy.

Top of Page

Section 2 - HESF/ASQA/ESOS Alignment

(4) HESF: 2.1 Facilities and Infrastructure, 3.3 Learning Resources and Support and 7.3 Information Management.

Top of Page

Section 3 - Scope

(5) This Procedure applies to:

  1. Identify who the procedure applies to, specifying any exclusions.
  2. All VU staff, students, contractors, visitors and other authorised users connecting to the University network.
  3. Identify what the procedure applies to, specifying any exclusions.
  4. All networked or standalone devices, susceptible to contamination that is under ITS control. This includes but is not limited to Desktop PC's, Laptops, Mobile devices and any other device capable of storage data.
  5. Devices not under ITS control are covered to the extent of preventing them from causing damage to the rest of the University.
Top of Page

Section 4 - Definitions

(6) Virus: A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory.

Top of Page

Section 5 - Policy/Regulation

(7) Nil.

Top of Page

Section 6 - Procedures

Part A - Summary of Roles and Responsibilities

Roles Responsibility
ITS ITS is responsible for providing informed advice and protection. This protection is limited to the means available from antivirus companies. ITS is responsible for updating virus protection on PCs that are directly under its control. For example, open-access computer laboratories.
VU Staff, Students, other Users Individual members of the University community are responsible for using antivirus software to maintain a safe and predictable working environment.

Part B - Procedures

Antivirus Software

(8) Antivirus software is provided to the University community to protect against the damage caused by virus attacks.

(9) Antivirus software is available for Staff and Students of VU to download and run on their home PC/Laptop to protect their data and minimise the risk of spreading viruses to the University network.

(10) Any person wishing to connect a PC or laptop to the University network does so on the understanding that the device must be equipped at all times with the latest antivirus software in accordance with the IT Appropriate Use Policy.

(11) Anti-virus protection is the responsibility of the owner of the PC or laptop and this responsibility is then delegated to whoever is performing the desktop support function:

  1. Individual owners and/or users of home-based PC's and laptops are responsible for ensuring adequate anti-virus protection.
  2. ITS is responsible for ensuring anti-virus protection for PCs that are directly under its control. Example, Open Access Computer Laboratories.

Virus Protection Procedures

Network:

(12) ITS will respond to any detected, likely or imminent attack to the University network as it sees appropriate in accordance with the Information Security Policy.

(13) If an attack is likely or imminent, ITS may isolate the University network from the rest of the Internet if no other protection is available.

(14) If the network has been infected, ITS may isolate the contaminated portion of the University network from the rest of the University.

Device:

(15) A PC, laptop or another device that has been infected will be disconnected from the University network.

(16) The infected device will need to be cleaned and cleared of any threat to the University network.

(17) The device may be required to be presented for inspection by ITS before reconnection to the University network is permitted.

File:

(18) If an infection to a file occurs, the following steps apply:

  1. If a file can be cleaned, it is cleaned.
  2. If it can't be cleaned, and the file is recoverable from backup, it is deleted.
  3. If it can't be cleaned, and the file is not recoverable from backup, it is quarantined off the network.

(19) In exceptional circumstances, where the file holds great importance, it can be sent to an antivirus company at the file owner's expense for possible (but not guaranteed) de-contamination and recovery.

Top of Page

Section 7 - Supporting Documents and Information

(20) Antivirus Software.