Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) List the application of the procedure to university policy and the policy purposes/objectives. (2) This purpose of the Virus Protection Procedure and Guidelines is to ensure the effective and efficient prevention, containment or minimisation of damage to the organisation from computer viruses. (3) The Virus Protection Procedure and Guidelines supports the IT Appropriate Use Policy and the Information Security Policy. (4) HESF: 2.1 Facilities and Infrastructure, 3.3 Learning Resources and Support and 7.3 Information Management. (5) This Procedure applies to: (6) Virus: A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. (8) Antivirus software is provided to the University community to protect against the damage caused by virus attacks. (9) Antivirus software is available for Staff and Students of VU to download and run on their home PC/Laptop to protect their data and minimise the risk of spreading viruses to the University network. (10) Any person wishing to connect a PC or laptop to the University network does so on the understanding that the device must be equipped at all times with the latest antivirus software in accordance with the IT Appropriate Use Policy. (11) Anti-virus protection is the responsibility of the owner of the PC or laptop and this responsibility is then delegated to whoever is performing the desktop support function: (12) ITS will respond to any detected, likely or imminent attack to the University network as it sees appropriate in accordance with the Information Security Policy. (13) If an attack is likely or imminent, ITS may isolate the University network from the rest of the Internet if no other protection is available. (14) If the network has been infected, ITS may isolate the contaminated portion of the University network from the rest of the University. (15) A PC, laptop or another device that has been infected will be disconnected from the University network. (16) The infected device will need to be cleaned and cleared of any threat to the University network. (17) The device may be required to be presented for inspection by ITS before reconnection to the University network is permitted. (18) If an infection to a file occurs, the following steps apply: (19) In exceptional circumstances, where the file holds great importance, it can be sent to an antivirus company at the file owner's expense for possible (but not guaranteed) de-contamination and recovery. (20) Antivirus Software.Information Security - Virus Protection Procedure
Section 1 - Summary
Section 2 - HESF/ASQA/ESOS Alignment
Section 3 - Scope
Top of PageSection 4 - Definitions
Section 5 - Policy/Regulation
Top of PageSection 6 - Procedures
Part A - Summary of Roles and Responsibilities
Roles
Responsibility
ITS
ITS is responsible for providing informed advice and protection. This protection is limited to the means available from antivirus companies. ITS is responsible for updating virus protection on PCs that are directly under its control. For example, open-access computer laboratories.
VU Staff, Students, other Users
Individual members of the University community are responsible for using antivirus software to maintain a safe and predictable working environment.
Part B - Procedures
Antivirus Software
Virus Protection Procedures
Network:
Device:
File:
Section 7 - Supporting Documents and Information