(1) List the application of the procedure to university policy and the policy purposes/objectives. (2) This purpose of the Virus Protection Procedure and Guidelines is to ensure the effective and efficient prevention, containment or minimisation of damage to the organisation from computer viruses. (3) The Virus Protection Procedure and Guidelines supports the IT Appropriate Use Policy and the Information Security Policy. (4) HESF: 2.1 Facilities and Infrastructure, 3.3 Learning Resources and Support and 7.3 Information Management. (5) This Procedure applies to: (6) Virus: A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. (7) Nil. (8) Antivirus software is provided to the University community to protect against the damage caused by virus attacks. (9) Antivirus software is available for Staff and Students of VU to download and run on their home PC/Laptop to protect their data and minimise the risk of spreading viruses to the University network. (10) Any person wishing to connect a PC or laptop to the University network does so on the understanding that the device must be equipped at all times with the latest antivirus software in accordance with the IT Appropriate Use Policy. (11) Anti-virus protection is the responsibility of the owner of the PC or laptop and this responsibility is then delegated to whoever is performing the desktop support function: (12) ITS will respond to any detected, likely or imminent attack to the University network as it sees appropriate in accordance with the Information Security Policy. (13) If an attack is likely or imminent, ITS may isolate the University network from the rest of the Internet if no other protection is available. (14) If the network has been infected, ITS may isolate the contaminated portion of the University network from the rest of the University. (15) A PC, laptop or another device that has been infected will be disconnected from the University network. (16) The infected device will need to be cleaned and cleared of any threat to the University network. (17) The device may be required to be presented for inspection by ITS before reconnection to the University network is permitted. (18) If an infection to a file occurs, the following steps apply: (19) In exceptional circumstances, where the file holds great importance, it can be sent to an antivirus company at the file owner's expense for possible (but not guaranteed) de-contamination and recovery. (20) Antivirus Software.Information Security - Virus Protection Procedure
Section 1 - Summary
Section 2 - HESF/ASQA/ESOS Alignment
Section 3 - Scope
Top of PageSection 4 - Definitions
Section 5 - Policy/Regulation
Section 6 - Procedures
Part A - Summary of Roles and Responsibilities
Roles
Responsibility
ITS
ITS is responsible for providing informed advice and protection. This protection is limited to the means available from antivirus companies. ITS is responsible for updating virus protection on PCs that are directly under its control. For example, open-access computer laboratories.
VU Staff, Students, other Users
Individual members of the University community are responsible for using antivirus software to maintain a safe and predictable working environment.
Part B - Procedures
Antivirus Software
Virus Protection Procedures
Network:
Device:
File:
Section 7 - Supporting Documents and Information
View Document
This is the current version of this document. To view historic versions, click on the 'Historic Versions' tab above.