{"id":75,"date":"2017-06-27T17:52:03","date_gmt":"2017-06-27T17:52:03","guid":{"rendered":"http:\/\/wcsu.wpengine.com\/technology\/security\/antivirus-policy\/"},"modified":"2026-03-14T03:31:34","modified_gmt":"2026-03-14T03:31:34","slug":"antivirus-policy","status":"publish","type":"page","link":"https:\/\/www.wcsu.edu\/iti\/policies\/antivirus-policy\/","title":{"rendered":"Antivirus Policy"},"content":{"rendered":"<div id=\"content\">PurposeThe policy defines standards for protecting Western Connecticut State University\u2019s network from any threat related to computer viruses, worms, or other types of malware. These standards minimize the potential exposure to WestConn from damages that may result from an unprotected network. Damages may include the loss of sensitive\/confidential data, intellectual property, damage to public image, damage to critical WestConn systems, etc.<\/p>\n<ol>\n<li>No general purpose computing device may be connected to the university network (wired or wireless) unless it is equipped with appropriate protection. Exceptions to this rule must be authorized by the CIO.<\/li>\n<li>If you use non-university equipment for university business, it must have the appropriate protection.<\/li>\n<li>Never open any files or macros attached to an email from an unknown, suspicious, or un-trusted source. Delete these attachments immediately; then empty your trash.<\/li>\n<li>Delete spam, chain, and other junk email without forwarding, per WestConn\u2019s Computer Use Policy.<\/li>\n<li>Never download files from unknown or suspicious sources.<\/li>\n<li>Avoid direct disk sharing with read\/write access unless there is absolutely a business requirement to do so.<\/li>\n<li>\u00a0Always scan removable media (e.g. jump drives) from an unknown source for viruses before using it.<\/li>\n<li>Critical data should be stored on a university file server (e.g. H: or K: drive). \u00a0Material stored here will be scanned for viruses and backed-up on a regular schedule.<\/li>\n<li>New viruses are discovered almost every day. Periodically check WestConn\u2019s Information Security Portal (<a href=\"\/iti\/security\/\">https:\/\/www.wcsu.edu\/iti\/security\/<\/a> ) for relevant information.<\/li>\n<\/ol>\n<p>Last updated: 6\/8\/2010<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>PurposeThe policy defines standards for protecting Western Connecticut State University\u2019s network from any threat related to computer viruses, worms, or other types of malware. These standards minimize the potential exposure to WestConn from damages that may result from an unprotected &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":126,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"left-navigation.php","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-75","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/pages\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":0,"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/pages\/75\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/pages\/126"}],"wp:attachment":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/media?parent=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}