Anti-Malware Guidelines
Version 2.1
For Students, Faculty, Staff, Guests, Alumni
Sponsor | Office of Information Technology |
---|---|
Audience | Faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors. |
Effective Date | 02/11/2011 |
Implementation History | Review Frequency: Triennial Responsible Person: Senior Director of IT Security and Assurance |
Background Information | The purpose of these guidelines is to ensure appropriate measures are taken to protect University data and IT Resources from malware. |
Definitions
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and related materials and services.
Malware, short for malicious software, is an umbrella term used to refer to various forms of hostile or intrusive software (e.g., computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware). It can take the form of executable code, scripts, active content, and other software. Malware is defined by its malicious intent, acting against the requirements of the computer user.
Guidelines Statement
- Departments and individuals using University-owned and managed devices should contact IT Service Desk at 718-817-3999 or [email protected] to have the approved anti-malware software installed.
- Users should report suspicious activity or have questions may contact IT Service Desk at 718-817-3999 or [email protected].
- Only download content from trusted sites.
- Be aware of browser warnings when a website asks for additional access to your computer.
- Be aware of spyware or adware on your computer. These types of software often have adverse effects on a computer, including, but not limited to:
- pop-ups or unsolicited tabs in a web browser,
- loss of access to files due to unintended encryption or deletion,
- sluggish computer performance, or multiple unrequested browser windows.
Related Policies, Procedures, and Forms
Revision History
Version | Date | Description |
1.1 | 02/01/2011 | Initial document |
1.2 | 05/10/2018 | Updated guidelines |
1.3 | 01/16/2020 | Updated statement |
2.0 | 02/05/2021 | Changed the name of the document. Updated statement and review frequency |
2.1 | 01/25/2023 | Updated scope, definition, and statement |