PurposeThe policy defines standards for protecting Western Connecticut State University’s network from any threat related to computer viruses, worms, or other types of malware. These standards minimize the potential exposure to WestConn from damages that may result from an unprotected network. Damages may include the loss of sensitive/confidential data, intellectual property, damage to public image, damage to critical WestConn systems, etc.
- No general purpose computing device may be connected to the university network (wired or wireless) unless it is equipped with appropriate protection. Exceptions to this rule must be authorized by the CIO.
- If you use non-university equipment for university business, it must have the appropriate protection.
- Never open any files or macros attached to an email from an unknown, suspicious, or un-trusted source. Delete these attachments immediately; then empty your trash.
- Delete spam, chain, and other junk email without forwarding, per WestConn’s Computer Use Policy.
- Never download files from unknown or suspicious sources.
- Avoid direct disk sharing with read/write access unless there is absolutely a business requirement to do so.
- Always scan removable media (e.g. jump drives) from an unknown source for viruses before using it.
- Critical data should be stored on a university file server (e.g. H: or K: drive). Material stored here will be scanned for viruses and backed-up on a regular schedule.
- New viruses are discovered almost every day. Periodically check WestConn’s Information Security Portal (http://staging.www.wcsu.edu/iti/security/ ) for relevant information.
Last updated: 6/8/2010