Skip to Content
Seton Hall University

Computer Viruses and Malware Policy

Purpose

Scope

As outlined in Seton Hall University's Appropriate Use Policy, the University actively monitors the traffic on the campus network and devices connected to the campus network, including activity and traffic originating from off campus, in order to maintain the integrity, reliability and performance of University IT systems. This includes (but is not limited to) monitoring for computer viruses and other malware, attempts to access University systems without appropriate authorization, systems performance, and compliance with Seton Hall University policies. Seton Hall University reserves the right to intercept and/or quarantine any networking traffic or computing resources that may pose a threat to Seton Hall University infrastructure, systems or data. This includes but is not limited to files, messages, network traffic and devices.

Definitions

Policy

  • Any device that connects to the campus network must have a current antivirus installed and running at all times. The antivirus software must be configured to automatically clean and remove an infected file or to quarantine the infected file if automatic cleaning is not possible. The antivirus software must be configured to automatically update itself on a regular basis. Scans for viruses on the device must occur without user intervention on a regular basis. On systems where this is not possible, users are responsible for regularly initiating the scan and updating the software to protect against the latest threats.
     
  • All University-issued computers must use the antivirus software installed and configured by IT Services. Users are prohibited from disabling or tampering with the installed antivirus software unless authorized by University IT Services.
     
  • University IT Services manages most of the servers and network equipment for the South Orange campus, and is responsible for managing the antivirus systems on that equipment. It is a violation of the University's appropriate use policy to bypass, tamper with or disable the security and antivirus systems on equipment managed by University IT Services. Some servers and network equipment are managed by systems administrators outside of University IT Services, usually with a formal Service Level Agreement (SLA) with University IT Services. Whether or not there is a formal SLA in place with University IT Services, all servers and network equipment managed by systems administrators outside of University IT Services must have appropriate and up-to-date antivirus systems in place and is free of viruses and malware. In order to protect the integrity and reliability of the campus network, any servers or network equipment managed by a system administrator outside of University IT Services that does not have appropriate and up-to-date antivirus systems in place will be removed from the campus network until the system is remediated.
     
  • When a computer system is determined to be infected with a virus or other malicious software that system may be blocked and removed from the University network until a PC Technician or Systems Administrator has verified that the system is virus-free.
     
  • All e-mail inbound to the University is scanned for viruses, malware and spam. E-mail that poses a risk to the University community is blocked. No security software is 100% effective, however, so users must exercise appropriate caution when opening e-mails or attachments.
     
  • External Web sites that are known sources of computer viruses and malware are blocked. No security software is 100% effective, however, so users should exercise appropriate caution when accessing external Web sites.
     
  • When an enterprise-wide virus or malware attack is in progress, University IT Services will notify the University community via Broadcast e-mail, post a notice here and through social media channels. If deemed necessary, University IT Services, will initiate a scan of all University systems immediately using the newest virus definitions available. At times, it may be necessary that a manual intervention will be necessary and those affected will be required to visit PC Support Services in Corrigan Hall to have their machine cleaned.

Additional Information

All Seton Hall University students, faculty and employees must take responsibility to ensure the risks of their desktop system of infecting other systems or shared files on a server are minimized. Despite the best measures, however, systems can still be at risk due to the rapid proliferation of malicious code via e-mail, shared files and other methods. Therefore, in addition to maintaining up to date antivirus software.

  • Never open any files or macros attached to an e-mail from an unknown, suspicious or untrustworthy source or if you receive an attachment from someone you know unexpectedly. Delete these attachments immediately.
  • Delete Spam, chain, and other junk e-mail without forwarding it.
  • Never download files from unknown or suspicious sources.

Responsible Offices

Department of Information Technology

Approval

Approved

Effective Date

August 15th, 2013