Computer Viruses and Malware Policy
As outlined in Seton Hall University's Appropriate Use Policy, the University actively monitors the traffic on the campus network and devices connected to the campus network, including activity and traffic originating from off campus, in order to maintain the integrity, reliability and performance of University IT systems. This includes (but is not limited to) monitoring for computer viruses and other malware, attempts to access University systems without appropriate authorization, systems performance, and compliance with Seton Hall University policies. Seton Hall University reserves the right to intercept and/or quarantine any networking traffic or computing resources that may pose a threat to Seton Hall University infrastructure, systems or data. This includes but is not limited to files, messages, network traffic and devices.
- Any device that connects to the campus network must have a current antivirus installed
and running at all times. The antivirus software must be configured to automatically
clean and remove an infected file or to quarantine the infected file if automatic
cleaning is not possible. The antivirus software must be configured to automatically
update itself on a regular basis. Scans for viruses on the device must occur without
user intervention on a regular basis. On systems where this is not possible, users
are responsible for regularly initiating the scan and updating the software to protect
against the latest threats.
- All University-issued computers must use the antivirus software installed and configured
by IT Services. Users are prohibited from disabling or tampering with the installed
antivirus software unless authorized by University IT Services.
- University IT Services manages most of the servers and network equipment for the South
Orange campus, and is responsible for managing the antivirus systems on that equipment.
It is a violation of the University's appropriate use policy to bypass, tamper with
or disable the security and antivirus systems on equipment managed by University IT
Services. Some servers and network equipment are managed by systems administrators
outside of University IT Services, usually with a formal Service Level Agreement (SLA)
with University IT Services. Whether or not there is a formal SLA in place with University
IT Services, all servers and network equipment managed by systems administrators outside
of University IT Services must have appropriate and up-to-date antivirus systems in
place and is free of viruses and malware. In order to protect the integrity and reliability
of the campus network, any servers or network equipment managed by a system administrator
outside of University IT Services that does not have appropriate and up-to-date antivirus
systems in place will be removed from the campus network until the system is remediated.
- When a computer system is determined to be infected with a virus or other malicious
software that system may be blocked and removed from the University network until
a PC Technician or Systems Administrator has verified that the system is virus-free.
- All e-mail inbound to the University is scanned for viruses, malware and spam. E-mail
that poses a risk to the University community is blocked. No security software is
100% effective, however, so users must exercise appropriate caution when opening e-mails
- External Web sites that are known sources of computer viruses and malware are blocked.
No security software is 100% effective, however, so users should exercise appropriate
caution when accessing external Web sites.
- When an enterprise-wide virus or malware attack is in progress, University IT Services will notify the University community via Broadcast e-mail, post a notice here and through social media channels. If deemed necessary, University IT Services, will initiate a scan of all University systems immediately using the newest virus definitions available. At times, it may be necessary that a manual intervention will be necessary and those affected will be required to visit PC Support Services in Corrigan Hall to have their machine cleaned.
All Seton Hall University students, faculty and employees must take responsibility to ensure the risks of their desktop system of infecting other systems or shared files on a server are minimized. Despite the best measures, however, systems can still be at risk due to the rapid proliferation of malicious code via e-mail, shared files and other methods. Therefore, in addition to maintaining up to date antivirus software.
- Never open any files or macros attached to an e-mail from an unknown, suspicious or untrustworthy source or if you receive an attachment from someone you know unexpectedly. Delete these attachments immediately.
- Delete Spam, chain, and other junk e-mail without forwarding it.
- Never download files from unknown or suspicious sources.
- Department of Information Technology
August 15th, 2013