The software and hardware that make up the computer networks are essential resources for (organization). They aid staff in carrying out their everyday duties and without these important communication systems would not exist. Computer viruses pose considerable risks to these systems. They can cause them to run erratically, cause loss of information, and information to become corrupted, with the consequential loss of productivity for the (organization).
This policy is designed to give guidance and direction on minimizing the risk of a virus infection, and what to do if they are encountered.
This policy applies to:
Always run (organization) anti-virus standard, supported anti-virus software is available from (e.g. the corporate download site). Download and run the current version; download and install anti-virus software updates as they become available.
NEVER open any files or macros attached to an email from an unknown, suspicious or untrustworthy source. Delete these attachments immediately, then “double delete” them by emptying your Trash.
Delete spam, chain, and other junk email without forwarding.
Never download files from unknown or suspicious sources.
Avoid direct disk sharing with read/write access unless there is absolutely a business requirement to do so.
Always scan a portable storage media from an unknown source for viruses before using it.
Back-up critical data and system configurations on a regular basis and store the data in a safe place.
Users must not undertake any activities with the intention to create and/or distribute malicious programs (e.g. viruses, worms, Trojans, e-mail bombs, etc) into (organization) network(s) or system(s).
Users MUST inform the IT Service Desk immediately if a virus is detected on their system.
IT system(s) infected with a malware/virus that the anti-virus software has not been able to deal with MUST be disconnected/quarantined from (organization) network until virus free.
If a user suspects the system may be infected, the following actions must be taken
Inform the IT service desk immediately.
Switch off the machine.
Ensure no-one uses the machine.
Be prepared to inform IT of any actions taken which may have caused the infection.