Viruses, Malicious Software, And Change Control: Difference between revisions

From Bloomex Wiki
Jump to navigation Jump to search
(Created page with " ==== Virus Checking Required ==== * '''Implementation:''' All personal computers with operating systems susceptible to viruses, firewalls with external network connections, and electronic mail servers must have virus-checking systems provided by DIT and approved by the Enterprise IT Security Department. * '''File Scanning:''' All files from external sources must be scanned for viruses before use. If files have been encrypted or compressed, these processes must be rever...")
 
No edit summary
 
Line 2: Line 2:
==== Virus Checking Required ====
==== Virus Checking Required ====


* '''Implementation:''' All personal computers with operating systems susceptible to viruses, firewalls with external network connections, and electronic mail servers must have virus-checking systems provided by DIT and approved by the Enterprise IT Security Department.
* '''Implementation:''' All personal computers with operating systems susceptible to viruses, firewalls with external network connections, and electronic mail servers must have virus-checking systems provided by IT and approved by the IT Department.
* '''File Scanning:''' All files from external sources must be scanned for viruses before use. If files have been encrypted or compressed, these processes must be reversed before virus scanning.
* '''File Scanning:''' All files from external sources must be scanned for viruses before use. If files have been encrypted or compressed, these processes must be reversed before virus scanning.
* '''System Integrity:''' Virus-checking systems must not be turned off or disabled by users.
* '''System Integrity:''' Virus-checking systems must not be turned off or disabled by users.
Line 13: Line 13:
==== Change Control ====
==== Change Control ====


* '''Software Installation:''' Users are not permitted to install new or upgrade operating systems or application software on Bloomex business computing devices. These devices are designated for regular business use, allowing DIT to manage software distribution, license management, backup, and related functions centrally.
* '''Software Installation:''' Users are not permitted to install new or upgrade operating systems or application software on Bloomex business computing devices. These devices are designated for regular business use, allowing IT to manage software distribution, license management, backup, and related functions centrally.
* '''User Customization:''' Users may adjust personal preferences within software packages, such as changing fonts or organizing email folders.
* '''User Customization:''' Users may adjust personal preferences within software packages, such as changing fonts or organizing email folders.


Line 21: Line 21:
* '''Research Guidelines:''' Such research must:
* '''Research Guidelines:''' Such research must:
*# Be registered and approved in writing by Bloomex’s designated research authority.
*# Be registered and approved in writing by Bloomex’s designated research authority.
*# Inform the IT Enterprise Security Department in writing.
*# Inform the IT Department in writing.
*# Be conducted in a controlled environment separate from the Bloomex business network.
*# Be conducted in a controlled environment separate from the Bloomex business network.


This policy ensures that Bloomex’s information systems are protected from viruses and malicious software while maintaining strict control over software changes and research activities.
This policy ensures that Bloomex’s information systems are protected from viruses and malicious software while maintaining strict control over software changes and research activities.

Latest revision as of 19:11, 2 September 2024

Virus Checking Required

  • Implementation: All personal computers with operating systems susceptible to viruses, firewalls with external network connections, and electronic mail servers must have virus-checking systems provided by IT and approved by the IT Department.
  • File Scanning: All files from external sources must be scanned for viruses before use. If files have been encrypted or compressed, these processes must be reversed before virus scanning.
  • System Integrity: Virus-checking systems must not be turned off or disabled by users.

In Case of Virus/Malware Infection

  • Immediate Action: If an infection alert is received, users must immediately disconnect from all networks and cease using the affected computer. They must contact the Help Desk for technical assistance and avoid attempting to remove viruses or malware on their own.
  • Malicious Software: If users suspect they might have been exposed to other forms of malicious software, they must promptly contact the Help Desk to limit potential damage. Possession or development of viruses or other malicious software is prohibited.

Change Control

  • Software Installation: Users are not permitted to install new or upgrade operating systems or application software on Bloomex business computing devices. These devices are designated for regular business use, allowing IT to manage software distribution, license management, backup, and related functions centrally.
  • User Customization: Users may adjust personal preferences within software packages, such as changing fonts or organizing email folders.

Academic Research

  • Research Restrictions: Research involving the development of viruses or other malicious software must not be conducted on computing machines connected to the Bloomex business network. Similarly, research requiring modifications to operating systems or application software must not occur on Bloomex network-connected machines.
  • Research Guidelines: Such research must:
    1. Be registered and approved in writing by Bloomex’s designated research authority.
    2. Inform the IT Department in writing.
    3. Be conducted in a controlled environment separate from the Bloomex business network.

This policy ensures that Bloomex’s information systems are protected from viruses and malicious software while maintaining strict control over software changes and research activities.