Beruflich Dokumente
Kultur Dokumente
Scope
This policy applies to all employees, officers, and contractors of HIC, Inc. and its affiliates (the
Company).
Background
A virus is a piece of selfreplicating code, most often a malicious software program designed to
destroy or corrupt information, steal user data or adversely impact the usage of technology
systems. Potential sources of viruses include shared media such as flash drives / USB memory
sticks, electronic mail (including, but not limited to, files attached to messages), malicious code
embedded in websites and software or documents copied over networks such as the internal
network or the internet.
An infection by malicious software is almost always costly to the Company whether through the
loss of data, staff time to recover a system or the delay of important work. In addition, viruses
spread from the Company could potentially lead to serious issues of damage to reputation and
possible litigation.
Purpose
The Information Systems Policy ("Policy") describes the measures taken by Company to counter
malicious software and your responsibilities of individuals, departments and IT Services in
protecting the Company against viruses and malware.
Policy
Company Responsibilities
1. For all Company owned computer assets, Windows or Macintosh based, servers, laptop,
desktop, or virtual desktop, the Company shall provide an antivirus software program (AV
Software).
Your Responsibilities
4. Under no circumstances, shall you attempt to disable or interfere with the AV Software and
its scheduled tasks.
5. You are responsible for taking suitable measures to protect against virus
infection. Recommended steps processes to prevent virus problems include:
a. NEVER open any files or macros attached to an email from an unknown, suspicious
or untrustworthy source. Delete these attachments immediately, then "double
delete" them by emptying your Trash.
b. Delete spam, chain, and other junk email without forwarding, in with accordance
with Company's Acceptable Use Policy
c. Never download files from unknown or suspicious sources.
d. Avoid direct disk sharing with read/write access unless there is absolutely a
business requirement to do so.
e. Always scan an external storage device from an unknown source for viruses before
using it.
f. Back-up critical data and system configurations on a regular basis and store the
data in a safe place.
6. If you suspect you are infected with a virus or malware, please do the following:
a. Disconnect from the Company network
b. Run the AV software
c. If the problem is not resolved, contact the Company Technology Helpdesk for
further support.
My signature acknowledges that I have received the Policy on Antivirus. I understand that it is
my responsibility to read and adhere to the contents of this policy.
Signature
Printed Name
Date