Computing Security Responsibilities

Purpose

The purpose of this policy is to prescribe mechanisms that help identify and prevent the compromise and misuse of the University’s computers and networks.

Policy

Authorized Users of Lynn University’s computers and networks must take necessary steps to protect the University from unwanted viruses.

Definitions

Authorized User(s)-are all users of the University’s computers and networks including, but not limited to, employees, temporary employees, faculty, students, alumni, campus visitors, contractors, vendors, consultants and their related personnel, and other users authorized by the University to access its computers and networks.

Procedures/Guidelines

Recommended processes to prevent virus problems include but are not limited to:

1. NEVER open any files or macros attached to an email from an unknown, suspicious or untrustworthy source. Delete these attachments immediately, then double delete them by emptying your Trash;

2. Delete spam, chain, and other junk email without forwarding, in accordance with Lynn University’s Acceptable Use Policy;

3. Never download files from unknown or suspicious sources;

4. Avoid direct disk sharing with read/write access unless there is absolutely a business requirement to do so;

5. Keep your machine, especially laptops, physically secured. Confidential and sensitive information must be safeguarded. Take appropriate measures (e.g., encryption for electronic information, physically secure physical media) to prevent unauthorized disclosure;

6. Be alert and aware of information stealing methods such as: social engineering, phishing scams, and shoulder surfing to obtain personal and sensitive information about you;

7. Implement credible and reputable anti-virus software, perform continuous and/or scheduled scanning, and keep it up-to-date;

8. Implement anti-spyware to protect private personal information;

9. Implement current technology security preventive solutions to protect your computers from unwanted threats;

10. Enable the built-in firewall that is included in major operating systems and/or install a firewall application;

11. When logged into the network, remember to log out after you are finished. Also, enable a password-protected screen saver when leaving your computer temporarily;

12. Never download or open any files or macros attached to an email from an unknown, suspicious or untrustworthy source. Delete these attachments immediately, and then permanently delete them by emptying your trash;

13. Delete spam, chain and other junk email without forwarding it; and

14. Avoid creating shared folder with open or full access.

For more information about this policy, contact Information Technology.

Policy updated on: Oct. 24, 2018