ttu logo

tennessee technological university

Policies and Guidelines

TTU Virus Protection Policy

Tennessee Board of Regents Information Technology Resources policy 6.2(4) states that propagating "any program or data intended to disrupt normal operations (e.g., a computer ‘virus' or ‘worm')" is a violation of TBR policy. Sending viruses or other forms of malicious code (herein collectively referred to as "virus" or "viruses") may slow down the network by consuming excessive bandwidth and may expose university and user data to potential damage. An individual computer can have significant, adverse affects on other individuals, groups, departments, or even whole colleges.


The purpose of this computer virus protection policy is the effective and efficient prevention of network virus outbreaks and network security attacks involving computers associated with Tennessee Technological University. The focus of the policy is to ensure that TTU-affiliated users (faculty, staff, and students) are aware of and take responsibility for the proper use of the University-provided and Information Technology Services (ITS)-supported virus protection software. This policy is intended to ensure:

  • the integrity, reliability, and good performance of University computing resources;
  • that the user community operates according to at least a minimum level of safe computing practices;
  • that as many infections are prevented as possible;
  • that loss of information and data on University-owned computers is prevented and the costs of computer maintenance and network downtime caused by virus outbreaks is minimized;
  • that the University-licensed virus software is used for its intended purposes; and
  • that appropriate measures are in place to reasonably assure that this policy is honored.


Centrally provided virus protection software will be run on all computers connected to the TTU Network.


  • Distribute updates of virus protection software and other important ITS-supported software to all University-affiliated computer users. Virus protection software that is not used cannot prevent infections.
  • Annually evaluate the number of virus outbreaks to determine whether this policy and the University-provided virus protection software are still valid and appropriate.
  • Require a minimum of end-user responsibilities in regard to computer virus protection practices.


Virus protection is most effective if every computer on the TTU network has up-to-date antivirus software installed. ITS will provide the initial setup for campus computers and distribute virus protection updates. ITS will also provide assistance in removing any pre-existing antivirus programs from campus computers.

End-User Responsibilities

  • Maintain centrally-provided virus protection software (via ITS).
  • Be certain that the virus protection software is running correctly and that system security patches are applied. If these responsibilities appear beyond the end-user's technical skills, the end-user is responsible for seeking assistance from ITS.
  • Initiate disinfecting procedures or seek assistance from ITS.
  • Perform regular backups. Virus infections often destroy data on an individual's computer. Without proper backups, recovery of destroyed files may be impossible.


Faculty, staff, and students not complying with this computer security policy leave themselves and others at risk of virus infections which could result in

  • damaged or lost files
  • inoperable computer resulting in loss of productivity
  • risk of spread of infection to others
  • confidential data being revealed to unauthorized persons
If deemed necessary to prevent viral propagation to other networked devices or detrimental effects to the network, computers infected with viruses or other forms of malicious code shall be disconnected from the network until the infection has been removed.

Approved by Information Technology Committee, October 2, 2003
Approved by President Robert R. Bell, December 3, 2003