Professional Documents
Culture Documents
BECKETT UNIVERSITY
IT Services
Computer Protection Policy
__________________________________________________________________
1. Introduction
1.1. This policy will define how University-controlled end-point devices servers and user devices - are
protected from security vulnerabilities. It includes appropriate technical and procedural controls to
reduce risk and meet the requirements of other University IT Security Policies.
2. Scope
2.1. This policy defines the basic protection that should be applied to computers, including desktop
PCs, laptops and servers owned and controlled by the University.
2.2. It does not preclude additional protection methods appropriate to specific installations and
applications.
2.3. This document includes statements on:
2.3.1.Host firewall implementation and configuration
2.3.2.Operating System and application patching
2.3.3.Host protection (e.g. Anti-virus, rootkit detection, HID/PS) systems.
6. Document Approval
Approved by:
Approved Date:
Review Date:
January 2017
Reviewer:
7. Document History
17/07/13
15/08/14
19/10/15
19/01/16
Page 2 of 2