West Virginia University Computer Security and Privacy Incident Reporting System

File An Incident Report Learn more about defending your data.

Computer Support End-User Network Security and Support Services Policies

Due to federal, state, and local security regulations and guidelines, all computers connecting to the WVU Health Sciences Center computer networks shall adhere to the following standards:

  • All Windows-based computers will connect/join to the HS domain
  • All computers (Windows, non-Windows workstations) must adhere to the following restrictions:
    • Screensaver will be enabled with 30 minute timeout. Will require login upon waking.
    • All unattended computers must be locked or logged off.
      • PC - Depress the Ctrl-Alt-Delete keys simultaneously to lock or logoff
      • Mac - Activate a locked screensaver or logoff
  • Windows-based computers: Windows Updates will be enabled and automatically installed on a user’s computer nightly. If computer is off at the daily installation time, updates will be installed upon restart. A reboot will be required for updates to take effect and must be initiated by the end-user at minimum of once a week.

  • Automatic updates must be enabled on all other workstations.

  • All Windows-based computers must run anti-virus/anti-spyware with latest updates. HSC Information Technology Services (ITS) provides enterprise anti-virus Security for Windows-based and Mac OS computers. The installation file is configured to provide live updates, initiate full scan on a weekly basis, and provide real-time virus scanning for all network connections. Live updates of definitions are scheduled to run every 4 hours. Weekly scan begins at 11pm every Monday night. If computer is off during weekly scan period, the scan will initiate upon restart.

HSC Information Technology Services provides central firewall protection to all users of the HSC Network. 
Password Requirements:

  • Must be at least 8 characters in length
  • Passwords must be changed every 90 days
  • Must contain characters from at least three of the following four categories:
    • Uppercase letters: A-Z
    • Lowercase letters: a-z
    • Numbers: 0-9
    • Only these special characters: / ! ^ ? : . { } [ ] ~ - _ +
  • Cannot include your first name, middle name, last name, or username, blank spaces, or be among the last five passwords used.
  • Do not reuse your WVU Login username and password on any systems outside of WVU.

Policies

  • Do not reuse your WVU Login username and password on any systems outside of WVU.
  • Strong Passwords are required meeting HSC complexity requirements.
  • File / Print sharing between individual desktop PCs is prohibited. Central storage is provided by Information Technology Services.
  • Due to security issues relative to access, dissemination, and retention of HIPAA, FERPA, and other confidential information, the use of external file sharing/storage applications/sites (i.e. Drop Box, FolderShare, etc.) is strictly prohibited.
  • POP3 is disabled for all HSC email accounts due to security issues.
  • No network hubs permitted on the HSC Network.
  • All Mobile Smartphone devices that connect to both cellular and wi-fi networks are prohibited from accessing the WVa.home internal wireless network. For wi-fi use, these devices should use WVU.Encrypted network.
  • No external remote control access software is permitted on the end-user’s computer (i.e. gotomypc.com, logmein.com).
  • All infrastructure equipment (ie. routers, switches, wireless equipment, network appliances, network storage devices (NAS, SAN, etc.)) is provided and maintained by HSC Information Technology Services only. Departments are not permitted to install and maintain infrastructure equipment.
  • Mandatory encryption is required for all HSC laptops and desktops. All new laptops/desktops MUST be pre-approved by ITS prior to ordering to ensure the laptop can be properly encrypted see HSC ITS Purchasing Policies.

To help provide for a more reliable and secure computing environment, it is important for end-users to keep their computers, operating systems, and application software up to date. Although, we don’t always recommend moving to the latest cutting-edge technology we do encourage keeping computers updated at a reasonable pace. Doing so enables for a better support infrastructure and system security. For a list of supported software and our IT Support Services policies and procedures, see Policies and Procedures.