This policy outlines procedures for preventing virus infestation from electronic mail attachments and external disks and software. It also provides guidelines on using virus protection software and reporting suspected virus infestation.
In this sample, users must exercise caution when opening unknown email attachments, although the server checks all email attachments for viruses before delivery. Users must not open or execute email attachments unless they originate from a trusted party. For external disks and software, it warns that users must not use personal disks with company computers or install software that has not been approved by the company onto company systems.