Rice University logo
Information Technology

Information Technology


Security & Viruses

Computing securely and safely is an important issue for maintaining Rice's networks of information. As a member of the Rice community, you must responsibly use Rice computing resources to protect your information and Rice's data. You must clean and secure your computer from malicious threats so that you don't expose the Rice network to outside hackers (see Virus Protection below). You must keep data safe and secure using encryption and other security measures, especially when storing data on portable devices (see Security below). Also, you need to be sure data is destroyed on equipment that is being eliminated. The IT Security Office offers advice and guidance in all these areas. Contact the Help Desk for advice or specific questions.


Keeping data secure is critical, not only for Rice's data but also for your personal information (to protect against identity theft).

Virus Protection

Tools such as Clean Access and Trend Micro Officescan help protect the Rice computing environment by locking out potential hackers.To further protect your computer, DO NOT open unsolicited email attachments for any reason. The minute you click on the attachment, the infection process begins.Your refusal to open unsolicited attachments is an important part of the initiatives IT relies upon to help you protect your computer and Rice's IT resources. (Also, be wary of email requesting you to reply back or follow a link to enter private information such as passwords.)

Clean Access 

  • Rice's network security program, Clean Access, helps minimize virus contamination and quarantines computers that get infected. Clean Access requires anti-virus software to be installed and up to date. See anti-virus links (below) for details.

Antivirus Tools 

Information Technology Security Office (ITSO)

The Information Technology Security Office protects the electronic assets of Rice University. ITSO staff maintain information integrity, confidentiality of electronic communications, and issues that impact the security of the technology infrastructure such as virus and spam preventions, confidentiality and privacy, system intrusion detection, prevention, and forensics. The office also offers guidance and specific protection measures to the Rice community.

 Last updated: December 06, 2013 by: Carlyn Chatfield