- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Humboldt State University's Information Security Office works with the campus community to secure system and network resources and to protect the confidentiality of student, faculty, and staff information. If you have ideas on improving HSU's information security, contact us at email@example.com.
To report information security violations or concerns, please send email to the appropriate address below:
Whether you're staff, faculty, or student, by familiarizing yourself with - and acting on - the information on this page, you'll go a long way towards ensuring you don't become a victim of identity theft or suffer a catastrophic loss of data during your time at HSU.
A strong password is the best way to protect yourself against identity theft and unauthorized access to your confidential information. Read our tips for creating a strong, memorable password.
This information regarding P2P File-sharing and copyright violations is intended to increase your awareness so that you may avoid potential sanctions.
This document borrows extensively from and replicates significant portions of the University of Delaware's "Policy for Responsible Computing." The University of Delaware was awarded CAUSE's "Best Practices in Service" award for 1995 for this work. Local modifications and editing were performed by a committee of HSU users in 1996, including faculty, staff, and students, appointed by the Vice President for Academic Affairs.
Phishing scams are attempts by hackers and cyberciminals to steal personal information or hijack computing resources for nefarious purposes. The most common (and most successful) phishing scams are emails that appear to come from a legitimate source (for instance, HSU Technology Help Desk, your bank, eBay, PayPal), and which contain a link that directs you to equally legitimate-looking web pages.
HSU has established best practice procedures that must be followed whenever a computer connected to a University network is suspected of having been compromised by a virus or other threat. This procedure is a requirement under our data protection compliance mandate, so it is particularly important to determine whether Level 1 protected data is stored on the affected system.
In collaboration with all CSU campuses, the Chancellor’s Office has developed a web-based information security awareness training course designed to provide staff and faculty with the information they need to secure information resources. This course will help Humboldt State University employees safeguard personal information as well as information stored under the aegis of the University.
The awareness training covers the following topics, and has been reviewed by the CFA and CSUEU.