- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
HSU has established best practice procedures that must be followed whenever a computer connected to a University network is suspected of being compromised by a virus or other attack. This procedure is a requirement under our data protection compliance mandate, so it is particularly important to determine whether Level 1 protected data is stored on the affected system when addressing potentially compromised security.
Humboldt State University has established a set of data protection and security standards that comprise specific configuration settings in order to meet the requirements of the CSU Data Classification Standards for computers and other storage devices containing Level 1 data.
In collaboration with all CSU campuses, the Chancellor’s Office has developed a web-based information security awareness training course designed to provide staff and faculty with the information they need to secure information resources. This course will help Humboldt State University employees safeguard personal information as well as information stored under the aegis of the University.
The awareness training covers the following topics, and has been reviewed by the CFA and CSUEU.
IT personnel are expected to have a solid understanding of information security issues, both in general and how they apply specifically to the use of computers on the HSU campus. For ease of use, this page brings together a number of security-related resources - you're encouraged to review and become familiar with them.
Every desktop and laptop at HSU must be scanned for personally-identifiable information, so all IT staff members designated to assist in this process should make themselves available to assist users in their area to scan their system and understand the resulting report.
Spider is an open source network forensics tool developed at Cornell University to identify the presence of sensitive information on a computer or attached storage device.
Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally-Identifiable Information (PII) on a computer. It scans for data such as Social Security, credit card, or bank account and routing numbers, and produces a list of files that may contain confidential data. Spider can then be used to:
Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally-Identifiable Information (PII) on a computer. It scans for data such as Social Security, credit card, or bank account and routing numbers and produces a list of files that may contain PII.
The HSU Executive Memorandum on Protected Information requires that Level 1 and Level 2 data not be stored on electronic systems or devices unless absolutely necessary and should be removed when the business reason for storage is no longer required.
The Protected Information Scan is used to determine the likely locations of protected data for your further action. It does not determine whether you are authorized to store protected data on your campus computer.
"Protected information", sometimes called Personally-Identifiable Information, or PII, is an umbrella term for information that is linked to an individual person's identity, such as Social Security Numbers, drivers' license data, and credit card or bank account information and which can be used to facilitate identity theft. Universities in particular have become attractive targets for hackers because of the freedom with which information is exchanged in an academic environment.