- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
IT personnel are expected to have a solid understanding of information security issues, both in general and how they apply specifically to the use of computers on the HSU campus. For ease of use, this page brings together a number of security-related resources - you're encouraged to review and become familiar with them.
Every desktop and laptop at HSU must be scanned for personally-identifiable information, so all IT staff members designated to assist in this process should make themselves available to assist users in their area to scan their system and understand the resulting report.
Spider is an open source network forensics tool developed at Cornell University to identify the presence of sensitive information on a computer or attached storage device.
Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally-Identifiable Information (PII) on a computer. It scans for data such as Social Security, credit card, or bank account and routing numbers, and produces a list of files that may contain confidential data. Spider can then be used to:
Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally-Identifiable Information (PII) on a computer. It scans for data such as Social Security, credit card, or bank account and routing numbers and produces a list of files that may contain PII.
Identity Finder Professional is HSU's preferred solution for protected information scans. It is a commercial product that requires an annual subscription fee; there is no campus contract for Identity Finder licenses, so units wishing to use the software will need to purchase their own licenses. More information is available on the Identity Finder website.
Encryption is the transformation of data into a form unreadable by anyone without the secret decryption key. Its purpose is to ensure confidentiality and privacy by keeping the information hidden from anyone for whom it is not intended. When an entire hard drive is encrypted, all the data on the drive is protected from unauthorized access if the computer is lost or stolen. Encryption can also be used to protect sensitive files that are sent through email or sensitive communications sent over the network.
The HSU Executive Memorandum on Protected Information requires that Level 1 and Level 2 data not be stored on electronic systems or devices unless absolutely necessary and should be removed when the business reason for storage is no longer required.
The Protected Information Scan is used to determine the likely locations of protected data for your further action. It does not determine whether you are authorized to store protected data on your campus computer.
"Protected information", sometimes called Personally-Identifiable Information, or PII, is an umbrella term for information that is linked to an individual person's identity, such as Social Security Numbers, drivers' license data, and credit card or bank account information and which can be used to facilitate identity theft. Universities in particular have become attractive targets for hackers because of the freedom with which information is exchanged in an academic environment.