- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Humboldt State University's Information Security Office works with the campus community to secure system and network resources and to protect the confidentiality of student, faculty, and staff information. If you have ideas on improving HSU's information security, contact us at email@example.com.
To report information security violations or concerns, please send email to the appropriate address below:
Whether you're staff, faculty, or student, by familiarizing yourself with - and acting on - the information on this page, you'll go a long way towards ensuring you don't become a victim of identity theft or suffer a catastrophic loss of data during your time at HSU.
A strong password is the best way to protect yourself against identity theft and unauthorized access to your confidential information. Read our tips for creating a strong, memorable password.
This information regarding P2P File-sharing and copyright violations is intended to increase your awareness so that you may avoid potential sanctions.
This document borrows extensively from and replicates significant portions of the University of Delaware's "Policy for Responsible Computing." The University of Delaware was awarded CAUSE's "Best Practices in Service" award for 1995 for this work. Local modifications and editing were performed by a committee of HSU users in 1996, including faculty, staff, and students, appointed by the Vice President for Academic Affairs.
Phishing scams are attempts by hackers and cyberciminals to steal personal information or hijack computing resources for nefarious purposes. The most common (and most successful) phishing scams are emails that appear to come from a legitimate source (for instance, HSU Technology Help Desk, your bank, eBay, PayPal), and which contain a link that directs you to equally legitimate-looking web pages.
HSU has established best practice procedures that must be followed whenever a computer connected to a University network is suspected of being compromised by a virus or other attack. This procedure is a requirement under our data protection compliance mandate, so it is particularly important to determine whether Level 1 protected data is stored on the affected system when addressing potentially compromised security.
Humboldt State University has established a set of data protection and security standards that comprise specific configuration settings in order to meet the requirements of the CSU Data Classification Standards for computers and other storage devices containing Level 1 data.