Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For


Security :: Secure Authentication

Secure authentication is the process by which the HSU computer networks determine that you are who you claim to be and grant you access to those parts of the network you are authorized to access. The process is accomplished through the combination of your unique HSU User Name and Password and your role at the University.

Guides :: Account Activation Checklist

All new faculty, staff, and students must complete the Account Activation Checklist prior to accessing email and other computer accounts.

Policy :: Information Security Policies and Standards

The Humboldt State University Information Security Policy comprises policies, standards, guidelines, and procedures pertaining to information security. The information contained in these documents is largely developed and implemented at the CSU level, although some apply only to HSU or a specific department.

Security :: Viruses and Other Malware

Malware, short for malicious software, is an all-ecompassing term for any software designed to harm or secretly access a computer system (or smartphone) without the user's informed consent. Malware includes viruses, worms, trojan horses, spyware, adware, scareware, rootkits, exploits, and any other piece of software designed to disrupt, destroy or steal valuable information.

Security :: Spammers, Phishers, and How to Stop Them


Learn how to recognize spam and phishing emails (yes, they are different), what their goal is, and how you can help keep them out of your - and everyone else's - inboxes. Read on for more about spam and phishing attacks.

Email messages, however authentic they might look, may not be legitimate and may be spam or phishing. What's the difference, and what can you do to keep them out of your inbox?

Security :: Secure Media Transfer & Disposal Procedures

The procedures detailed on this page are intended to prevent the inadvertent release of confidential, protected, or personally-identifiable information contained on electronic storage devices when physical possession or stewardship is changed.

Security :: Personal Responsibility

Freely-available computing, communication, and information resources are so key for everyone at HSU that it is imperative everyone recognizes the need for responsible use. Irresponsible and inappropriate use of computing resources risks not only the security, even the availability, of those resources but also puts individuals and the University at risk of legal action by any party that becomes a victim of the consequences of such behaviors. 

Security :: Procedure for Submitting Staff, Contractor, Consultant, and Student Employee Confidentiality Statements

Every Humboldt State University employee, contractor, student employee, or consultant (other than a faculty member) who has access to personally identifiable information (PII) or confidential data must have a signed Confidentiality Statement on file with Human Resources in order for those individuals to be authorized to access University records. 


Policy :: Information Security Laws & Regulations

Follow the links below to learn more about how federal and state laws impact information security and the use of computers.

Breach Notification Laws

Notification of Disclosure of Private Data

Security :: Procedure for Submitting Faculty Confidentiality Statements

Any faculty member needing access to personally identifiable or confidential data, including student class records and the ability to post grades, must have a signed faculty confidentiality statement on file with Human Resources."Faculty" includes tenure track, probationary, emeritus, and retired faculty, lecturers, counselors, coaches, graduate teaching assistants, and volunteers who teach classes.