Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Is it safe to store PII (Level 1) or sensitive data on cloud storage?

It is not safe to store PII ( Level 1 ) data or sensitive data on cloud computing storage. This type of ...

FAQ - bjt7001 - Oct 2 2012 - 8:11am - 0 comments - 0 attachments

Policy :: Additional Documents: ICSUAM POLICY 8065.0 - Information Asset Management

... Summary of CSU and HSU Requirements for Storage of Level 1 Data   Supplemental Policies CSU: ... Procedure: Security Standards for Computers Containing Level 1 Data     Procedures, Guidelines, ...

Page - Anonymous - Jul 31 2013 - 3:23pm - 0 comments - 0 attachments

Security :: Protected Information Standards

... for computers and other storage devices containing Level 1 data. These standards define best practices for the security of computers containing Level 1 data and cover all equipment owned or managed by the University, ...

Page - rrw1 - Dec 17 2013 - 10:41am - 0 comments - 0 attachments

Compromised Systems Procedure

... will be issued by the ISO. If the presence of Level 1 data is identified at any point during the investigation, all work ...

ITS Service - Anonymous - Jan 25 2013 - 4:31pm - 0 comments

Security :: Compromised Host Procedure for IT Support Staff

... so it is particularly important to determine whether Level 1 protected data is stored on the affected system when addressing ... compromised security. Systems unlikely to contain Level 1 protected data will not require preemptive forensics work by the Campus ...

Page - rrw1 - Sep 18 2013 - 2:41pm - 0 comments - 0 attachments

Security :: Protected Information

... It also establishes requirements for the protection of Level 1 Protected data and Level 2 Private data stored on campus computers. Level 1 and Level 2 data may only be stored on University-owned computers. ...

Page - blg10 - Feb 6 2013 - 10:52am - 0 comments - 0 attachments

Security :: Incident Response

... computer in any way UNLESS you strongly suspect that Level 1 protected data is in the process of being removed from the system ... ITC immediately. If the system contains Level 1  or Level 2 data, this is an information ...

Page - rrw1 - Dec 17 2013 - 10:45am - 0 comments - 0 attachments

Be Sure to Secure Your Multi-Function Devices

... If your office has an MFD and you have access to Level 1 or Level 2 protected data, you have a responsibility to ... report any suspected security incidents involving MFDs and Level 1 or Level 2 data, as well as take all appropriate steps to ensure the ...

ITS Story - Anonymous - Mar 7 2013 - 4:41pm - 0 comments - 0 attachments

Security :: Identity Management Procedures

... appropriate controls to protect assets containing Level 1 and Level 2 protected data. Campus identity management ...

Page - Anonymous - Jun 6 2013 - 1:40pm - 0 comments - 0 attachments

Security :: Protected Information Scan

... Memorandum on Protected Information requires that Level 1 and Level 2 data not be stored on electronic systems or ...

Page - rrw1 - Sep 25 2012 - 12:03pm - 0 comments - 0 attachments

feedback