Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Encryption

... encryption is particularly important when dealing with Level 1 and Level 2 protected data. ... strength of encryption appropriate for use with Level 1 protected data. Strong encryption is 256-bit encryption and ...

ITS Service - Anonymous - May 7 2013 - 2:14pm - 0 comments

Policy :: Additional Documents: ICSUAM POLICY 8065.0 - Information Asset Management

... Summary of CSU and HSU Requirements for Storage of Level 1 Data   Supplemental Policies CSU: ... Procedure: Security Standards for Computers Containing Level 1 Data     Procedures, Guidelines, ...

Page - Anonymous - Jul 31 2013 - 3:23pm - 0 comments - 0 attachments

Security :: Protected Information Standards

... for computers and other storage devices containing Level 1 data. These standards define best practices for the security of computers containing Level 1 data and cover all equipment owned or managed by the University, ...

Page - rrw1 - Dec 17 2013 - 10:41am - 0 comments - 0 attachments

Compromised Systems Procedure

... will be issued by the ISO. If the presence of Level 1 data is identified at any point during the investigation, all work ...

ITS Service - Anonymous - Jan 25 2013 - 4:31pm - 0 comments

Security :: Compromised Host Procedure for IT Support Staff

... so it is particularly important to determine whether Level 1 protected data is stored on the affected system when addressing ... compromised security. Systems unlikely to contain Level 1 protected data will not require preemptive forensics work by the Campus ...

Page - rrw1 - Sep 18 2013 - 2:41pm - 0 comments - 0 attachments

Security :: Protected Information

... It also establishes requirements for the protection of Level 1 Protected data and Level 2 Private data stored on campus computers. Level 1 and Level 2 data may only be stored on University-owned computers. ...

Page - blg10 - Feb 6 2013 - 10:52am - 0 comments - 0 attachments

Security :: Incident Response

... computer in any way UNLESS you strongly suspect that Level 1 protected data is in the process of being removed from the system ... ITC immediately. If the system contains Level 1  or Level 2 data, this is an information ...

Page - rrw1 - Dec 17 2013 - 10:45am - 0 comments - 0 attachments

Be Sure to Secure Your Multi-Function Devices

... If your office has an MFD and you have access to Level 1 or Level 2 protected data, you have a responsibility to ... report any suspected security incidents involving MFDs and Level 1 or Level 2 data, as well as take all appropriate steps to ensure the ...

ITS Story - Anonymous - Mar 7 2013 - 4:41pm - 0 comments - 0 attachments

Security :: Protected Information Scan

... Memorandum on Protected Information requires that Level 1 and Level 2 data not be stored on electronic systems or ...

Page - rrw1 - Sep 25 2012 - 12:03pm - 0 comments - 0 attachments

Security :: Identity Management Procedures

... appropriate controls to protect assets containing Level 1 and Level 2 protected data. Campus identity management ...

Page - Anonymous - Jun 6 2013 - 1:40pm - 0 comments - 0 attachments

feedback