- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
... While HSU has adopted GMail , which uses SSL encryption , as the campus standard email system, other email systems may ... You can usually tell if a web site is using SSL encryption by the presence of a "lock" icon in the lower right-hand ...
Page - rrw1 - Dec 9 2013 - 4:54pm - 0 comments - 0 attachments
... itself. Security Notes Spider uses an encryption and integrity checking mechanism intended to prevent the ... Blowfish is the default. Key (user defined) gives the encryption key used by both Spider client and spider_server for secure ...
Page - rrw1 - Sep 26 2012 - 7:42am - 0 comments - 0 attachments
... Consider the availability of security options such as encryption or hard drive overwriting before purchasing Any areas that ... Level 1 or Level 2 data should purchase an MFD with encryption capability Devices configured for Level 1 or Level 2 data must ...
Page - Anonymous - May 17 2013 - 1:04pm - 0 comments - 0 attachments
... for how to regain secure access to the HSU network. Encryption . Encryption converts data into a secure form that can be safely transferred and ...
Page - Anonymous - Feb 6 2013 - 4:56pm - 0 comments - 0 attachments
... form . The system is using University-supported encryption to protect the data from unauthorized access and is in compliance ...
Page - blg10 - Feb 6 2013 - 9:52am - 0 comments - 0 attachments
... Storage Devices and Media (Encryption, Data Protection, Security) ...
Page - rrw1 - Feb 6 2013 - 9:50am - 0 comments - 0 attachments