Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Security

Security :: Secure Media Transfer & Disposal Procedures

The procedures detailed on this page are intended to prevent the inadvertent release of confidential, protected, or personally-identifiable information contained on electronic storage devices when physical possession or stewardship is changed.

Security :: Personal Responsibility

Freely-available computing, communication, and information resources are so key for everyone at HSU that it is imperative everyone recognizes the need for responsible use. Irresponsible and inappropriate use of computing resources risks not only the security, even the availability, of those resources but also puts individuals and the University at risk of legal action by any party that becomes a victim of the consequences of such behaviors. 

Security :: Procedure for Submitting Staff, Contractor, Consultant, and Student Employee Confidentiality Statements

Every Humboldt State University employee, contractor, student employee, or consultant (other than a faculty member) who has access to personally identifiable information (PII) or confidential data must have a signed Confidentiality Statement on file with Human Resources in order for those individuals to be authorized to access University records. 

 

Policy :: Information Security Laws & Regulations

Follow the links below to learn more about how federal and state laws impact information security and the use of computers.

Breach Notification Laws

Notification of Disclosure of Private Data http://info.sen.ca.gov/pub/01-02/bill/sen/sb_1351-1400/sb_1386_bill_20020926_chaptered.html

Security :: Procedure for Submitting Faculty Confidentiality Statements

Any faculty member needing access to personally identifiable or confidential data, including student class records and the ability to post grades, must have a signed faculty confidentiality statement on file with Human Resources."Faculty" includes tenure track, probationary, emeritus, and retired faculty, lecturers, counselors, coaches, graduate teaching assistants, and volunteers who teach classes.

Security :: Real-time Black Lists (RBLs)

Real-time Black Lists (RBLs) are lists of IP addresses known to regularly send spam. Several such lists are maintained by different organizations concerned about the proliferation of spam. Internet Service Providers make use of these lists in order to prevent spam from known sources from reaching their customers, and the license fees they pay for the use of the lists pays for the ongoing research needed to keep the lists updated.

Wireless :: Security Requirements

Humboldt State University uses network access control (NAC) software to provide more secure and reliable network access for everyone on campus. This means that, when you first request to connect to the wireless network, you will be asked to download and install a small software program called the SafeConnect PolicyKey.

Wireless :: Wireless Security FAQs

What are you looking for?

The Client Security Agent (CSA) will scan your computer, looking for the following things:

Security :: Approved Antivirus Software

Antivirus (AV) software protects computers and mobile devices from being infected by viruses, spyware, worms, Trojans, and a long list of other malware that can damage data or steal your identity. In order to protect both your data and data on every other computer connected to the Humboldt State University networks, you must have an up-to-date virus protection product installed on your computer before you are permitted to connect to the campus wired and wireless networks.

Security :: Single Sign-on Security

Your HSU User Name and Password together provide an efficient, secure way to access computer-based resources on campus. Using this unique combination of identifiers enables students, staff, and faculty to log in to any campus system using the same credentials without lowering the level of security applied to the information stored on those systems.

feedback