- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
You'll find descriptions of the encryption programs supported by HSU on the ITS website, along with links to instructions for using the individual programs. Please do not encrypt any University data without consulting with your ITC, the Technology Help Desk, or the Information Security Office first.
Level 1 data should never be sent via email. Some of the reasons that email is not appropriate are:
Simply deleting a file does not erase the information contain in that file; it just makes the space occupied by that information available to the device to store other data. So, until it is overwritten by information from another file, that deleted data can be recovered using easily-available tools. The military standard for secure data destruction recommends three separate overwrite passes to render data inaccessible; ITS maintains a list of overwriting programs that meet HSU standards for data destruction. These tools take a long time to run and must be verified before the storage device can be declared clear of any recoverable information, so it makes sense to have IT handle this process for you.
We wouldn't advise it. Encryption is a complex process that involves scrambling data in such a way that it can only be unscrambled with a special key that you create as part of the encryption process. If you lose that key, your data is likely gone for good. An experienced computer technician can handle the encryption and ensure that there is fall-back way to access your data if you lose the key.
Every computer owned by HSU must be periodically scanned using specialized software to determine whether protected information is on that computer. This process is called the PII Scan and should be undertaken only with the assistance of IT. The technician will help you to install and run the software, which will output a report describing the information found that may be regarded as protected. You need to review this report to determine which items of information identified by the software are Level 1 protected data and which are "false alarms". (IT cannot do this step for you). Appropriate action can then be taken by IT to ensure that any Level 1 protected data you have a demonstrable need to have on your computer is encrypted to secure it.
"Protected data" is an umbrella term for information that is linked to an individual person's identity, such as Social Security numbers, drivers' license data, and credit card or bank account information (sometimes called Personally-Identifiable Information, or PII) and which can be used to facilitate identity theft. Learn more about the steps HSU takes to protect the confidential data stored on its networks.