Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results
Can I send sensitive information through email?

... that data has been encrypted using HSU-approved strong encryption . Alternatively, you can store the sensitive data in a system ...

FAQ - bjt7001 - Feb 12 2013 - 3:14pm - 0 comments - 0 attachments

Virtual Private Networks (VPNs)

... to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the data being ...

ITS Service - Anonymous - Dec 18 2013 - 3:23pm - 0 comments

Is email a safe way to send medical (HIPAA) data?

... health information (PHI) be encrypted using strong encryption . Messages containing PHI that are transmitted over unencrypted ...

FAQ - bjt7001 - Feb 12 2013 - 2:53pm - 0 comments - 0 attachments

Security :: Secure Disposal of Paper & Electronic Media

... the drive is ready for retirement, simply delete the encryption key which leaves the drive inaccessible. Labeling Wiped ...

Page - Anonymous - May 28 2013 - 12:18pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: Windows 8

... for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the ...

Page - bjt7001 - Dec 19 2013 - 3:47pm - 0 comments - 0 attachments

Security :: Secure Media Transfer & Disposal Procedures

... the vendor. Maintenance and warranty with encryption : In cases where HSU-supported encryption is enabled, such drives may be returned for ... sure that data is unrecoverable from an SSD is to utilize encryption. Using full disk encryption has a two-fold effect: secure the ...

Page - rrw1 - Dec 19 2012 - 3:27pm - 0 comments - 0 attachments

Security :: Protected Information Discovery Tools

... Cons: Uses non-standard encryption method Must be purchased Spider for Windows ... Stable Fast Cons: Uses non-standard encryption method Must be purchased Spider for Mac OS ...

Page - rrw1 - Sep 27 2012 - 1:57pm - 0 comments - 0 attachments

Wireless :: Regular Wireless Access Overview

... While HSU has adopted GMail , which uses SSL encryption , as the campus standard email system, other email systems may ... You can usually tell if a web site is using SSL encryption by the presence of a "lock" icon in the lower right-hand ...

Page - rrw1 - Dec 20 2013 - 4:25pm - 0 comments - 0 attachments

Security :: Cornell Spider - Linux

... itself. Security Notes Spider uses an encryption and integrity checking mechanism intended to prevent the ... Blowfish is the default. Key (user defined) gives the encryption key used by both Spider client and spider_server for secure ...

Page - rrw1 - Sep 26 2012 - 8:42am - 0 comments - 0 attachments

Security :: Multifunction Copier/Printer Devices

... Consider the availability of security options such as encryption or hard drive overwriting before purchasing Any areas that ... Level 1 or Level 2 data should purchase an MFD with encryption capability Devices configured for Level 1 or Level 2 data must ...

Page - Anonymous - Dec 17 2013 - 2:19pm - 0 comments - 0 attachments

feedback