- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
The HSU Executive Memorandum on Protected Information requires that Level 1 and Level 2 data not be stored on electronic systems or devices unless absolutely necessary and should be removed when the business reason for storage is no longer required.
The Protected Information Scan is used to determine the likely locations of protected data for your further action. It does not determine whether you are authorized to store protected data on your campus computer.
If you find protected data on your system, you should do one of the following:
For computers and users with an ongoing need to store protected data that's necessary for conducting essential university business, encryption may be a solution, Encryption should not be used without consultation with your ITC.
Note: Identity Finder encryption is NOT recommended.
Depending on the size of your hard drive, the amount of data and the speed of your computer, a PI scan may take a significant amount of time to complete and can limit the impact of other work. Do not attempt to run a PI scan without first consulting your ITC!
Click here for an overview of PI scanning tools
A positive result does not mean that the type of data found is in fact sensitive. False positives are files that contain pattern matches similar to the form of sensitive data, but which do not actually contain such data. Identity Finder and other PI scanning tools can be used to review potentially sensitive files for accuracy and to eliminate false positives.
Just because your PI scan did not identify the presence of sensitive information does not guarantee that there is none there. It simply means that the patterns used by the Protected Information scanning tools to search your computer did not find any results.