Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Services For


Labs :: Lab Event Scheduling

You'll find all the information you need to schedule an event in an ITS-managed lab on this page; if you're reserving a facility for use by an off-campus organization, please follow the instructions under Off-Campus Groups.

Policy :: Suggested Voicemail Greetings

It's not always easy to write your own script for your voicemail greeting, especially when you're out of the office because of an external decision such as that involving furlough days. We've prepared the following "greetings templates" to help you construct your own personalized greetings.

Security :: Create and Maintain Strong Passwords

Information protection starts with account protection. If your account is secure and can't easily be accessed by a stranger, the information you store in that account will also be safe. While you are associated with Humboldt State University, you are responsible for keeping your HSU account information and all activity relating to that account secure.

Security :: Securing Confidential Information

The Board of Trustees of the California State University (CSU) system, of which Humboldt State University (HSU) is a part, is responsible for protecting the confidentiality of the personally-identifiable information held by the system. The Board is also responsible for the security of the equipment on which this information is stored and processed, and for the related privacy rights of the CSU students, faculty, and staff with regard to this data.

It is the collective responsibility of the CSU, its executives, managers, faculty, and staff to ensure:

Email :: Configuring and Using Email Aliases

In addition to your email address (your preferred email address), you can also use; this is known as your formal email alias and is assigned automatically to faculty and staff members. All emails sent to your formal email alias will automatically be redirected to your preferred email address so that all your mail is delivered to a single email inbox.

Guides :: Account Activation Checklist

All new faculty, staff, and students must complete the Account Activation Checklist prior to accessing email and other computer accounts.


Accessibility :: Website Development for Accessibility

The Internet is one of the most important communications media used at Humboldt State University. It connects users to information sources and to each other, delivers coursework, and enables self-service administrative tasks such as registering for classes. Web pages must be reasonably accessible to enable students, faculty, staff, and the general public to participate fully in the HSU community.   

Accessibility :: General Accessibility Policy

January 2002 P02-01 Supersedes P01-4, P98-05 Humboldt State University Policy and Procedures for Accommodating Individuals with Disabilities I. POLICY It is the policy of Humboldt State University to provide equal access and reasonable accommodation for individuals with disabilities to participate in any program, service, or opportunity provided by the campus, including access to the content and services of World Wide Web pages authored by the University. II. TERMS

Policy :: Status of Student Computing

It can be difficult for an organization to perform a self-assessment unless there is some outside agency that can provide guidance on the factors that should be considered. This section provides the answers to 35 questions students should ask about technology at any school they are considering attending. The questions were developed by EDUCAUSE with the cooperation of the National Association for College Admission Counseling (NACAC) and the American Association of Collegiate Registrars and Admissions Officers (AACRAO).

Security :: Personal Responsibility

Freely-available computing, communication, and information resources are so key for everyone at HSU that it is imperative everyone recognizes the need for responsible use. Irresponsible and inappropriate use of computing resources risks not only the security, even the availability, of those resources but also puts individuals and the University at risk of legal action by any party that becomes a victim of the consequences of such behaviors.