- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
While we're always encouraging you to use strong passwords, and you already know you should use different passwords for different sites to protect your personally-identifiable information, we recognize that it's challenging to remember multiple password-user name combinations and what goes with which site. So, we've done some research and come up with a list of password manager applications we feel comfortable recommending to securely store all your passwords in a single location, which is much safer and more efficient than Post-It notes, browser caches, or Word documents.
HSU's information security infrastructure comprises the tools and equipment the campus employs to protect University-owned computers and networks. This infrastructure is designed to be as unobtrusive as possible while still maintaining a high degree of protection against malware, hackers, and data breaches:
As technology gets more complex and more personal information is (accidentally or deliberately) shared, information security incidents happen more and more frequently, and even the largest organizations are not immune.
Information Technology Services has created a video tutorial to walk you through the process of resetting your password, as well as recovering your HSU User Name, in both downloadable video podcast and high-definition YouTube formats. Both versions feature closed captioning.
Humboldt State University's Information Security Team collaborates with faculty, staff and students to keep campus computing systems running smoothly and important data protected and secure.
Information Security Plan. Secure data and infrastructure protecting confidentiality, availability and integrity.
All HSU employees (including student employees, contractors, and consultants), faculty, and Unit 4 employees are required to have a signed confidentiality statement form on file with Human Resources. The information provided, together with the role you have at the University, dictates the data and applications you are authorized to access under the CSU Data Classification Standards.
Click on the appropriate link below to access the procedure for submitting the form:
Data security breaches are happening more and more often, and even the largest organizations are not immune. Many well-known banks, manufacturing companies, government departments, universities, and other organizations have experienced major breaches in data protection. It's important to remember that data breaches aren't just caused by sophisticated hackers; they're also caused all-too-frequently by a lack of attention or care being paid to the information entrusted to us - in fact, the biggest threat to data security is people's behavior.