Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Security :: Hardware Personal Information Protection

... stored on a computer is to encrypt it. However, encryption can reduce performance on the computer and increase the ... “ Password Protection .” 3. The same encryption approaches can be used to protect personally identifiable or other ...

Page - rrw1 - Jul 13 2011 - 1:36pm - 0 comments - 0 attachments

What are the requirements for storage of Level 1 data?

... implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

FAQ - Anonymous - Jul 26 2013 - 11:22am - 0 comments - 0 attachments

Security :: Tools and Resources

... in hardware, software, or a combination of both. Encryption . Encryption converts data into a secure form that can be safely moved around ...

Page - bjt7001 - May 5 2014 - 2:20pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: HSU-Owned Windows 7/Vista Systems

... for Security type. Select AES for Encryption type. Check Start this connection automatically . ... WPA2-Enterprise for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the ...

Page - Anonymous - Nov 26 2014 - 2:13pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: Windows 7/Vista

... for Security type. Select AES for Encryption type. Check Start this connection automatically . ... for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the network ...

Page - bjt7001 - Nov 26 2014 - 2:26pm - 0 comments - 0 attachments

Data Protection

... can be taken to protect it. This will usually involve encryption , and should only be undertaken by experienced technical personnel; if encryption goes wrong, the data will likely be lost forever. ...

ITS Service - Anonymous - Oct 10 2014 - 1:57pm - 0 comments

Summary of CSU and HSU Requirements for Storage of Level 1 Data

... implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

Page - Anonymous - Sep 5 2014 - 2:56pm - 0 comments - 0 attachments

Is email a safe way to send medical (HIPAA) data?

... health information (PHI) be encrypted using strong encryption . Messages containing PHI that are transmitted over unencrypted ...

FAQ - bjt7001 - Feb 12 2013 - 1:53pm - 0 comments - 0 attachments

How confidential is the data input and analysis process?

... networked computers. Data transmission is secure. Encryption is used for all communications and data transfers related to ...

FAQ - Anonymous - Aug 27 2013 - 11:11am - 0 comments - 0 attachments

Secure Wireless :: Security Requirements

... 3) Your device must be capable of decoding AES encryption . 4) Your HSU User Name and Password must not be ...

Page - bjt7001 - Sep 22 2014 - 2:16pm - 0 comments - 0 attachments

feedback