Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

What are the requirements for storage of Level 1 data?

... implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

FAQ - Anonymous - Jul 26 2013 - 12:22pm - 0 comments - 0 attachments

Security :: Tools and Resources

... in hardware, software, or a combination of both. Encryption . Encryption converts data into a secure form that can be safely moved around ...

Page - bjt7001 - Apr 17 2015 - 2:05pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: HSU-Owned Windows 7/Vista Systems

... for Security type. Select AES for Encryption type. Check Start this connection automatically . ... WPA2-Enterprise for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the ...

Page - Anonymous - Nov 26 2014 - 3:13pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: Windows 7/Vista

... for Security type. Select AES for Encryption type. Check Start this connection automatically . ... for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the network ...

Page - bjt7001 - Nov 26 2014 - 3:26pm - 0 comments - 0 attachments

Data Protection

... can be taken to protect it. This will usually involve encryption , and should only be undertaken by experienced technical personnel; if encryption goes wrong, the data will likely be lost forever. ...

ITS Service - Anonymous - Oct 10 2014 - 2:57pm - 0 comments

Summary of CSU and HSU Requirements for Storage of Level 1 Data

... implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

Page - Anonymous - Sep 5 2014 - 3:56pm - 0 comments - 0 attachments

Network Folders :: WebDAV Connections to Network Folders - Linux KDE

... /folders/HSUUserName x Create an icon x Use encryption (Network Folder) ...

Page - rrw1 - Mar 13 2013 - 1:27pm - 0 comments - 0 attachments

Is email a safe way to send medical (HIPAA) data?

... health information (PHI) be encrypted using strong encryption . Messages containing PHI that are transmitted over unencrypted ...

FAQ - bjt7001 - Feb 12 2013 - 2:53pm - 0 comments - 0 attachments

Policy :: Additional Documents: ICSUAM POLICY 8065.0 - Information Asset Management

... HSU Procedures :   HSU Procedure: Encryption Support Instructions   Guidelines:   none ...

Page - Anonymous - May 4 2015 - 3:25pm - 0 comments - 0 attachments

How confidential is the data input and analysis process?

... networked computers. Data transmission is secure. Encryption is used for all communications and data transfers related to ...

FAQ - Anonymous - Aug 27 2013 - 12:11pm - 0 comments - 0 attachments

feedback