- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
... health information (PHI) be encrypted using strong encryption . Messages containing PHI that are transmitted over unencrypted ...
FAQ - bjt7001 - Feb 12 2013 - 1:53pm - 0 comments - 0 attachments
You'll find descriptions of the encryption programs supported by HSU on the ITS website , along with ... , or the Information Security Office first. (What encryption programs does HSU support?) ...
FAQ - Anonymous - Feb 11 2013 - 4:41pm - 0 comments - 0 attachments
To protect your data optimally, use strong encryption to protect sensitive information stored in your Dropbox, and ...
FAQ - Anonymous - Jan 30 2012 - 3:00pm - 0 comments - 0 attachments
... (confirming that you are who you say you are) and encryption to ensure only authorized users can read data transmitted ...
FAQ - Anonymous - Sep 12 2011 - 9:52am - 0 comments - 0 attachments
We wouldn't advise it. Encryption is a complex process that involves scrambling data in such a way ... with a special key that you create as part of the encryption process. If you lose that key, your data is likely gone for good. An experienced computer technician can handle the encryption and ensure that there is fall-back way to access your data if you ...
FAQ - Anonymous - Sep 12 2011 - 9:50am - 0 comments - 0 attachments