Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Data Protection

Security :: Protected Information Standards

Humboldt State University has established a set of data protection and security standards that comprise specific configuration settings in order to meet the requirements of the CSU Data Classification Standards for computers and other storage devices containing


Be Sure to Secure Your Multi-Function Devices

Multi-Function devices (MFDs) may look like photocopiers, but they're way more powerful than a single-function device. With the ability to print, scan, and fax as well as copy, an internal hard drive, and network and Internet connectivity, they are a security disaster waiting to happen.

If you have a Multi-Function Device in your work area, you need to understand the vulnerabilities and know your security responsibilities in regard to the data that passes through it. Read more abouit securing MFDs.

Frequently Asked Questions - Security :: Online Storage and Email

Q:  Why isn’t email secure for sending sensitive information?
A:  Email is not secure because there are no guarantees that the message will be delivered to or accessed by the intended person. Read the full FAQ
Q:  What risk questions should I ask before storing email or HSU data in a location other than its secure and officially authorized HSU location?
A:  Series of risk questions to consider before storing data in other than its official location. Read the full FAQ
Q:  What are the requirements for storage of Level 1 data?
A:  Policy guidance for storing Level 1 data. Read the full FAQ



Document Storage Recommendations

  Departmental access Files for your classes

"You Only" files


Security :: For Staff and Faculty

Humboldt State University's Information Security Office works with the campus community to secure system and network resources and to protect the confidentiality of student, faculty, and staff information. If you have ideas on improving HSU's information security, contact us at

To report information security violations or concerns, please send email to the appropriate address below:


Security :: Phishing Examples

Here are a few examples of phishing emails we have received at Humboldt State University. What would you have done if you'd received any of these emails? Are there tell-tale signs you would have picked up?


Security :: Spam and Phishing Scams

Phishing scams are attempts by hackers and cybercriminals to steal personal information or hijack computing resources for nefarious purposes.