Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Walk-In: Library 101 • Hours
Reset HSU Password
System Status


Security :: Data Management

The document linked below contains the current matrix of record types, data managers, and access grantors for protected information stored on campus systems. In line with the current draft Data Management policy (available on request), this document will be updated as and when assigned roles change. Additional content will be added as it becomes available.

Questions about the document and the draft policy should be addressed to


Security :: Protected Information Standards

Humboldt State University has established a set of data protection and security standards that comprise specific configuration settings in order to meet the requirements of the CSU Data Classification Standards for computers and other storage devices containing


Reporting phishing attacks helps everyone

Phishing emails are designed to trick users into clicking a link or opening an attachment that looks trusted (or appears to come from a trusted sender) but in fact have a very untrustworthy goal.


Phishing attacks can rob you of your identity, your money, or both. Read on to learn more about how crowdsourcing can help protect everyone.


Google :: Caveats for Users

Gmail Privacy Issues (Updated 5/1/14)

Google has ended its practice of scanning its users' Apps for Education accounts for advertising purposes after being sued by students and other Gmail users last year, the company announced Wednesday. There's more information on Google's enterprise blog at:


Identity Management Update

ITS is working on a major overhaul of the current home-grown identity management solution used across HSU systems. The goal is to improve or replace entirely the system used to create and manage user accounts and to uathorize, manage, and control user access to all IT resources on campus. This project will also clean up existing data in the identity management system, ensuring that University services are only made available to eligible individuals and that all eligible individuals have access to the IT resources they need to do their jobs.


ITS has recently issued an RFQ (Request for Quotation) in the ongoing search for a more structured approach to HSU's identity management system, which governs the IT resource access available to every individual associated with the University. Read more about the current status of the Identity Management project.


Security :: Third Party - Contract Language, Guidelines, Policies, & More

CSU policies provide direction and support for managing and guiding third party relationships and for granting access to various University resources. In support of those policies, HSU Information Security, Contracts and Procurement, and the Project Office have collaborated to deliver this list of useful resources; the HSU Guidelines and contract language are particularly important in the context of working with third parties.


Security :: Multifunction Copier/Printer Devices


Multi-Function Devices (MFDs) are much more powerful than their photocopier-like appearance implies. Their multi-functionality (fax, scan, copy, print) means that their internal hard drives store a great deal of data and, because the devices are connected to both the Internet and the network, that data is vulnerable without appropriate security measures in place. Read more about MFD security.

A Multi-Function Device (MFD) is a device that provides centralized printing, scanning, copying, and faxing functionality; HSU has a number of these devices in offices around campus. MFDs are both network- and Internet-connected, so in many ways they function in a similar fashion to a computer. For this reason, and because they are multipurpose devices, it's vital that they are appropriately configured and managed to protect the information that passes through them.


Frequently Asked Questions - Security :: Online Storage and Email

Q:  Why isn’t email secure for sending sensitive information?
A:  Email is not secure because there are no guarantees that the message will be delivered to or accessed by the intended person. Read the full FAQ
Q:  What risk questions should I ask before storing email or HSU data in a location other than its secure and officially authorized HSU location?
A:  Series of risk questions to consider before storing data in other than its official location. Read the full FAQ
Q:  What are the requirements for storage of Level 1 data?
A:  Policy guidance for storing Level 1 data. Read the full FAQ