Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Walk-In: Library 101 • Hours
Reset HSU Password
System Status


Security :: Procedure for Submitting Academic Professionals (Unit 4) Information System Access and Compliance Forms

While Humboldt State University academic professionals may have exposure to records that contain personally identifiable information and/or other confidential data, they are PROHIBITED from viewing such data in any University record without prior written approval by the campus President or Vice President for Administrative Affairs. 



Security :: Simple Ways to Lock Your Smartphone



If you leave your smartphone unattended for a while – or worse, if it’s lost or stolen - you don’t want to make it easy for someone to go through the contents. Setting your smartphone lock means that a PIN or password is required for access after an inactive period. This is the single easiest way to thwart the efforts of would-be thieves to steal your personal information through opportunistic unauthorized access.

example photos of smartphones


Mobile Device Security

Ten Steps to Securing Your Mobile Device

Much of the following information was put together by Educause, and we're reproducing it here, along with some HSU-specific information, to give you an easy-to-follow list of do's and don'ts to keep your mobile devices protected against hacking and other security issues.


Security :: HSU-Owned Devices :: Approved Antivirus Software

Antivirus software protects computers and computer-based mobile devices from being infected by viruses, spyware, worms, Trojans, and a long list of other malware that can damage or destroy data.


Security :: Security Alert :: Mac users must update Mac OS X immediately

A Java vulnerability has caused at least 600,000 Macs worldwide to become infected by the Flashback Trojan without the user's knowledge or consent. Mac users must patch their OS and take other appropriate actions as described below to secure their computers.


Policy :: CSU / HSU Information Technology Policies

CSU / HSU Information Technology and Security Policies


Security :: Secure Disposal of Paper & Electronic Media

Shredded document re-assembledAny data storage medium - paper, computer, copier, hard drive, tablet, smartphone - should be treated as if it contained protected data when it comes to disposal of that storage device. It's simply too easy for thieves to piece digital or analog data back together again and make use of the results for their own nefarious purposes.


Security :: Paper Shredding

Under State Civil Code 1798.80-82, paper documents containing personally identifiable or confidential information MUST be shredded. Using standard office shredders is acceptable for the desctruction of documents other than those containing credit card numbers. The Payment Card Industry Security Standards require that any document which contains credit card numbers must be destroyed using the cross-cut shredding method.



11-2011 [EM: P11-11] HSU Data Center and Telecommunications Physical Access Policy
11-2011 [EM: P11-10]