Installation and Use

Download Identity Finder

Enterprise Edition

Identity Finder Enterprise Edition is available only to USU faculty and staff for use on USU-owned computers. To download Identity Finder Enterprise Edition:

  1. Download Identity Finder Enterprise Edition:
    • Windows (Windows 2000 with SP3 or later, Windows XP with SP1 or later, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008)
    • Mac  (Mac OS 10.4 or higher on Intel based hardware platforms)

Departmental IT Support

How to become an Identity Finder Admin for your area?

  1. To become an admin for your area please contact Blake Rich, to get an admin account structured. 
  2. Adhere to the University Information Privacy Policy when conducting administrative duties.
  3. Each area can have various types of sensitive data located in their areas.  Being knowledgeable about your own department's data usage and business needs will greatly assist you in configuring the Identity Finder tool to identify all types of sensitive data in that area.
  4. Strategize within your departments to determine a deployment plan.

How will my devices be audited?

The PCI Compliance Officer will audit Identity Finder reports verifying no customer credit card data is being stored. Every device needs to be registered in iPAM in order to conduct an accurate audit. Percentage numbers will be reported to Department Heads, Deans and President of the University.

Sensitive data is retained on the device?

Devices that contains University confidential information need to be managed and supported in accordance to the University's Information Security Policy 558, Computer Management Policy 551 and the Computer Management Procedures.

Important Privacy Notice

You may use this tool to search your own data and other files stored in your individual computer accounts on University-owned systems. A technician or administrator may use this tool to assist computer users in locating files that contain sensitive data and will work with computer users in securing and safeguard that information within his or her scope of responsibility as the technician.