Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 2: Your Responsibility
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
1. How You Can Help Back
2 of 3
Next

Your Responsibility

As a user of the HHS Enterprise computer systems, you may be authorized to read, enter, or update information. You have the responsibility to use the information resources only for the purposes for which you have been approved. You must also comply with all defined security measures.

You are responsible for-and will be held accountable for-all actions performed under your user identification (user ID). You must protect your area by keeping unauthorized individuals away from your equipment and data (including printed documents). Check your agencies Security Policies and Procedures pertaining to the use of cell phones with cameras. In addition, you must report all situations where you believe an information security vulnerability or violation may exist, according to your normal problem reporting.

a woman looking at a computer screen
Instructions Click or select the NEXT button above to continue.
Previous Module
  Next Module