Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 2: Your Responsibility
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
1. How You Can Help Back
3 of 3
Next

Computer Usage Agreement and Security Privacy Agreement

a man holding a document sitting with his back facing his computer.The purpose of Computer Usage Agreement (CUA) and Security Privacy Agreement (SPA) is to inform you of your responsibilities concerning the use of HHS information resources. This agreement applies to all persons using HHS information resources, whether employed by an HHS Agency or not, and pertains to all state-owned or controlled information resources (referred to in this agreement as "Information Resources").

"HHS","HHS Agency" or "HHS Agencies" include the Health and Human Services Commission, Department of Aging and Disability Services, Department of Family and Protective Services, Department of State Health Services, Department of Assistive and Rehabilitative Services, and/or any component part thereof. "Information resources" means the procedures, equipment, and software that are employed, designed, built, operated, and maintained to collect, record, process, store, retrieve, display, and transmit information, and associated personnel including consultants and contractors. Tex. Govt. Code §2054.003(7) "Information resources" also includes "information resources technologies," which are defined as "data processing and telecommunications hardware, software, services, supplies, personnel, facility resources, maintenance, and training." Tex. Govt. Code §2054.003(8)

In addition, Confidential Information includes patient/client identifying information (PII), patient/client medical information (PHI), or any information (patient or otherwise) that is classified confidential by federal or state law. You may have access to some or all of this confidential information through a computer system or through your associated activities with HHS Systems. Confidential Information is valuable and sensitive, and is protected by law and by HHS policies. The intent of these laws and policies is to ensure that confidential information will only be used as necessary to accomplish the organization's mission. As a user of HHS systems, you are required to conform to applicable laws and HHS policies governing confidential information.

[Source: ESPSG – Acceptable Use]

Instructions Click or select the Next Module button to continue.
Previous Module
  Next Module