HHS Computer Usage and
Information Security Training
Module 4: Handling PHI
1. Responding to E-Mail Requests Containing PHI and PII
1 of 6
Click or select the
NEXT
button above to continue.