Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 4: Handling PHI
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
1. Responding to E-Mail Requests Containing PHI and PII Back
2 of 6
Next

Responding to E-Mail Requests Containing PHI and PII

When you receive e-mail requesting information that contains PII or PHI it is important that you know the acceptable ways to respond.

E-mail encryption protects private, sensitive, and valuable information communicated via e-mail.  Encryption is the only secure method for sending communication over the Internet or Internal Network. If your agency uses Voltage Secure Mail, this is the method to use for internal or external e-mail communication. If your agency does not have Voltage Secure mail, check with your agency Information Technology personnel for e-mail encryption software available to secure e-mail communication with consumers, the general public, or co-workers. Do Not place PHI or PII in the subject line of any e-mail.

a stack of several file folders. The folder at the top of the stack has the word confidential stamped on it.
Instructions Click or select the NEXT button above to continue.
Previous Module
  Next Module