Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 4: Handling PHI
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
1. Responding to E-Mail Requests Containing PHI and PII Back
3 of 6
Next

Responding to E-Mail Requests Containing PHI and PII

In general, confidential information may be transmitted over the Internet (external e-mail)
only if:

  • An acceptable mode of encryption is used to protect the confidentiality and integrity of the data (i.e. Voltage Secure Mail, agency approved e-mail encryption software
  • An authentication or identification procedure is employed to assure that both the sender and recipient of the data are known to each other and are authorized to receive and decrypt the information.
 
Instructions Click or select the NEXT button above to continue.
Previous Module
  Next Module