Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 6: Protecting Resources & Information
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
2. Protecting Resources Back
11 of 11
Next

Portable Computing Devices

When using a portable computing device (e.g., laptop, Palm Pilot, BlackBerry, USB devices, etc.) to access agency data, you must take precautions to ensure that mobile computing does not compromise the security of the systems being used or data therein. To ensure the security of the device, implement one or both of the following standards:

  • A password-protected sign-on screen requirement for mobile equipment
  • A mechanism to encrypt business sensitive or confidential data (PII or PHI). Use whole disk encryption such as PGP where appropriate (e.g. laptops, tablets, desktops)
a woman using a pda device.
Instructions Click or select the Next Lesson button to continue.
Previous Lesson
  Next Lesson