Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 6: Protecting Resources & Information
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
2. Protecting Resources Back
3 of 11
Next

Protecting Information During Transmission

Data files, system interfaces, and batch processes with Confidential HHS material or individuals' names in conjunction with their sensitive PII and PHI must be encrypted or otherwise protected as required by rule, regulation, or law during all data transmissions using agency approved secure transfer methods (i.e., SFTP, SSL).

[Source: ESPSG – Internet/Intranet/Extranet Use]

hard drive showing movement in the background representing the use of encryption
Instructions Click or select the NEXT button above to continue.
Previous Lesson
  Next Lesson