Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 6: Protecting Resources & Information
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
2. Protecting Information Back
4 of 11
Next

Protecting Against Unauthorized Access

Any User who becomes aware of an incident of unauthorized access or/of confidential information must report such to the agency Information Security Officer (ISO), Privacy Officer, or designee as soon as possible.

[Source: ESPSG – Acceptable Use]

Security incidents include, but are not limited to: virus, worm, and Trojan detection, unauthorized use of computer accounts and systems, and improper use of resources as outlined in these standards related to E-mail, Internet, and Acceptable Use.

[Source: ESPSG – Incident Management]

Instructions Click or select the NEXT button above to continue.
Previous Lesson
  Next Lesson