Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 6: Protecting Resources & Information
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
2. Protecting Resources Back
5 of 11
Next

Electronic Access

Sensitive information, either in paper or electronic form, must be protected from unauthorized access or disclosure. Care should be taken to limit access. To prevent unauthorized access, employees should implement one or both of the following:

  • A password-protected screen saver requirement
  • Electronic procedures that terminate an electronic session after a predetermined time of inactivity
 
computer with monitor displaying a screensaver with black background and blue gridlines
Instructions Click or select the NEXT button above to continue.
Previous Lesson
  Next Lesson