Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 6: Protecting Resources & Information
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
4. Summary Back
2 of 2
Next

Summary

You've completed the first part of HHS Computer Usage and Information Security Training. This training will also serve as your annual recertification process. Now that you've taken this course, you should understand the guidelines and policies related to:

 

a male employee wearing a headset and smiling

  • Personal use of equipment and the Internet
  • Passwords
  • Protecting PHI and other sensitive information during electronic transmission and at rest
  • Downloading software to your desktop
  • Destruction of old computer equipment, disks, and CDs
  • Network access
  • Penalties and disciplinary action that will result if you violate a security policy
Instructions Click or select the Next Module button to continue.
Previous Lesson
  Next Module