Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
"" Module 1: Introduction
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
"" 1. Purpose and Content of Training Back
3 of 3
Next

Content of the Training

HHS Enterprise Security and Computer Usage training will provide information in the following areas:

  • Personal use of equipment and the Internet
  • Passwords
  • Protecting individually identifiable health information during electronic transmission and at rest (on disk or storage)
  • Protecting confidential or sensitive information during electronic transmission and at rest
  • Downloading software to your desktop
  • Destruction of old computer equipment, disks, and CDs
  • Network access
  • Penalties and disciplinary action that will result if you violate a security policy
As you review the sections of the course, if you want a more detailed explanation, a notation will appear in each section giving the reference to the manual where it can be found. For example:[Source: ESPSG - Protection Against Malicious Code].
Instructions Click or select the Next Lesson button to continue.
Previous Module - inactive
  Next Lesson