remote work tech

1. Personal devices should be avoided when conducting work tasks that involve Protected Health Information (PHI).

2. It is HIGHLY RECOMMENDED to encrypt all emails containing PHI.

How to Encrypt an External Email

cloud database data privacy protection lock

3. Encrypt and password protect all devices such as PCs, laptops, tablets, and cell phones that may be used to access PHI.

4. Always use a Virtual Private Network (VPN) when accessing the company network remotely.

5. Protect PHI from friends and family in your house by using a privacy screen on your computer.

remote work team

6. Protect PHI by locking your PC or laptop screen when walking away.

7. It is HIGHLY RECOMMENDED to never print PHI documents in your remote environment. If necessary, all forms of PHI must be kept safe in a lockable file cabinet and a complete inventory of all files must be maintained.

8. Keep in mind phishing attempts are more common when working remotely.

spam bot email

If you would like general information about HIPAA, click to view the HIPAA page. Or, if you would like information regarding Travis County’s HIPAA Policies, or to report a suspected privacy concern, contact the Travis County Compliance and Privacy Officer