See the Glossary for more terms.
Some links will work for NIAID staff only.
This standard operating procedure (SOP) includes the following sections: Purpose, Procedure, Contacts, and Links.
To ensure the protection of personally identifiable, sensitive, or confidential information resulting from NIH-supported research or belonging to the federal government.
Grantees, contractors, and NIH staff must protect information systems containing identifiable, sensitive, or confidential data, whether electronic or hard copy.
This requirement pertains to data belonging to the federal government or resulting from NIH-supported research. All awardees and NIH staff must protect these data to prevent release or loss.
Some NIH-supported research is also covered by the Federal Information Security Management Act (FISMA; page 48). FISMA applies to contractors and grantees when the government owns the data.
NIH IT Service Desk, 301-496-4357
NIAID's Information Systems Security Officer
If you have knowledge to share or want more information on this topic, email email@example.com with this link and your message. Thanks for helping us clarify and expand our knowledge base.
Maintaining Confidentiality in NIH Peer Review
Guide for Identifying Sensitive Information
NIH and HHS Encryption Policies, Guidance, and Tools
Protecting the Security of NIH Grant Applications
Secure One HHS - Protecting America's Health and Human Services
Last Updated February 20, 2015
Last Reviewed August 07, 2015