See the Glossary for more terms.
Some links will work for NIAID staff only.
This standard operating procedure (SOP) includes the following sections: Purpose, Procedure, Contacts, and Links.
To ensure the protection of personally identifiable, sensitive, or confidential information resulting from NIH-supported research or belonging to the federal government.
Grantees, contractors, and NIH staff must protect information systems containing identifiable, sensitive, or confidential data, whether electronic or hard copy.
This requirement pertains to data belonging to the federal government or resulting from NIH-supported research. All awardees and NIH staff must protect these data to prevent release or loss.
Some NIH-supported research is also covered by the Federal Information Security Management Act (FISMA; page 48). FISMA applies to contractors and grantees when the government owns the data.
NIH IT Service Desk, 301-496-4357
NIAID's Information Systems Security Officer
If you have knowledge to share or want more information on this topic, email email@example.com with this link and your message. Thanks for helping us clarify and expand our knowledge base.
A Statement from the NIH Director, Elias A. Zerhouni, M.D., on Encryption and Data Security
Encryption, Data Security, and NIH Peer Review (memo to staff)
Guide for Identifying Sensitive Information
NIH and HHS Encryption Policies, Guidance, and Tools
NIH Renews Focus on Protecting Sensitive Data and Information Used in Research
Responding to Loss of Sensitive Data and Other Information in NIH Grant Applications
Secure One HHS - Protecting America's Health and Human Services
Secure One HHS Memorandum
Last Updated August 14, 2014
Last Reviewed August 14, 2014