What legal protections and security controls are available to protect the confidentiality of the data and to prevent unauthorized users?
CDC is sensitive to business concerns over issues of privacy and confidentiality and has taken precautions to ensure all data are transmitted securely. As a critical information system, Countermeasure Inventory Tracking leverages security services and protections for key CDC information systems. The services and protections provided by security mechanisms such as the Secure Data Network (SDN) include user identity management and authentication and authorization controls to ensure appropriate access to CRA Countermeasure Inventory Tracking data. Additionally, the privacy and security measures used by CRA Countermeasure Inventory Tracking facilitate compliance with various federal laws and regulations, including the Privacy Act of 1974, Federal Information Security Management Act of 2002 (FISMA), E-Government Act of 2002, and Homeland Security Presidential Directive 12 (HSPD-12).
Related Questions
- What legal protections and security controls are available to protect the confidentiality of the data and to prevent unauthorized users?
- How do you protect indigenous and traditional participants data and ensure security, privacy, and confidentiality?
- WHAT TYPES OF SECURITY MEASURES ARE IN PLACE TO PROTECT UNAUTHORIZED USERS FROM ACCESSING THE DATABASE?