spacer

CDC HomeHIV/AIDS > HIV/AIDS Prevention > Topics > Statistics and Surveillance > Guidelines > Technical Guidance for HIV/AIDS Surveillance Programs, Volume III

Technical Guidance for HIV/AIDS Surveillance Programs, Volume III: Security and Confidentiality Guidelines
space
arrow Contributors
space
arrow Introduction
space
arrow Attachment A
space
arrow Attachment B
space
arrow Attachment C
space
arrow Attachment D
space
arrow Attachment E
space
arrow Attachment F
space
arrow Attachment G
space
arrow Attachment H
 
LEGEND:
PDF Icon   Link to a PDF document
Non-CDC Web Link   Link to non-governmental site and does not necessarily represent the views of the CDC
Adobe Acrobat (TM) Reader needs to be installed on your computer in order to read documents in PDF format. Download the Reader.
spacer spacer
spacer
Skip Nav spacer
Existing Protections
spacer
spacer

HIV/AIDS surveillance is the joint responsibility of many participants in the health care system. Among the participants are state and local health department surveillance programs; public and private institutions providing clinical, counseling, and laboratory services; individual health care providers; persons at risk for HIV infection; and persons with HIV or AIDS. The ability of state and local surveillance programs to collect, store, use, and transmit sensitive HIV/AIDS case information in a secure and confidential manner is central to the program's acceptability and success. The importance of data security has been a long-established component of these guidelines. Various federal and state statutes, regulations, and case law provide legal protection of HIV/AIDS surveillance information. Among these safeguards are a right to informational privacy under the Fifth and Fourteenth Amendments to the Constitution, and federal assurance of confidentiality (under § 308(d) of the Public Health Service Act and various state and local protections).

The dynamic nature of information technology is a critical consideration in developing security policies and procedures that will be used to meet the requirements and standards described in these guidelines. The HIV/AIDS surveillance system was created before the development of technologies such as laptops, portable external storage devices, and the Internet, all of which can be potential sources for security breaches. Now, all state and local health departments should routinely assess the changing world of computer technology and adjust security policies and procedures to protect against potential new risks. CDC is available to provide technical consultation on technology and security issues.

Last Modified: February 16, 2006
Last Reviewed: February 16, 2006
Content Source:
Divisions of HIV/AIDS Prevention
National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention
spacer
spacer
spacer
Home | Policies and Regulations | Disclaimer | e-Government | FOIA | Contact Us
spacer
spacer
spacer Safer, Healthier People
spacer
Centers for Disease Control and Prevention, 1600 Clifton Rd, Atlanta, GA 30333, USA
800-CDC-INFO (800-232-4636) TTY: (888) 232-6348, 24 Hours/Every Day - cdcinfo@cdc.gov
spacer USA.gov: The U.S. Government's Official Web PortalDHHS Department of Health
and Human Services