Protection Level: HighConfidential information includes a range of data that requires safe handling and protection. It is not intended to be shared freely and you must take care to safeguard it. 

Summary: Handling Confidential Information

Store (Data at Rest) Encryption not required, but care must be taken to protect information integrity
Share (Data in Transit)

Information must be encrypted

Access Device must be password-protected
Physical (Hard) Copies

Identification: Mark documents as “Confidential”; Protection: Store documents in locked locations. Place printers and FAX machines in locked areas.

Have Questions? Suspect a Compromise?

If you suspect that Confidential information may have been compromised, report your concern to the Help Desk immediately. The Help Desk is also available to assist with any questions concerning the proper classification of Princeton information.

Includes:

  • Non-Restricted info in personnel files
  • Donor records
  • Internal memos, emails,  forms, and non-public business documents
  • Information governed by NDA agreements
  • Attorney-client communications
  • Digital copies of signatures
  • Info obtained via a University system requiring a user name and password