Confidential information includes a range of data that requires safe handling and protection. It is not intended to be shared freely and you must take care to safeguard it.
Summary: Handling Confidential Information
|Store (Data at Rest)||Encryption not required, but care must be taken to protect information integrity|
|Share (Data in Transit)||
Information must be encrypted
|Access||Device must be password-protected|
|Physical (Hard) Copies||
Identification: Mark documents as “Confidential”; Protection: Store documents in locked locations. Place printers and FAX machines in locked areas.
Have Questions? Suspect a Compromise?
If you suspect that Confidential information may have been compromised, report your concern to the Help Desk immediately. The Help Desk is also available to assist with any questions concerning the proper classification of Princeton information.
- Non-Restricted info in personnel files
- Donor records
- Internal memos, emails, forms, and non-public business documents
- Information governed by NDA agreements
- Attorney-client communications
- Digital copies of signatures
- Info obtained via a University system requiring a user name and password