Confidential information includes a range of data that requires safe handling and protection. It is not intended to be shared freely and you must take care to safeguard it.
Summary: Handling Confidential Information
|Store (Data at Rest)||Encryption not required, but care must be taken to protect information integrity|
|Share (Data in Transit)||
Information must be encrypted
|Access||Device must be password-protected|
|Physical (Hard) Copies||
Identification: Mark documents as “Confidential”; Protection: Store documents in locked locations. Place printers and FAX machines in locked areas.
Have Questions? Suspect a Compromise?
If you suspect that Confidential information may have been compromised, report your concern to the OIT Support & Operations Center (SOC) immediately. The OIT Support & Operations Center is also available to assist with any questions concerning the proper classification of Princeton information.
- Non-Restricted info in personnel files
- Donor records
- Internal memos, emails, forms, and non-public business documents
- Information governed by NDA agreements
- Attorney-client communications
- Digital copies of signatures
- Info obtained via a University system requiring a user name and password