Princeton's Information Security policy applies to everyone. This includes faculty, staff, students, and others granted access to protected University information. Whether a personal or University-issued device is used to conduct University business, you remain subject to the same information security policy and procedures.
Protecting Princeton Information on Your Device
Note that unless required for a legitimate business purposes, members of the Princeton community are forbidden from collecting, using, or storing Restricted, personally identifiable information on their devices.
Device Security Requirements
When information is being stored, accessed, or used on your personal device for approved purposes, you must take steps to protect it from possible cyber attacks, spam, and other threats.
Safeguard Your Device
|Set your password.||Per University policy, any device used to access information that is Restricted, Confidential, or Unrestricted within Princeton must be password-protected.|
|Scan your device.||Scan your mobile device, laptop, or desktop for personal information or vulnerabilities.|
|Use virus protection.||See a list of recommended antivirus products.|
|Be safe with email.||Avoid storing or sending Princeton information via email or exchange. Never click on links in emails or download attachments from an unknown source. See more security basics.|
|Patch & update.||Regularly update your Windows or Mac device, along with any software you use regularly, to defend against malware and vulnerabilities.|
|Back up.||OIT maintains a list of recommended backup options for University and personal devices. Backups containing Restricted information must be encrypted.|
|Travel light.||When traveling, limit the amount of information stored on your mobile or laptop device, and consider bringing a University loaner device. See more international travel rules.|
- Need to send or share Restricted or Confidential information? Use Secure Send.
- Not sure you're safe? Scan your mobile device, laptop, or desktop for personal information or vulnerabilities.
- Think your device is compromised? Report your concern immediately.