
Confidential information includes a range of data that requires safe handling and protection. It is not intended to be shared freely and you must take care to safeguard it.
Summary: Handling Confidential Information
Store (Data at Rest) | Encryption not required, but care must be taken to protect information integrity |
---|---|
Share (Data in Transit) |
Information must be encrypted |
Access | Device must be password-protected |
Physical (Hard) Copies |
Identification: Mark documents as “Confidential”; Protection: Store documents in locked locations. Place printers and FAX machines in locked areas. |
Have Questions? Suspect a Compromise?
If you suspect that Confidential information may have been compromised, report your concern to the OIT Support & Operations Center (SOC) immediately. The OIT Support & Operations Center is also available to assist with any questions concerning the proper classification of Princeton information.
Includes:
- Non-Restricted info in personnel files
- Donor records
- Internal memos, emails, forms, and non-public business documents
- Information governed by NDA agreements
- Attorney-client communications
- Digital copies of signatures
- Info obtained via a University system requiring a user name and password
- Residential floor plans