Definitions from Princeton's Information Security Policy


Approval, permission

The function of establishing an individual’s privilege levels to access and/or handle information.
Availability Accessibility Ensuring that information is ready and suitable for use.
Confidential /
Private, limited Ensuring that information is kept in strict privacy.
Integrity Accurate, complete, consistent Ensuring the accuracy, completeness, and consistency of information.
Unauthorized access Breach Looking up, reviewing, copying, modifying, deleting, analyzing, or handling information without proper authorization and legitimate business need.
Restricted information Protected information Information with a high confidentiality level that requires special protection for legal and/or policy reasons.
University information University data Information that Princeton University collects, possesses, or has access to, regardless of its source.  This includes information contained in hard copy documents or other media, communicated over voice or data networks, or exchanged in conversation.  

Other Useful Terms

Access Use, handle Looking up, reviewing, copying, modifying, deleting, analyzing, or otherwise handling information.
Encrypt Cipher Cryptographic transformation of plaintext into cipher text to conceal its meaning.
Exposure Leak, compromise When information has been made accessible / released to an unauthorized party.
External devices Storage, external drive Storage and other devices not housed within a computer, such as USB devices or external hard drives.
Hard copy Physical copy, permanent reproduction Printed or otherwise permanent reproduction of data.
Information at rest Data at rest, stored data, inactive data Data stored in databases, programs, the Information Warehouse or elsewhere.
Information in transit Data in motion, information in motion Data being accessed over Princeton's network.
Soft copy Digital copy Unprinted, editable data file in an email, computer display or other format.