When accessing Restricted information, specific rules apply in terms of both your device and the network. Be sure to understand these requirements before accessing the information, whether you are the primary owner or using shared information for legitimate business purposes. Unsafe access may expose the information to possible compromise.
Device Requirements
- Devices used to access Restricted information must be password-protected.
- Devices used to store Restricted information must also be encrypted.
- Unless required for a legitimate business purpose, members of the Princeton community are forbidden from collecting, using, or storing Restricted, personally identifiable information on their personal devices.
Secure Network Connection Options
The wired campus network affords the highest level of security, and is the preferred choice when accessing Restricted information. Regardless of your location, you must use a secured network for this classification type. As such, use of PUWireless or PUVisitor are not permitted.
On Campus |
|
---|---|
Off Campus |
|
Your Responsibilities
Restricted information must be afforded the greatest amount of care. Only access this data on an as-needed basis and take the steps required to prevent unauthorized access. We encourage you to review the complete Information Security Policy and learn more about your responsibilities.
Have questions? Contact the Help Desk for assistance.