Share Restricted Information

Restricted information is subject to the greatest level of protection. As such, it is important to understand the rules that govern the sharing of that information with others—whether within the University community or with others to serve a legitimate business purpose.

Rules for Sharing Restricted Information

When to Share

Only to meet a legitimate business need or as required by law

With Whom Specific parties within Princeton, as needed; Others only as necessary, with the recipient's agreement to safeguard confidentiality and not re-disclose the information except when legally required
How to Share Use one of Princeton's secure file sharing services.
Network Options Wired or Eduroam on campus or via GlobalProtect virtual private network (VPN) off campus
Security Solutions to properly secure information include: encryption, access controls, multi-factor authentication, and network isolation.

Your Responsibilities

Sharing of Restricted information within the University may be permissible if necessary to meet the University’s legitimate business needs. Except as otherwise required by law (or for purposes of sharing between law enforcement entities), you may not disclose Restricted information outside of the University, including to contractors, without the proposed recipient’s prior written agreement:

  1. To take appropriate measures to safeguard the confidentiality of the Restricted information.
  2. Not to disclose the Restricted information to any other party for any purpose absent the University’s prior written consent or a valid court order or subpoena.
  3. To notify the University in advance of any disclosure pursuant to a court order or  subpoena unless the order or subpoena explicitly prohibits such notification.    

In addition, the proposed recipient must abide by the requirements of Princeton's Information Security Policy. Any sharing of Restricted information within the University must comply with the Information Security Policy. We encourage you to review the complete Information Security Policy and learn more about your responsibilities.

Have questions? Contact the Help Desk for assistance.