Store Information

Storing information properly is one of the best ways to protect it, whether you own the information or need to use it for a specific purpose. See the table below to understand how classification affects University storage requirements. Then use the resources in this section to store it safely.

Encryption Requirements by Classification

Restricted Information must be encrypted
Confidential Encryption not required, but recommended
Unrestricted within Princeton Encryption not required, but recommended
Public No requirements

Storage Tools

Network Drive

Approved for the storage of all classification types

Google Drive

NOT approved for the storage of Restricted information. Permitted for all other classification types.

Dropbox for Princeton NOT approved for the storage of Restricted information. Permitted for all other classification types.

Microsoft 365

Approved for the storage of documents containing Restricted information, with the exception of protected health information (as defined by HIPAA). 
External Drive

Approved for the storage of all classification types. Note the encryption requirements above.

Laptops / Desktops Approved for the storage of all classification types. Note the encryption requirements above.

Note: Information Retention and Disposition

It is good practice to store only the information you need to do your work. Once it is no longer needed, archive or destroy it in an authorized manner, and remove it from all personal devices. Records Management outlines the University's retention and disposition schedules. Finance & Treasury defines the standards for financial record retention.

Your Responsibilities

1 Protect our information’s confidentiality, integrity, and availability.
2 Handle information appropriately.
3 Discard information appropriately.

We encourage you to review the complete Information Security Policy and learn more about your responsibilities.

Have questions? Contact the Service Desk for assistance. If you suspect that Princeton information or your device may have been compromised, it is imperative that you report your concern immediately.