Storing information properly is one of the best ways to protect it, whether you own the information or need to use it for a specific purpose. See the table below to understand how classification affects University storage requirements. Then use the resources in this section to store it safely.
Encryption Requirements by Classification
Restricted | Information must be encrypted |
---|---|
Confidential | Encryption not required, but recommended |
Unrestricted within Princeton | Encryption not required, but recommended |
Public | No requirements |
Storage Tools
Network Drive |
Approved for the storage of all classification types |
---|---|
Google Drive |
NOT approved for the storage of Restricted information. Permitted for all other classification types. |
Dropbox for Princeton | NOT approved for the storage of Restricted information. Permitted for all other classification types. |
Approved for the storage of documents containing Restricted information, with the exception of protected health information (as defined by HIPAA). | |
External Drive |
Approved for the storage of all classification types. Note the encryption requirements above. |
Laptops / Desktops | Approved for the storage of all classification types. Note the encryption requirements above. |
Note: Information Retention and Disposition
It is good practice to store only the information you need to do your work. Once it is no longer needed, archive or destroy it in an authorized manner, and remove it from all personal devices. Records Management outlines the University's retention and disposition schedules. Finance & Treasury defines the standards for financial record retention.
Your Responsibilities
1 | Protect our information’s confidentiality, integrity, and availability. |
---|---|
2 | Handle information appropriately. |
3 | Discard information appropriately. |
We encourage you to review the complete Information Security Policy and learn more about your responsibilities.
Have questions? Contact the Service Desk for assistance. If you suspect that Princeton information or your device may have been compromised, it is imperative that you report your concern immediately.