Most of us deal with sensitive information on a daily basis whether it's our own personal information or confidential information about staff, faculty, students, donors, or alumni. It is important to consider how we store and access this confidential information to ensure that it is protected.
There are 3 major areas covered by Appendix B:
- Protecting confidential information on electronic devices
- Protecting confidential information in printed materials
- Protecting confidential information in email or instant messaging
In the age of identity theft, we must be sure that any confidential information we have access to is protected against theft. That means that we are responsible not only for the protection of our own identity information, but also for the protection of the confidential information to which we have access.