Cisco CloudCenter: Get the Hybrid IT Advantage

Sensitive Information

Definition - What does Sensitive Information mean?

Sensitive information refers to privileged or proprietary information that only certain people are allowed to see and that is therefore not accessible to everyone. If sensitive information is lost or used in any way other than intended, the result can be severe damage to the people or organization to which that information belongs.

Sensitive information may also be called a sensitive asset.

Techopedia explains Sensitive Information

Some examples of sensitive information are as follows:

  • Personal information, including Social Security Number and bank credentials
  • Trade secrets
  • System vulnerability reports
  • Pre-solicitation procurement documentation, including work statements
  • Computer security deficiency reports

According the Computer Security Act of 1987, organizations must be held responsible for protecting their own sensitive information by providing one or more of the following:

  • Confidentiality: Sensitive information should only be accessible to those who are allowed to see it, not just those who wish to see it.
  • Integrity: Unauthorized users should not be able to make changes to the information, thus compromising its integrity.
  • Availability: Information must be accessible during a certain time and may not be destroyed during that time frame. People with permission to view the data must be able to view it.

The Computer Security Act also requires federal agencies to identify their computer systems that contain sensitive information, establish training programs to increase security awareness, and establish a plan for the security of each computer system with sensitive information.

Sensitive information is not the same as classified information, which is a type of sensitive information in which access is governed by law.

Some sensitive information is called sensitive unclassified information. This is information that needs to be protected, but does not require strict classifications, such as those used for national security information.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.