What are the rules for storing Confidential Information on my computer?

Level 2 or 3 Confidential Information must be protected on your computer. Disk or file encryption are examples of suitable protection. Your personal device must be configured to restrict access to the person who uses the device. Smart phones and tablets must be configured to require a PIN or password for access, and must be set to automatically wipe their storage after 10 bad PIN or password guesses.


Reminder: Level 4 high risk confidential information must never be stored on your computer or storage device.