{"id":10988,"date":"2011-11-17T21:47:45","date_gmt":"2011-11-17T21:47:45","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/sensitive-information\/"},"modified":"2012-09-26T14:35:24","modified_gmt":"2012-09-26T14:35:24","slug":"sensitive-information","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/25260\/sensitive-information","title":{"rendered":"Sensitive Information"},"content":{"rendered":"
Sensitive information refers to privileged or proprietary information that only certain people are allowed to see and that is therefore not accessible to everyone. If sensitive information is lost or used in any way other than intended, the result can be severe damage to the people or organization to which that information belongs.<\/p>\n
Sensitive information may also be called a sensitive asset.<\/p>\n
Some examples of sensitive information are as follows:<\/p>\n
According the Computer Security Act of 1987, organizations must be held responsible for protecting their own sensitive information by providing one or more of the following:<\/p>\n
The Computer Security Act also requires federal agencies to identify their computer systems that contain sensitive information, establish training programs to increase security awareness, and establish a plan for the security of each computer system with sensitive information.<\/p>\n
Sensitive information is not the same as classified information, which is a type of sensitive information in which access is governed by law.<\/p>\n
Some sensitive information is called sensitive unclassified information. This is information that needs to be protected, but does not require strict classifications, such as those used for national security information.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Sensitive Information Mean? Sensitive information refers to privileged or proprietary information that only certain people are allowed to see and that is therefore not accessible to everyone. If sensitive information is lost or used in any way other than intended, the result can be severe damage to the people or organization to which […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,250],"class_list":["post-10988","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-information-assurance"],"acf":[],"yoast_head":"\n