{"id":8499,"date":"2025-01-29T15:59:50","date_gmt":"2025-01-29T20:59:50","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/privacy-principles\/"},"modified":"2025-04-08T14:45:14","modified_gmt":"2025-04-08T18:45:14","slug":"privacy-principles","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/","title":{"rendered":"Privacy Principles"},"content":{"rendered":"<p>Collecting, using, and disclosing personal information are essential to Trinity&#8217;s operations, teaching, and research mission. As we carry out this vital work, we must prioritize privacy protections. Our college-wide privacy principles serve as aspirational guidelines and should, where possible, be embedded into new and existing business operations, research activities, technologies, and other processes involving personal information.<\/p>\n<h3 style=\"text-align: center\"><a href=\"https:\/\/www.trincoll.edu\/privacy-policy\/\">See Trinity&#8217;s Privacy Policy<\/a><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3>De-Identification<\/h3>\n<p>Where feasible, eliminate personal identifiers or apply techniques such as aggregation, pseudonymization, or other methods of anonymization.<\/td>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3>Minimum Necessary<\/h3>\n<p>Restrict the collection, access, and use of personal information to only what is essential for fulfilling a legitimate organizational objective.<\/td>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3>Transparency<\/h3>\n<p>Before collecting personal information, provide a clear and straightforward notice outlining how it will be used, including the specific purposes for its collection.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3><span style=\"font-family: inherit;font-size: inherit\">Limited Sharing<\/span><\/h3>\n<p>Share personal information with third parties only when it aligns with relevant regulatory and contractual obligations and when appropriate privacy and security measures are in place.<\/td>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3>Choice and Control<\/h3>\n<p>Where feasible and without compromising key institutional goals, provide individuals with clear choices and control over how their personal information is used, disclosed, or deleted.<\/td>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3>Responsible Use<\/h3>\n<p>Use personal information solely for the purposes collected, with the individual&#8217;s consent, or as mandated by law.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3 style=\"text-align: center\">Security Controls<\/h3>\n<p style=\"text-align: center\">Ensure adherence to Trinity&#8217;s Information Security policy for systems that store, process, or transmit personal information.<\/p>\n<\/td>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3>Stewardship<\/h3>\n<p>For each dataset containing personal information, appoint a responsible individual to ensure these principles are followed, regulatory and contractual obligations are met, and data accuracy is maintained.<\/td>\n<td style=\"width: 33.3333%;text-align: center;vertical-align: top;border-style: solid;border-color: #000000\">\n<h3>Retention and Deletion<\/h3>\n<p>Retain or archive personal information only for as long as necessary or required by law or agreement. Securely delete personal information when no longer needed, following Trinity&#8217;s General Records Schedule as a guide.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Collecting, using, and disclosing personal information are essential to Trinity&#8217;s operations, teaching, and research mission. As we carry out this vital work, we must prioritize privacy protections. Our college-wide privacy principles serve as aspirational guidelines and should, where possible, be embedded into new and existing business operations, research activities, technologies, and other processes involving personal [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":8451,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8499","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy Principles - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Principles\" \/>\n<meta property=\"og:description\" content=\"Collecting, using, and disclosing personal information are essential to Trinity&#8217;s operations, teaching, and research mission. As we carry out this vital work, we must prioritize privacy protections. Our college-wide privacy principles serve as aspirational guidelines and should, where possible, be embedded into new and existing business operations, research activities, technologies, and other processes involving personal [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-08T18:45:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/\",\"name\":\"Privacy Principles - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2025-01-29T20:59:50+00:00\",\"dateModified\":\"2025-04-08T18:45:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance Risk and Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Information Security Policy &amp; Standards\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Data Classification &amp; Collaboration\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Privacy Principles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Privacy Principles - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Principles","og_description":"Collecting, using, and disclosing personal information are essential to Trinity&#8217;s operations, teaching, and research mission. As we carry out this vital work, we must prioritize privacy protections. Our college-wide privacy principles serve as aspirational guidelines and should, where possible, be embedded into new and existing business operations, research activities, technologies, and other processes involving personal [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2025-04-08T18:45:14+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/","name":"Privacy Principles - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2025-01-29T20:59:50+00:00","dateModified":"2025-04-08T18:45:14+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/privacy-principles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Governance Risk and Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/"},{"@type":"ListItem","position":5,"name":"Information Security Policy &amp; Standards","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/"},{"@type":"ListItem","position":6,"name":"Data Classification &amp; Collaboration","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/"},{"@type":"ListItem","position":7,"name":"Privacy Principles"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=8499"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8499\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8451"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=8499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}