1-7 Information Resources

Information security policies apply to all information, in any form, related to Postal Service business activities, employees, or customers that have been created, acquired, or disseminated using Postal Service resources, brand, or funding. Information security policies apply to all technologies associated with the creation, collection, processing, storage, transmission, analysis, and disposal of information. Information security policies also apply to all information systems, infrastructure, applications, products, services, telecommunications networks, computer-controlled mail processing equipment, and related resources, which are sponsored by, operated on behalf of, or developed for the benefit of the Postal Service.

Exhibit 1-7 shows examples of information technologies and the information they contain that are collectively known as information resources. Information resources may be referred to as technology solutions within the Technical Solutions Life Cycle (TSLC).

Exhibit 1-7 

Examples of Information Resources





Systems and Equipment

All multi-user computers and computer-controlled systems and their components.

Mail Processing Equipment (MPE)

All computer-controlled equipment and networks used in processing, distributing, and transporting the mail.

Single-User Computer Equipment

All computers and their components used by individuals.


All major items of equipment or their components associated with a computer system.


All programs, scripts, applications, operating systems, HTML, and related resources.

Data and Information

All information or data stored in digital format, or as a printed product of data stored in digital format.

Products and Services

All objects, processes, functions, and information delivered by, for, or under the brand of the Postal Service.

Network Facilities

All communications lines and associated interconnected communications equipment.


All electronic and nonelectronic media used for information exchange.