Skip Top Navigation
  • Who We Are

    • Leadership
    • Financials
    • Government Relations
    • Judicial Officer
    • Legal
    • Our History
    • Postal Facts
  • What We're Doing

    • Strategic Planning
    • Current Initiatives
    • Securing The Mail
    • Sustainability
    • Corporate Social Responsibility
    • Government Services
    • Postal Customer Council
    • Service Performance Results
  • Newsroom

    • National News
    • Local News
    • Testimony & Speeches
    • Broadcast Downloads
    • Events Calendar
    • Photo Gallery
    • Service Alerts
  • Careers

    • Career Opportunities
    • Working at USPS
    • How to Apply
    • Profile Login
  • Doing Business with Us

    • Suppliers
    • Licensing
    • Rights & Permissions
    • Auctions
    • Public Key Infrastructure
The image is the profile of an eagle's head adjoining the words United States Postal Service to form the corporate signature, along with the text About
Link to "2 Security Requirements" Link to contents for "2 Security Requirements"      Link to "2-2 Access Control"

2-1 Data Security

Postal Service policy provides specific guidelines for handling the various levels of sensitive and critical data. The following guidelines are not an exhaustive set of data security requirements and the Postal Service may require special or additional security measures:

  1. Limit hard copy and electronic distribution to persons on a specific, job-related need-to-know basis.
  2. Destroy data that is no longer needed or remains past its retention date.
  3. Retain sensitive information in accordance with a retention schedule, where applicable.
  4. Encrypt Postal Service information in storage (i.e., at rest), in transit, or stored off-site.

The Postal Service does not permit the following:

  1. Storage of Postal Service information on devices not owned by the Postal Service.
  2. Co-mingling of Postal Service information with information from sources other than the Postal Service.
  3. Removal of Postal Service information from Postal Service premises without approval in writing from the functional vice president (data steward) and chief information officer or their designees.
  4. Printing Postal Service information on printers where unauthorized people may see the output.
  5. Using e-mail, IM, chat, etc. or other electronic means to send Postal Service information unless it is encrypted.
  6. Discussing Postal Service information in an open area where others might overhear the conversation.
  7. Transmitting Postal Service information by facsimile without appropriate approval.



Link to "2 Security Requirements" Link to contents for "2 Security Requirements"      Link to "2-2 Access Control"
  • LEGAL

    • Privacy Policy ›
    • Terms of Use ›
    • FOIA ›
    • No FEAR Act EEO Data ›
  • ON ABOUT.USPS.COM

    • Newsroom ›
    • USPS Service Alerts ›
    • Forms & Publications ›
    • Careers ›
    • Site Index ›
  • ON USPS.COM

    • USPS.com Home ›
    • Buy Stamps & Shop ›
    • Print a Label with Postage ›
    • Customer Service ›
    • Delivering Solutions to the Last Mile ›
  • OTHER USPS SITES

    • Business Customer Gateway ›
    • Postal Inspectors ›
    • Inspector General ›
    • Postal Explorer ›
Copyright© 2023 USPS. All Rights Reserved.