WE PROTECT T-MOBILE INFORMATION

Person using laptop, notebook, and charts for work.

Safeguard Company Information

WE PROTECT OUR COMPETITIVE ADVANTAGE by safeguarding T-Mobile’s sensitive business information and intellectual property.

Our “secret sauce” to doing well is our ability to use our business information and technical know-how to introduce leading-edge services and products that our customers love.

We are each responsible for keeping this valuable commercial information confidential.

How we safeguard T-Mobile’s confidential information and intellectual property:

Identify sensitive information
  • Understand what sensitive company and business information is classified as Restricted, Confidential, and Internal under T-Mobile’s Data Classification & Handling Standard.
  • Appropriately classify sensitive company and business information or communications that you own or create.

Protect sensitive information

  • Protect Restricted, Confidential, and Internal data in accordance with T-Mobile’s Information Handling Detail.
  • Ensure that T-Mobile Restricted and Confidential information is protected at all times and made available only to internal or external users with a business need to know, as authorized by the information owner.
  • Only store T-Mobile Restricted and Confidential data on devices, applications, or systems hosted by T-Mobile or an authorized T-Mobile supplier.
  • Retain and dispose of T-Mobile information in accordance with the Data Stewardship Policy and Data Stewardship Schedule Standard.


Understand requirements for accessing and sharing Restricted and Confidential information

  • Only access or share Restricted and Confidential information for a legitimate business purpose.
  • Share Restricted and Confidential information only via T-Mobile’s managed and approved platforms (e.g., company email, SharePoint, OneDrive, Teams) and only with approved parties.
  • Don’t publish or share Restricted and Confidential information on any internal or external website or on social media.
  • Requests by external parties for sensitive T-Mobile information should be directed to Legal Affairs.
  • Third parties that handle or store T-Mobile data must adhere to our Third-Party Information Security Policy.

Seek additional information if you need it

  • Go to SecureT for additional information and guidance.