WE PROTECT
Safeguard Company Information
WE PROTECT OUR COMPETITIVE ADVANTAGE by safeguarding
Our “secret sauce” to doing well is our ability to use our business information and technical know-how to introduce leading-edge services and products that our customers love.
We are each responsible for keeping this valuable commercial information confidential.
How we safeguard T-Mobile ’s confidential information and intellectual property:
Identify sensitive information
- Understand what sensitive company and business information is classified as Restricted, Confidential, and Internal under
T-Mobile ’s Data Classification & Handling Standard. - Appropriately classify sensitive company and business information or communications that you own or create.
Protect sensitive information
- Protect Restricted, Confidential, and Internal data in accordance with
T-Mobile ’s Information Handling Detail. - Ensure that
T-Mobile Restricted and Confidential information is protected at all times and made available only to internal or external users with a business need to know, as authorized by the information owner. - Only store
T-Mobile Restricted and Confidential data on devices, applications, or systems hosted byT-Mobile or an authorizedT-Mobile supplier. - Retain and dispose of
T-Mobile information in accordance with the Data Stewardship Policy and Data Stewardship Schedule Standard.
Understand requirements for accessing and sharing Restricted and Confidential information
- Only access or share Restricted and Confidential information for a legitimate business purpose.
- Share Restricted and Confidential information only via
T-Mobile ’s managed and approved platforms (e.g., company email, SharePoint, OneDrive, Teams) and only with approved parties. - Don’t publish or share Restricted and Confidential information on any internal or external website or on social media.
- Requests by external parties for sensitive
T-Mobile information should be directed to Legal Affairs. - Third parties that handle or store
T-Mobile data must adhere to our Third-Party Information Security Policy.
Seek additional information if you need it
- Go to SecureT for additional information and guidance.