Does your staff (or a third party) have access to institutional data (e.g., financial, PHI, or other sensitive information) through any means?
Explanation
Guidance
Accessing institutional data may be necessary for legitimate business purposes.
Example Responses
Example Response 1
Yes, our technical support staff has access to institutional data on an as-needed basis to troubleshoot customer issues This includes potential access to financial data and other sensitive information stored in our system All access is logged, requires management approval, follows least-privilege principles, and is subject to regular audits Support personnel receive annual privacy and security training specific to handling sensitive data We maintain a data access policy that requires staff to access only the minimum data necessary to resolve the issue, and all access events are monitored in real-time for suspicious activity.
Example Response 2
Yes, our development team has read-only access to a sanitized version of production data for debugging purposes While this data may contain structures similar to institutional data, all personally identifiable information, financial details, and PHI are automatically redacted or replaced with synthetic data before developers can access it Our QA environment never contains actual institutional data For rare cases where production access is required to resolve critical issues, we implement a break-glass procedure with full audit logging, time-limited access, and dual authorization requirements.
Example Response 3
No, our staff and third parties do not have access to institutional data Our solution is designed with a zero-knowledge architecture where all sensitive institutional data is encrypted client-side before being stored in our systems The encryption keys remain solely in the institution's control, and our staff cannot decrypt or access the actual content of stored data However, we should note that this approach means we cannot provide certain support functions like content-specific troubleshooting or data recovery if the institution loses their encryption keys We've made this architectural choice to maximize data privacy, though it does create some functional limitations.
Context
- Tab
- Privacy
- Category
- Privacy of Sensitive Data

