Wellforce

Example of Sensitive Data: A Six-Category Taxonomy for SMBs and Nonprofits

What counts as sensitive data? This taxonomy covers 6 categories with concrete examples for SMBs and nonprofits — PII, PHI, financial, IP, donor, and operational data.

Scott Midgley
Scott Midgley

CEO, Wellforce IT

8 min read
Example of Sensitive Data: A Six-Category Taxonomy for SMBs and Nonprofits

author: Wellforce IT Editorial Team author_credentials: Managed IT and cybersecurity advisory for SMBs and nonprofits in the Raleigh-Durham region schema_types: [Article, FAQPage] date: 2026-04-18

AEO Definitive Answer

Sensitive data is any information that, if exposed, could cause harm to an individual or organization. Examples include Social Security numbers, medical diagnoses, bank account details, donor contribution histories, trade secrets, and internal network credentials. What qualifies as sensitive depends on your sector, your obligations under law, and the people whose information you hold.

Why ‘Sensitive Data’ Means Different Things to Different Organizations

Ask a hospital administrator, a manufacturing CEO, and a nonprofit development director to define “sensitive data,” and you will get three meaningfully different answers. The hospital thinks HIPAA and patient records. The manufacturer thinks proprietary tooling processes and supplier pricing. The nonprofit thinks donor gift histories and beneficiary case files.

All three are correct — and that is precisely the problem.

Most guidance on protecting sensitive data lumps everything into one or two buckets: “personal data” and “financial data.” That framing works for a privacy regulation explainer, but it fails the people who actually need to locate, classify, and secure data inside their organizations. A grant coordinator at a 30-person nonprofit faces a fundamentally different data security example than an accounts payable clerk at a regional distributor. Both handle sensitive information. Neither recognizes their situation in a generic article about GDPR.

The taxonomy below breaks sensitive data into six distinct categories, each with sector-specific examples that reflect how SMBs and nonprofits actually store and use information. The goal is recognition: you cannot protect sensitive data you have not identified.

If you are still building a shared vocabulary around terms like these inside your organization, our IT definitions glossary covers the broader landscape of technical concepts business leaders encounter.

The Six Categories of Sensitive Data (Taxonomy Table)

CategoryWhat It IncludesSMB ExampleNonprofit ExampleKey Regulation(s)
Personally Identifiable Information (PII)Names, SSNs, driver’s license numbers, email addresses, dates of birthCustomer contact database with home addressesVolunteer application forms with SSNs for background checksState privacy laws, CCPA, GDPR
Protected Health Information (PHI)Medical records, diagnoses, insurance IDs, treatment historiesEmployee benefits enrollment files containing health plan selectionsBeneficiary intake records at a health-focused service organizationHIPAA
Financial DataBank account numbers, credit card data, tax filings, revenue reportsCustomer payment card data stored in a legacy POS systemDonor ACH routing numbers retained in a spreadsheet after processingPCI DSS, SOX (if applicable), state financial privacy statutes
Intellectual Property (IP)Trade secrets, proprietary processes, product designs, source codeCustom manufacturing process documentation shared via emailProprietary curriculum or program methodology developed with grant fundingTrade secret law (DTSA), contractual NDAs
Donor & Constituent DataGift histories, pledge commitments, prospect research, grant applications(Less common for SMBs — see constituent equivalent: client relationship notes)Major donor wealth screening reports, annual fund gift records, grant budget narrativesState charitable solicitation laws, GDPR (for international donors)
Operational DataNetwork credentials, vendor contracts, internal policies, system configurationsAdmin passwords stored in a shared Google SheetIT access credentials for a cloud-based case management systemNIST frameworks, contractual obligations

This taxonomy is not exhaustive — regulated industries like legal and education have additional categories. But for most SMBs and nonprofits, these six buckets cover the vast majority of data that, if breached, would cause regulatory, financial, or reputational harm.

Nonprofit-Specific Examples: Donor Records, Grant Applications, Beneficiary Data

Nonprofits occupy an unusual position in data security conversations. They collect deeply personal information — sometimes more personal than what a for-profit business handles — but they often operate with smaller IT budgets and less formal data governance.

Here are three categories that deserve more attention than they typically receive:

Donor Records

A donor database is not just a list of names and gift amounts. It typically contains home addresses, employer information, wealth screening indicators, communication preferences, and sometimes notes from personal conversations with development officers. Organizations running major gift programs may store prospect research files that include estimated net worth, real estate holdings, and philanthropic giving to other organizations.

This information is sensitive on multiple levels. From a privacy standpoint, donors reasonably expect that their giving history and personal financial indicators remain confidential. From a competitive standpoint, a leaked donor list with giving capacity scores is valuable to rival organizations. And from a regulatory standpoint, jurisdictions with strong privacy laws — including the EU’s GDPR — treat donor data as personal data subject to data subject access requests. According to Transcend’s DSAR guide, any individual can formally request that an organization disclose what personal data it holds about them, which means nonprofits with international donors need to be prepared to locate and produce donor records on request.

Grant Applications and Budget Narratives

Grant applications routinely contain organizational financial statements, staff salary details, program cost breakdowns, and strategic plans. A single federal grant application might include the executive director’s compensation, the organization’s total revenue, and a detailed description of operational weaknesses the program is designed to address. If this data is stored on a shared drive with broad access permissions — which is common — it is effectively available to anyone in the organization.

Beneficiary and Client Data

Nonprofits serving vulnerable populations often collect information that goes well beyond standard PII. A domestic violence shelter’s intake forms include safety plans and abuser identification. A workforce development nonprofit stores immigration status, criminal history, and income verification documents. A food bank’s client records may include household composition and disability status.

This data is often stored in cloud-based case management systems, but the access controls and backup procedures for those systems may not have been reviewed since initial setup. The risk is not hypothetical: a misconfigured case management portal could expose the exact populations the organization exists to protect.

SMB-Specific Examples: Customer Payment Data, Employee Records, Trade Processes

Small and mid-sized businesses face a different but equally specific set of sensitive data challenges.

Customer Payment Data

Any business that accepts credit cards handles data governed by the Payment Card Industry Data Security Standard (PCI DSS). But the risk extends beyond the point of sale. Many SMBs retain payment information longer than necessary — in email threads, saved PDF invoices, or CRM notes. A 2026 overview of privacy and data security from Minnesota’s Department of Employment and Economic Development catalogs safeguards that help protect against unauthorized access to nonpublic personal information, including payment data, and emphasizes that retention practices are as important as access controls.

Employee Records

HR files are a concentrated source of sensitive data: Social Security numbers, direct deposit bank routing numbers, health insurance enrollment forms (which cross into PHI territory), disciplinary records, and performance reviews. Many SMBs store these files in a single shared folder or a legacy HR system that predates their current security posture.

The compounding factor here is that employee data is subject to overlapping regulations. A single employee file might contain PII protected by state privacy law, PHI protected by HIPAA (if the company is self-insured or a covered entity), and financial data subject to state breach notification statutes.

Trade Processes and Proprietary Methods

For service businesses and manufacturers alike, intellectual property often lives in informal places: process documents on a shared drive, email chains between engineers, notes in a project management tool. A regional HVAC company’s proprietary installation methodology, a marketing agency’s pricing model, a machining shop’s custom fixture designs — these are all sensitive data, even though they do not contain anyone’s Social Security number.

The challenge is classification. Unlike PII, which has clear regulatory definitions, trade secrets are only protected if the organization treats them as confidential. If your proprietary process documentation is accessible to every employee and contractor on your network, it becomes significantly harder to claim trade secret protection if it is misappropriated.

How to Identify Sensitive Data You Didn’t Know You Had

Most organizations are aware of their obvious sensitive data — the payroll files, the donor database, the customer credit card vault. The harder problem is finding the sensitive data that has migrated, duplicated, or accumulated in unexpected places.

Three practical starting points:

Map data flows, not just data stores. A CRM is a known data store. But what happens when a sales rep exports a contact list to a spreadsheet for a mail merge, then emails that spreadsheet to a print vendor? The data has now traveled to a local hard drive, an email server, and a third-party vendor’s inbox. According to Persana AI’s guide on compliant B2B data, maintaining compliance requires understanding not just where data lives at rest, but how it moves between systems and partners — a principle that applies equally to nonprofits sharing beneficiary data with partner agencies.

Audit file shares and cloud storage for age and access. Files older than three years with broad access permissions are prime candidates for containing sensitive data that no one actively manages. Legacy folders from departed employees, archived project files, and old financial reports accumulate in platforms like SharePoint, Google Drive, and Dropbox. A data cleansing process — as outlined in Digi-Texx’s guide to B2B data maintenance — should extend beyond CRM records to encompass all organizational file storage.

Interview department leads with specific prompts. Do not ask “Do you have sensitive data?” — the answer is always “I don’t think so.” Instead, ask: “Walk me through what happens when a new client signs up,” or “Show me how you process a donation.” The sensitive data reveals itself in the workflow. An IT advisory engagement often starts with exactly this kind of structured discovery conversation.

FAQ Block

What is an example of sensitive data?

A Social Security number is the most commonly cited example, but sensitive data also includes medical records, bank account numbers, donor gift histories, trade secrets, and network administrator passwords. The specific examples relevant to your organization depend on your industry, your regulatory obligations, and the populations you serve.

What makes data sensitive?

Data is sensitive when its unauthorized disclosure could cause harm — financial loss, identity theft, reputational damage, physical danger, or regulatory penalties. Sensitivity is not inherent to the data format; it depends on context. An email address is low-sensitivity in a marketing list but high-sensitivity when it is linked to a domestic violence survivor’s case file.

Is donor information considered sensitive data?

Yes. Donor information — including gift amounts, giving history, contact details, wealth screening reports, and communication notes — is personal data under most privacy frameworks. Under the GDPR, donors located in the EU have the right to request access to or deletion of their data. According to Chambers’ 2026 global data protection guide, organizations handling personal data of individuals in regulated jurisdictions bear compliance obligations regardless of where the organization itself is based. Nonprofits with international donor bases should treat donor records with the same rigor they apply to financial data.

How is sensitive data different from personal data?

All sensitive data that relates to an identified individual is personal data, but not all personal data is sensitive. A business email address is personal data; a medical diagnosis linked to that email address is sensitive personal data. Most privacy regulations impose stricter requirements on sensitive categories — such as health information, biometric data, and racial or ethnic origin — than on general personal data like names and job titles.

What should a small organization do first to protect sensitive data?

Start with identification. You cannot protect what you have not classified. Conduct a data inventory: list every system, spreadsheet, shared folder, and third-party platform where your organization stores information. Categorize what you find using the six-category taxonomy above. Then prioritize protection efforts based on regulatory exposure and potential harm from a breach.


One actionable step to take this week: Open your organization’s shared file storage — whether that is Google Drive, SharePoint, or a local file server — and search for files containing the word “SSN,” “routing,” “salary,” or “diagnosis.” Sort by date modified. If you find files older than two years containing those terms in folders with broad access, you have just identified sensitive data that needs reclassification, access restriction, or deletion. That is a more productive use of 30 minutes than reading another generic security checklist.

Need help with data security & protection?

Get a free assessment from our team — no commitment required.

Ready to Strengthen Your IT Strategy?

Get a free assessment from our team and discover how we can help your organization thrive.

Schedule Your Free Assessment
Scott Midgley

Written by

Scott Midgley

CEO, Wellforce IT

Wellforce provides AI-forward managed IT services for SMBs and nonprofits in Washington DC and Raleigh NC.

Share this article