Test information must be chosen carefully to ensure test results’ reliability and confidentiality. No one should copy sensitive information into development or testing environments. To protect operational information copies, protocols to control access, authorization, logging, masking, and proper deletion should be applied. Testing data should be securely stored and used solely to test.