Private or confidential data is defined in the Information Access and Protection (IAP ... an application or service and to identify potential red flags. To provide a risk assessment from an IT ...
You could distribute the risk assessment and ask people to read it and act on it. "Share - tell people what can go wrong and how it's being managed." Make sure control measures are put in place ...