All Collections
Compliance
Data Classification Policy Guidance
Data Classification Policy Guidance
Ethan Heller avatar
Written by Ethan Heller
Updated over a week ago

The following article contains guidance explaining portions of the Data Classification Policy that we frequently see questions around, explaining what the sections mean.

Guidance statements will appear in bold and enclosed in brackets “[]” below the statements of the policy.

Data Classification Policy

[COMPANY NAME]

______________________________________________________________________

Purpose

This policy will assist employees and other third-parties with understanding [COMPANY NAME]’s information labeling and handling guidelines. It should be noted that the sensitivity level definitions were created as guidelines and to emphasize common sense steps that you can take to protect sensitive or confidential information (e.g., company confidential information should not be left unattended in conference rooms).

Scope

This policy applies to all information owned, managed, controlled, or maintained by [COMPANY NAME] Information covered in this policy includes, but is not limited to, information that is received, stored, processed, or transmitted via any means. This includes electronic, hardcopy, and any other form of information regardless of the media on which it resides.

Roles and Responsibilities

<ROLES AND RESPONSIBILITIES>

[Additional guidance on what roles and responsibilities to list in this policy can be found here: https://help.drata.com/en/articles/5829670-roles-and-responsibilities-guidance. To use that article, you should list the answer to each question here as a role. For example: “Who is responsible for updating, reviewing, and maintaining this policy?” may become “The CISO is responsible for updating, reviewing, and maintaining this policy.”]

Policy

Definitions

  • Confidential/Restricted Data. Generalized terms that typically represent data classified as Sensitive or Private, according to the data classification scheme defined in this policy

  • Internal Data. All data owned or licensed by [COMPANY NAME].

  • Public Information. Any information that is available within the public domain.

[If you adjust the names of the data classification levels, you should update these definitions accordingly.]

Data Classification Scheme

Data classification, in the context of information security, is the classification of data based on its level of sensitivity and the impact to [COMPANY NAME] should that data be disclosed, altered, or destroyed without authorization. The classification of data helps determine what baseline security controls are appropriate for safeguarding that data. All data should be classified into one of the three following classifications.

[If you change the levels of classification, you may need to adjust this portion of the above paragraph “...one of the three following classifications.” This section just details that data will be classified based on its importance which determines the level of security to be applied.]

Confidential/Restricted Data

Data should be classified as Restricted or Confidential when the unauthorized disclosure, alteration, or destruction of that data could cause a serious or significant level of risk to [COMPANY NAME] or its customers. Examples of sensitive data include data protected by state or federal privacy regulations (e.g. PHI & PII) and data protected by confidentiality agreements. The highest level of security controls should be applied to Restricted and Confidential Data:

  • Disclosure or access to Restricted and Confidential data is limited to specific use by individuals with a legitimate need-to-know. Explicit authorization by the Security Officer is required for access to because of legal, contractual, privacy, or other constraints.

[You may change who authorized these disclosures to replace the Security Officer, but there should be some level of authorization prior to disclosing your most sensitive classifications of data.]

  • Must be protected to prevent loss, theft, unauthorized access, and/or unauthorized disclosure.

  • Must be destroyed when no longer needed. Destruction must be in accordance with Company policies and procedures.

  • Will require specific methodologies, procedures, and reporting requirements for the response and handling of incidents.

[This section can be edited if you choose to add or remove data classification levels. But this section is explaining that the most sensitive data has the most security controls applied to it.]

Internal Use Data

Data should be classified as Internal Use when the unauthorized disclosure, alteration, or destruction of that data could result in a moderate level of risk to [COMPANY NAME] or its customers. This includes proprietary, ethical, or privacy considerations. Data must be protected from unauthorized access, modification, transmission, storage or other use. This applies even though there may not be a civil statute requiring this protection. Internal Use Data is restricted to personnel who have a legitimate reason to access it. By default, all data that is not explicitly classified as Restricted/Confidential or Public data should be treated as Internal Use data. A reasonable level of security controls should be applied to Internal Use Data.

[This section can be edited if you choose to add or remove data classification levels. Internal Use Data is listed as the default sensitivity level all unlabeled data is classified as, if you change data classification levels, you should still maintain a level of sensitivity which all data without an explicit label is classified as.]

Public Data

Data should be classified as Public when the unauthorized disclosure, alteration or destruction of that data would result in little or no risk to [COMPANY NAME] and its customers. It is further defined as information with no existing local, national, or international legal restrictions on access or usage. While little or no controls are required to protect the confidentiality of Public data, some level of control is required to prevent unauthorized alteration or destruction of Public Data.

[This section can be edited if you choose to add or remove data classification levels. You should still have a classification level for data which only requires a small number of controls protecting it.]

De-identified Data

[COMPANY NAME] will de-identify data as a tool to remove personal information from data that it collects, uses, archives, and shares with other organizations. The de-identification process will allow the removal of direct identifiers, including all unique identifying numbers, characteristics, or codes. If a data set contains any amount or type of personal information, it will not be considered de-identified.

[This section is just explaining that when sharing data externally with other organizations, any information which may identify the customer will be removed prior to sharing that data with the external organizations.]

Assessing Classification Level and Labeling

The goal of information security, as stated in the Information Security Policy, is to protect the confidentiality, integrity, and availability of Corporate and Customer Data. Data classification reflects the level of impact to [COMPANY NAME] if confidentiality, integrity, or availability is compromised.

If a classification is not inherently obvious, consider each security objective using the following table as a guide. All data will be assigned one of the following four sensitivity levels.

CLASSIFICATION LEVELS

CLASSIFICATION

POTENTIAL IMPACT OF LOSS

RESTRICTED

  • Highly sensitive information

  • Level of protection is dictated externally by legal and/or contractual requirements

  • Must be limited to only authorized employees, contractors, and business partners with a specific business need

SERIOUS DAMAGE would occur if Restricted information were to become available to unauthorized parties either internal or external to [COMPANY NAME].

Impact could include negatively affecting [COMPANY NAME]’s competitive position, violating regulatory requirements, damaging the company’s reputation, violating contractual requirements, and posing an identity theft risk.

CONFIDENTIAL

  • Sensitive information

  • Level of protection is dictated internally by [COMPANY NAME]

  • Must be limited to only authorized employees, contractors, and business partners with a specific business need

SIGNIFICANT DAMAGE would occur if Confidential information were to become available to unauthorized parties either internal or external to [COMPANY NAME].

Impact could include negatively affecting [COMPANY NAME]’s competitive position, damaging the company’s reputation, violating contractual requirements, and exposing geographic location of individuals.

INTERNAL USE

  • Non-sensitive Information

  • Originating within or owned by [COMPANY NAME], or entrusted to it by others.

  • May be shared with authorized employees, contractors, and business partners who have a business need, but may not be released to the general public, due to the negative impact it might have on the company’s business interests

MODERATE DAMAGE would occur if Internal Use information were to become available to unauthorized parties either internal or external to [COMPANY NAME].

Impact could include damaging the company’s reputation and violating contractual requirements.

PUBLIC

  • Information that has been approved for release to the general public

  • Freely shareable both internally and externally

NO DAMAGE would occur if Public information were to become available to parties either internal or external to [COMPANY NAME].

Impact would not be damaging or a risk to business operations.

[These levels can be adjusted as needed, they should however be based on the impact of their unauthorized disclosure as indicated by the column on the right.]

HANDLING CONTROLS PER DATA CLASSIFICATION

Handling Controls

Restricted

Confidential

Internal Use

Public

Non-Disclosure Agreement (NDA)

Required prior to access by non-[COMPANY NAME] employees

Recommended prior to access by non-[COMPANY NAME] employees

Not Required

Not Required

Labeling

Internal Network Transmission (wired & wireless)

  • Encryption Required

  • Instant Messaging Prohibited

  • FTP Prohibited

  • Encryption Recommended

  • Instant Messaging Prohibited

  • FTP Prohibited

  • No Requirements

  • No Requirements

Labeling

External Network Transmission (wired & wireless)

  • Encryption Required

  • Instant Messaging Prohibited

  • FTP Prohibited

  • Remote Access if Necessary (only with VPN and two-factor authorization when possible)

  • Encryption Required

  • Instant Messaging Prohibited

  • FTP Prohibited

  • Encryption Recommended

  • Instant Messaging Prohibited

  • FTP Prohibited

  • No special requirements

Labeling

Data at Rest (file servers, databases, archives, etc.)

  • Encryption Required

  • Logical Access Controls Required (Limit Unauthorized Use)

  • Physical Access Restricted to Specific Individuals

  • Encryption Recommended

  • Logical Access Controls Required (Limit Unauthorized Use)

  • Physical Access Restricted to Specific groups

  • Encryption Recommended

  • Logical Access Controls Required (Limit Unauthorized Use)

  • Physical Access Restricted to Specific groups

  • Logical Access Controls Required (Limit Unauthorized Use)

  • Physical Access Restricted to Specific groups

Labeling

Mobile Devices (iPhone, iPad, USB Drive, etc.)

  • Encryption Required

  • Remote Wipe Enablement Required, if possible

  • Encryption Required

  • Remote Wipe Enablement Required, if possible

  • Encryption Recommended

  • Remote Wipe Enablement Recommended, if possible

  • No Requirements

Labeling

Email (with and without attachments)

  • Encryption Required

  • Do Not Forward

  • Encryption Recommended

  • Do not Forward

  • Encryption Recommended

  • Do Not Forward

  • No Requirements

Labeling

Physical Mail

  • Mark "Open by Addressee Only"

  • Use Courier or "Certified Mail" and Sealed, Tamper- Resistant Envelopes for External Mailings

  • Mark "Open by Addressee Only"

  • Use "Certified Mail" and Sealed, Tamper- Resistant Envelopes for External Mailings

  • Mail with Company Interoffice Mail

  • US Mail or Other Public Delivery Systems

  • No Requirements

Labeling

[​​For the labeling rows, those are the labels you want to apply to different types of data at different sensitivity/classification levels. Each labeling row will apply to each data type and classification level. And in those rows, you write how you want to label each particular type/classification of data. So Email would have 4 cells/values for Restricted, Confidential, Internal Use, and Public.

So for Restricted Email you may write: "Restricted must appear in the Subject Line of the email"

Confidential Email may have: "Confidential must appear in the Subject Line of the email"

Internal Use and Public may be listed as "No label applied"

You don't have to apply labels to every type of data and classification level, so you may not apply labels to Network Transmissions for example.

For the NDAs, the handling controls are more towards when an NDA is required (prior to handling confidential or restricted data) but you may want to apply a separate label to different types of NDAs. If you only have a single NDA though, it may be irrelevant.]

Did this answer your question?