Skip to content

Data Classification & Handling Policy

1.0 PURPOSE

The purpose of this policy is to establish a framework for classifying and handling data based on its level of sensitivity. Classification of data will determine the baseline security controls for the protection of data. This policy applies to all Snow College employees who access, process, or store sensitive Snow College data.

2.0 Definitions

  1. Personally Identifiable Information (PII)

    Any information that permits to the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, lawful permanent resident, visitor to the U.S., or employee or contractor to Snow College.

  2. Sensitive PII

    Includes but is not limited to; social security numbers, driver’s license numbers, financial or medical records, biometrics, or criminal history. This data requires stricter handling guidelines because of the increased risk to an individual if the data is compromised.

  3. Data Owner

    An individual or group of people who have been officially designated as accountable for specific data that is transmitted, used, and stored on a system or systems within a department, college, school, or administrative unit Snow College.

  4. Data Custodian

    Employee of the college who has administrative and/or operational responsibility over information assets.

  5. Institutional Data

    All data owned or licensed by Snow College.

  6. Information Assets

    Definable pieces of information in any form, recorded or stored on any media that is recognized as “valuable” to the college.

  7. Non-Public Information

    Any information that is classified as internal or private according to the data classification scheme.

3.0 Policy

  1. Data classification

    In the context of Information Security, is the classification of data based on its level of sensitivity and the impact to the organization should that data be disclosed, altered, or destroyed without authorization. The classification of data helps determine what baseline security controls are appropriate for safeguarding that data. All institutional data should be classified into one of three sensitivity levels (tiers), or classifications:

    1. Personally Identifiable Information (PII)

      Unauthorized disclosure, alteration or destruction of this type of data could cause a significant level of risk to Snow College or its affiliates. The impact of this type of data is critical and needs to be protected.

    2. Internal Data

      Unauthorized disclosure, alteration or destruction of this type of data could result in a moderate level of risk to Snow College or its affiliates. The risk for negative impact

      SENSITIVE FILE STORAGE AND EMAIL USAGE POLICY

      Purpose:

      The purpose of this policy is to ensure that sensitive and confidential information is stored and managed in a secure and controlled manner, in accordance with the organization's security standards and legal and regulatory requirements. This policy establishes the procedures and guidelines for the storage, access, and disposal of sensitive and confidential information, as well as the appropriate use of email for storing and transmitting information.

      Scope:

      This policy applies to all employees, contractors, and third-party individuals who use computing equipment owned or operated by the organization, including but not limited to laptops, desktops, servers, and mobile devices.

      Policy Requirements:

      1. Definition of Sensitive Information: Sensitive information includes, but is not limited to, personal identifiable information (PII), confidential business information, financial information, intellectual property, and other sensitive data that requires protection to maintain the privacy and security of individuals, the organization, and its customers and partners.

      2. Storage Requirements: Sensitive information must be stored on designated secure file servers, cloud-based storage solutions, or other secure storage devices that have been approved by the IT security team. Portable storage devices, such as USB drives or external hard drives, may only be used for temporary storage and must be encrypted and securely disposed of when no longer needed.

      3. Email Usage: Email must not be used as a storage location for sensitive information. Sensitive information should not be sent via email, unless it has been encrypted and is being transmitted to a secure recipient. Email should only be used for transmitting information that does not require protection or that has been properly secured.

      4. Access Controls: Access to sensitive information must be limited to those individuals who have a legitimate business need and who have been granted the appropriate level of access privileges by the IT security team. Access privileges must be reviewed and revoked on a regular basis to ensure that only those who need access have it.

      5. Encryption: Sensitive information must be encrypted in transit and at rest, using approved encryption algorithms and protocols. Encryption keys must be securely managed and stored, and access to encryption keys must be limited to authorized personnel only.

      6. Backup and Recovery: Sensitive information must be backed up regularly, in accordance with the organization's disaster recovery and business continuity plans, to ensure that it can be recovered in the event of a data loss or system failure. Backup tapes or other media must be stored securely and encrypted, if necessary.

      7. Disposal: When sensitive information is no longer needed, it must be securely disposed of in accordance with the organization's information disposal policy. This may include securely wiping or physically destroying hard drives, tapes, or other storage media, as appropriate.

      8. Non-Compliance: Failure to comply with this policy may result in disciplinary action, up to and including termination of employment or contract.

      Enforcement:

      The IT security team is responsible for enforcing this policy and ensuring that all employees, contractors, and third-party individuals are aware of and comply with the procedures for storing and managing sensitive information. Regular training and awareness programs will be conducted to educate users on the importance of protecting sensitive information and the procedures for storing and accessing sensitive files, as well as the appropriate use of email.

      SENSITIVE FILE STORAGE POLICY

      Purpose:

      The purpose of this policy is to ensure that sensitive and confidential information is stored and managed in a secure and controlled manner, in accordance with the organization's security standards and legal and regulatory requirements. This policy establishes the procedures and guidelines for the storage, access, and disposal of sensitive and confidential information.

      Scope:

      This policy applies to all employees, contractors, and third-party individuals who use computing equipment owned or operated by the organization, including but not limited to laptops, desktops, servers, and mobile devices.

      Policy Requirements:

      1. Definition of Sensitive Information: Sensitive information includes, but is not limited to, personal identifiable information (PII), confidential business information, financial information, intellectual property, and other sensitive data that requires protection to maintain the privacy and security of individuals, the organization, and its customers and partners.

      2. Storage Requirements: Sensitive information must be stored on designated secure file servers, cloud-based storage solutions, or other secure storage devices that have been approved by the IT security team. Portable storage devices, such as USB drives or external hard drives, may only be used for temporary storage and must be encrypted and securely disposed of when no longer needed.

      3. Access Controls: Access to sensitive information must be limited to those individuals who have a legitimate business need and who have been granted the appropriate level of access privileges by the IT security team. Access privileges must be reviewed and revoked on a regular basis to ensure that only those who need access have it.

      4. Encryption: Sensitive information must be encrypted in transit and at rest, using approved encryption algorithms and protocols. Encryption keys must be securely managed and stored, and access to encryption keys must be limited to authorized personnel only.

      5. Backup and Recovery: Sensitive information must be backed up regularly, in accordance with the organization's disaster recovery and business continuity plans, to ensure that it can be recovered in the event of a data loss or system failure. Backup tapes or other media must be stored securely and encrypted, if necessary.

      6. Disposal: When sensitive information is no longer needed, it must be securely disposed of in accordance with the organization's information disposal policy. This may include securely wiping or physically destroying hard drives, tapes, or other storage media, as appropriate.

      7. Non-Compliance: Failure to comply with this policy may result in disciplinary action, up to and including termination of employment or contract.

      Enforcement:

      The IT security team is responsible for enforcing this policy and ensuring that all employees, contractors, and third-party individuals are aware of and comply with the procedures for storing and managing sensitive information. Regular training and awareness programs will be conducted to educate users on the importance of protecting sensitive information and the procedures for storing and accessing sensitive files.

      1.0 PURPOSE

      The purpose of this policy is to establish a framework for classifying and handling data based on its level of sensitivity. Classification of data will determine the baseline security controls for the protection of data. This policy applies to all Snow College employees who access, process, or store sensitive Snow College data.

      2.0 Definitions

      2.1 Personally Identifiable Information (PII) – Any information that permits to the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, lawful permanent resident, visitor to the U.S., or employee or contractor to Snow College.

      2.2 Sensitive PII - Includes but is not limited to; social security numbers, driver’s license numbers, financial or medical records, biometrics, or criminal history. This data requires stricter handling guidelines because of the increased risk to an individual if the data is compromised.

      2.3 Data Owner - An individual or group of people who have been officially designated as accountable for specific data that is transmitted, used, and stored on a system or systems within a department, college, school,or administrative unit Snow College.

      2.4 Data Custodian Employee of the college who has administrative and/or operational responsibility over information assets.

      2.5 Institutional Data - All data owned or licensed by Snow College.

      2.6 Information Assets - Definable pieces of information in any form, recorded or stored on any media that is recognized as “valuable” to the college.

      2.7 Non-Public Information - Any information that is classified as internal or private according to the data classification scheme.

      3.0 Policy

      3.1. Data classification, in the context of Information Security, is the classification of data based on its level of sensitivity and the impact to the organization should that data be disclosed, altered, or destroyed without authorization. The classification of data helps determine what baseline security controls are appropriate for safeguarding that data. All institutional data should be classified into one of three sensitivity levels (tiers), or classifications:

      3.1.1 Personally Identifiable Information (PII) Unauthorized disclosure, alteration or destruction of this type of data could cause a significant level of risk to Snow College or its affiliates. The impact of this type of data is critical and needs to be protected.

      3.1.2 Internal Data - Unauthorized disclosure, alteration or destruction of this type of data could result in a moderate level of risk to Snow College or its affiliates. The risk for negative impact on the college should this information is typically moderate. Examples of internal data include official college records such as financial reports, purchase orders, processes, and some research data.

      3.1.3 Public Data - Unauthorized disclosure, alteration or destruction of this type of data would result in little or no risk Snow College and its affiliates.

      3.2. Determining Classification

      3.2.1. The goal of information security, as stated in the College’s Information Security Policy, is to protect the confidentiality, integrity andavailability of information assets and systems. Data classification reflects the level of impact to the College if confidentiality, integrity or availability of the data is compromised.

      3.3. Data Handling Requirements

      3.3.1. For each classification, several data handling requirements are defined to appropriately safeguard the information. It's important to understand that overall sensitivity of institutional data encompasses not only its confidentiality but also the need for integrity and availability.

      3.3.2. The attachedtable defines required safeguards for protecting data and data collections based on their classification. In addition to the following data security standards, any data covered by federal or state laws or regulations or contractual agreements must meet the security requirements defined by those laws, regulations, or contracts.

      3.3.3. Predefined Types of PIIInformation Assets. Based upon state, federal, and contractual requirements that Snow College is bound by, the following information assets have been predefined as PIIdata and must be protected.

      3.3.3.1. Personally Identifiable Education Records. Covered under FERPA.

      Personally Identifiable Education Records are defined as any education records that contain one or more of the following personal identifiers:

      Student Badger ID Number

      Grades, GPA, Credits Enrolled

      Social Security Number

      A list of personal characteristicsor any other information that would make the student's identity easily traceable

      3.3.3.2. Personally Identifiable Financial Information(PIFI). Covered under GLBA. For the purpose of meeting security breach notification requirements, PII is defined as a person's first name or first initial and last name in combination with one or more of the following data elements:

      Social security number

      State-issued driver's license number

      Date of Birth

      Financial account number in combination with a security code, access code orpassword that would permit access to the account

      3.3.3.3. Payment Card Information. Covered under PCI DSS. Payment card information is defined as a credit card number (also referred to as a primary account number or PAN) in combination with one or more of the following data elements:

      Cardholder name

      Service code

      Expiration date

      CVC2, CVV2 or CID value

      PIN or PIN block

      Contents of a credit card's magnetic stripe

      Contents of Card Chip

      3.3.3.4. Protected Health Information (PHI). Covered under HIPAA. PHI is defined as any individually identifiable information that is stored by a covered entity, and related to oneor more of the following:

      Past, present or future physical or mental health condition of an individual.

      Provision of health care to an individual.

      Past, present or future payment for the provision of health care to an individual

      PHI is considered individually identifiable if it contains one or more of the following identifiers:

      Name

      Address (all geographic subdivisions smaller than state including street address, city, county, precinct or zip code)

      All elements of dates (except year) related to an individual including birth date, admissions date, discharge date, date of death and exact age if over 89

      Telephone/Fax numbers

      Electronic mail addresses

      Social security numbers

      Medical record numbers

      Health plan beneficiary numbers

      Account numbers

      Certificate/license numbers

      Vehicle identifiers and serial numbers, including license plate number

      Device identifiers and serial numbers

      Universal Resource Locators (URLs)

      Internet protocol (IP) addresses

      Biometric identifiers, including finger and voice prints

      Full face photographic images and any comparable images

      Any other unique identifying number or characteristic that could identify an individual

      If the health information does not contain one of the above referenced identifiers and there is no reasonable basis to believe that the information can be used to identify an individual, it is not considered individually identifiable and; as a result, would not be considered PHI.

      4.0 References

      12.4 Information Security Policy

      12.5 Information Technology Acceptable Use Policy

      Classification Definition Access Restrictions Transmission Storage Disposal
      Public Information deemed to be public by legislation or policy. Information is in the public domain.Examples include annual reports, public announcements, the telephone directory, and specific categories of employee and student information. No restrictions on access. No special handling required. No special safeguards required Media can be recycled.
      Internal Use Information not approved for general circulation outside the College.Loss would inconvenience the Collegeor management; disclosure is unlikely to result in financial loss or serious damage to credibility.Examples include internal memos, minutes of meetings, internal project reports. Access limited to employees and other authorized users. No special handling required. Access controlled by physical (locks) or electronic (passwords) safeguards. Shredded or erased media.
      Identifiable Information (PII) Information that is available only to authorized persons.Loss could seriously impede the College’s operations; disclosure could have a significant financial impact or cause damage to the College’s reputation.Examples include specific categories of employee and student information, unit budgets, accounting information, and information protected by legal privilege. Access limited to those with a demonstrated need to know and official approval. Encryption mandatory for public networks.Encryption optional for internal networks. Access controlled by physical (locks) or electronic (passwords or two-factor authentication) safeguards Shredded, degaussed or destroyed.