SlideShare a Scribd company logo
Work Smart by Microsoft IT
Classifying and Protecting Your
Business Information
Customization note: This document is based on the experience of Microsoft IT and contains
guidance and/or step-by-step instructions that can be reused, customized, or deleted entirely if
they do not apply to your organization’s environment or installation scenarios.
All forms of information, including ideas and concepts, have potential business value.
Whether you are exchanging emails, sharing documents, or having a phone conversation, it
is your responsibility to help protect your company’s confidential information. The greater
the information’s value, the more security controls you should put in place to protect it.
This guide provides an overview on how to properly classify business information and data
according to the potential impact of unintentional disclosure: High, Moderate, and Low
Business Impact. It also introduces some solutions that are available to help protect your
information before you transmit, share, store, or dispose of it.
Topics in this guide include:
Classifying your
information
Protecting your
information
Classification and
data dissemination
guidelines
Recommended
security practices
For more information
2 | Classifying and Protecting Your Business Information
Classifying your information
Information can be classified into three areas, according to the potential impact of its
unintentional disclosure: High Business Impact (HBI), Moderate Business Impact (MBI), and
Low Business Impact (LBI).
Table 1. Information classifications
HBI HBI applies to any information including emails, documents, messages and phone
conversations that, if disclosed without authorization, could result in immediate,
direct or considerable impact to the company, the information owner and
customers. HBI information should only be shared with those on a “need-to-know”
basis. HBI includes Highly Sensitive Personally Identifiable Information (HSPII).
MBI MBI applies to information that, if disclosed, could cause indirect, limited impact
the company, the asset’s owner and valued customers. MBI information should only
be accessible to those people who have a legitimate business need to view the
information. MBI includes Personally Identifiable Information (PII).
LBI LBI classification applies to information assets that, if disclosed without
authorization, could cause limited, or no material loss to the company, the asset
owner, or relying parties.
Important: The guidance provided in this document is for example purposes and every
organization is unique. In the following sections, please be aware that your company’s HBI, MBI,
and LBI information and data could require more or less restrictive classification levels.
Classification of some common information types
Below is table of guidelines that might be helpful in determining a type of data's
classification level.
Table 2. Guidelines to help determine data classification level
Data includes the following info: HBI MBI LBI
Email Address
X
Social Security Number
X
Documents regarding process or procedure
X
Private cryptographic keys
X
Username and Passwords
X
Publicly accessible information X
Company trade secrets
X
Financial information related to revenue
generation
X
List of Phone Numbers
X
Employee Zip Codes X
Numeric ID sequences / PINs
X
3 | Classifying and Protecting Your Business Information
Tips:
 Use the more restrictive classification if data falls into more than one classification level
or if you are unsure of its classification.
 Treat information as HBI if it does not have a classification, but is marked “confidential.”
Important Notes:
 It is your responsibility to understand the business value of your information and to apply
the correct classification and protection.
 Remove HBI or MBI information from your computer before retiring it or sending it offsite
for repairs.
 Remember to check your company policies as their classification levels may vary from the
examples provided in the table above.
Protecting your information
Now that you know how to classify your information, you will learn what tools are available
to ensure that your data is protected when it is sent, shared, stored, backed up, or deleted.
This guide provides an overview of four technologies that can be used to help protect
information.
 Information Rights Management. An Office feature of Rights Management Services
(RMS), IRM enables you to apply specific access permissions to documents, workbooks,
and presentations to prevent unauthorized forwarding, printing, or copying; and to set
expiration dates after which files no longer are available. More information about IRM is
available at http://technet.microsoft.com/en-us/library/cc179103.aspx.
 Secure/Multipurpose Internet Mail Extensions (S/MIME). With S/MIME you can
encrypt and/or digitally sign your email messages. Encrypting your messages converts
data with a cipher text so that only people who you specify can read it. Digitally signing
an email message helps ensure that no tampering occurs while your message and its
attachments are in transit. More information about S/MIME is included in the Message
Encryption and Filtering topic at http://technet.microsoft.com/en-
us/library/jj891023.aspx.
 BitLocker Drive Encryption. BitLocker Drive Encryption is a data protection feature
available in Windows Vista, Windows 7, and Windows 8. BitLocker encrypts the hard
drives on your computer to provide enhanced protection against data theft or exposure
on computers and removable drives that are lost, stolen, or decommissioned. More
information about BitLocker is available at http://technet.microsoft.com/en-
us/library/hh831713.aspx. BitLocker To Go provides drive encryption to prevent
unauthorized access on your portable storage drives. This includes the encryption of
USB flash drives, SD cards, external hard disk drives, and other removable drives
formatted by using the NTFS, FAT, or exFAT file systems.
4 | Classifying and Protecting Your Business Information
 Encrypted File System (EFS). If your computer is not BitLocker compatible, you can
use Encrypted File System (EFS) to encrypt specific files and folders by using a
certificate. EFS requires that users with whom you share information enter the
appropriate decryption key before they can access the encrypted content. More
information about EFS is available at http://windows.microsoft.com/en-
us/windows/what-is-encrypting-file-system#1TC=windows-7.
The following table provide some guidelines about which technology you should use to
protect the HBI or MBI information that you transmit, share, or store on your computer:
Table 3. Preferred technology used to transmit, share, and store business information
IRM S/MIME EFS BitLocker
Transmit with internal
email
Preferred Acceptable N/A N/A
Transmit with external
email
Works only with
other federated
RMS
organizations
Preferred N/A N/A
Share using SharePoint
Online
Preferred N/A N/A N/A
Storing on computer
Acceptable with
BitLocker
N/A Acceptable with
BitLocker
Required
Storing on removable
media
Acceptable N/A Acceptable Preferred
Notes:
 Information about applying Information Rights Management to a list or library is available at
http://office.microsoft.com/en-us/sharepoint-server-help/apply-information-rights-
management-to-a-list-or-library-HA010154148.aspx
 More information about Information Rights Management is available in “What’s New with
Information Rights Management in SharePoint and SharePoint Online?” at
http://blogs.office.com/2012/11/09/whats-new-with-information-rights-management-in-
sharepoint-and-sharepoint-online/
5 | Classifying and Protecting Your Business Information
Classification and data dissemination
guidelines
The following table provides some classification-level guidelines for sending, sharing,
storing, backing up, and disposing of business information.
Table 4. Guidelines for sending, sharing, storing, backing up, and disposing of business information
Action HBI MBI LBI
Send data (via file
transfer or email)
 Requires asset owner
approval to forward,
export, or copy.
 Requires encryption for
internal and external
delivery.
 Requires encryption with
S/MIME or IRM for email.
 Requires encryption for
transfer outside of
organization.
 Requires encryption with
S/MIME for email sent
outside the corporate
network.
No special
requirements.
Share
(via O365 SharePoint
Online)
 Use IRM to restrict
forwarding, copying, and
printing.
 Restrict permissions to
those identified by asset
owner.
 Requires formal
agreement, which legal
approves, for third
parties, such as business
partners.
 Restricts permissions to
those with legitimate
business needs only.
 Requires formal
agreement, which legal
approves, for third
parties, such as business
partners.
No special
requirements.
Store
(server, PC, CD, USB)
 Requires encryption
(BitLocker).
 Allows storage on
handheld devices only if
device supports strong
encryption and
authentication security
controls.
 May require encryption
(as determined by the
asset owner).
No special
requirements.
Back up
 Performed only by
authorized personnel and
stored only at a location
approved by IT Security.
 Encrypt storage media.
 Store in a physically
secure location in which
backups are logged and
access is controlled and
monitored.
No special
requirements.
Dispose of
 Cross-shred or incinerate
paper documents.
 Destroy tapes and other
magnetic media. Request
that hard disk drives be
destroyed.
 Follow your organization
policies for the
appropriate disposal of
retired hardware and
media.
 Cross-shred or
incinerate paper
documents.
 Destroy tapes and other
magnetic media.
 Remove data on hard
disks that you plan to
reuse or retire.
 Destroy inoperable hard
disk drives.
No special
requirements.
6 | Classifying and Protecting Your Business Information
Recommended security practices
Use the Microsoft Office System Document Inspector
If you plan to share an electronic copy of a Microsoft Office Word document with clients or
colleagues, it is a good idea to review the document for hidden data or personal
information that might be stored in the document itself or in the document properties
(metadata). Document Inspector is a built-in tool that can be used to scan your data before
sharing it with others.
For more information on how to use Document Inspector, see Remove hidden data and
personal information by inspecting documents at http://office.microsoft.com/en-us/word-
help/remove-hidden-data-and-personal-information-by-inspecting-documents-
HA010354329.aspx.
Guard confidential information
Do not discuss confidential information in public places.
Beware of multiple network connections
Never concurrently connect your computer to your corporate network and the Internet, or
any other network that your company does not manage. This compromises your company's
network security.
Review list of group recipients
Think globally before posting any content. Before you send or reply to email, post to
Yammer, One Drive, or any another social website, or post data to SharePoint, make sure
that the information is appropriate for disclosure to everyone who has access to the email
or website.
Use Outlook Web Access
Use Outlook Web Access (OWA) to check your email from your home computer. Be careful
if you access corporate resources by using kiosks and other public locations, even though
OWA, as key strokes may be monitored if the public network does not have the correct
configuration.
Do not leave documents or presentations unattended
Remove all documents after meetings, and erase whiteboards.
Beware of posting on walls or bulletin boards
If your document is HBI, do not post it in hallways or on bulletin boards.
7 | Classifying and Protecting Your Business Information
For more information
This guide provides foundational knowledge to help you make better decisions about
securing your data. Other guides are available to teach you how to help protect your
information. Visit the Modern IT Experience featuring IT Showcase at
http://microsoft.com/microsoft-IT and search for the following Work Smart titles:
 Securing your business information
 Secure collaboration using SharePoint Online
 Securing your computer
 Protecting data with Windows 8 BitLocker
The following content may be of interest to you as well:
 Introduction to IRM for email messages
http://office.microsoft.com/en-us/outlook-help/introduction-to-irm-for-email-
messages-HA102749366.aspx
 Video: Getting Started with Encrypting File System in Windows 7
http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-
encrypting-file-system-in-windows-7.aspx
 International Data Protection Standards
http://download.microsoft.com/download/B/8/2/B8282D75-433C-4B7E-B0A0-
FFA413E20060/international_privacy_standards.pdf
 Work Smart by Microsoft IT
http://aka.ms/customerworksmart
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR
STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2014 Microsoft Corporation. All rights reserved.

More Related Content

What's hot

Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
Robert Crane
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
Dock 365
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
Albert Hoitingh
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
NajahIdrissiMoulayRa
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren任力偉
 
Security and management
Security and managementSecurity and management
Security and management
ArtiSolanki5
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
Alistair Pugin
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
S.M. Towhidul Islam
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
Coi Xay
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
Sylvain Martinez
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptxCollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
Albert Hoitingh
 

What's hot (20)

Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Security and management
Security and managementSecurity and management
Security and management
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptxCollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
 

Viewers also liked

Walmart-Mattel: Supply Chanin Management Best Practices
Walmart-Mattel: Supply Chanin Management Best PracticesWalmart-Mattel: Supply Chanin Management Best Practices
Walmart-Mattel: Supply Chanin Management Best Practices
Shree Harsha
 
BlogWell New York Social Media Case Study: Walmart, presented by Lisa Thurber
BlogWell New York Social Media Case Study: Walmart, presented by Lisa ThurberBlogWell New York Social Media Case Study: Walmart, presented by Lisa Thurber
BlogWell New York Social Media Case Study: Walmart, presented by Lisa Thurber
SocialMedia.org
 
IDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATION
IDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATIONIDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATION
IDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATION
Suneal Saini
 
P& G case study analysis
P& G case study analysis P& G case study analysis
P& G case study analysis
r-dilara
 
Mis case study - Procter & Gamble
Mis case study  - Procter & GambleMis case study  - Procter & Gamble
Mis case study - Procter & Gamble
Nightfurry Faysal
 
Operation Management for Walmart
Operation Management for WalmartOperation Management for Walmart
Operation Management for Walmart
Al Amin Redwanur Rahman, ACA
 
p&g marketing strategies
p&g marketing strategiesp&g marketing strategies
p&g marketing strategiesritulakhotia
 

Viewers also liked (8)

Walmart-Mattel: Supply Chanin Management Best Practices
Walmart-Mattel: Supply Chanin Management Best PracticesWalmart-Mattel: Supply Chanin Management Best Practices
Walmart-Mattel: Supply Chanin Management Best Practices
 
BlogWell New York Social Media Case Study: Walmart, presented by Lisa Thurber
BlogWell New York Social Media Case Study: Walmart, presented by Lisa ThurberBlogWell New York Social Media Case Study: Walmart, presented by Lisa Thurber
BlogWell New York Social Media Case Study: Walmart, presented by Lisa Thurber
 
IDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATION
IDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATIONIDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATION
IDENTIFICATION OF SOURCES OF INFORMATION, SEARCHING AND CLASSIFYING INFORMATION
 
P& G case study analysis
P& G case study analysis P& G case study analysis
P& G case study analysis
 
Mis case study - Procter & Gamble
Mis case study  - Procter & GambleMis case study  - Procter & Gamble
Mis case study - Procter & Gamble
 
Operation Management for Walmart
Operation Management for WalmartOperation Management for Walmart
Operation Management for Walmart
 
p&g marketing strategies
p&g marketing strategiesp&g marketing strategies
p&g marketing strategies
 
Procter and gamble (P&G)
Procter and gamble (P&G)Procter and gamble (P&G)
Procter and gamble (P&G)
 

Similar to Classifying Data to Help Secure Business Information - Template fromMicrosoft

Securing Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanSecuring Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanDavid J Rosenthal
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
Agusto Sipahutar
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
arnoldmeredith47041
 
08. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 201308. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 2013Menadžment Centar Beograd
 
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 201308. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
Menadžment Centar Beograd
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
Dunton Environmental
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
Cor Ranzijn
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
Pablo Junco
 
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Avni Rajput
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
Norman Funzani Manenzhe
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
IT AMC Support Dubai - Techno Edge Systems LLC
 
Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021
Albert Hoitingh
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
Caroline Johnson
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving Compliance
PortalGuard
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 

Similar to Classifying Data to Help Secure Business Information - Template fromMicrosoft (20)

Securing Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanSecuring Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by Atidan
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
08. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 201308. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 2013
 
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 201308. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
 
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving Compliance
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 

More from David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
David J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
David J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
David J Rosenthal
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
David J Rosenthal
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
David J Rosenthal
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
David J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
David J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
David J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
David J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
David J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
David J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
David J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
David J Rosenthal
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
David J Rosenthal
 

More from David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Classifying Data to Help Secure Business Information - Template fromMicrosoft

  • 1. Work Smart by Microsoft IT Classifying and Protecting Your Business Information Customization note: This document is based on the experience of Microsoft IT and contains guidance and/or step-by-step instructions that can be reused, customized, or deleted entirely if they do not apply to your organization’s environment or installation scenarios. All forms of information, including ideas and concepts, have potential business value. Whether you are exchanging emails, sharing documents, or having a phone conversation, it is your responsibility to help protect your company’s confidential information. The greater the information’s value, the more security controls you should put in place to protect it. This guide provides an overview on how to properly classify business information and data according to the potential impact of unintentional disclosure: High, Moderate, and Low Business Impact. It also introduces some solutions that are available to help protect your information before you transmit, share, store, or dispose of it. Topics in this guide include: Classifying your information Protecting your information Classification and data dissemination guidelines Recommended security practices For more information
  • 2. 2 | Classifying and Protecting Your Business Information Classifying your information Information can be classified into three areas, according to the potential impact of its unintentional disclosure: High Business Impact (HBI), Moderate Business Impact (MBI), and Low Business Impact (LBI). Table 1. Information classifications HBI HBI applies to any information including emails, documents, messages and phone conversations that, if disclosed without authorization, could result in immediate, direct or considerable impact to the company, the information owner and customers. HBI information should only be shared with those on a “need-to-know” basis. HBI includes Highly Sensitive Personally Identifiable Information (HSPII). MBI MBI applies to information that, if disclosed, could cause indirect, limited impact the company, the asset’s owner and valued customers. MBI information should only be accessible to those people who have a legitimate business need to view the information. MBI includes Personally Identifiable Information (PII). LBI LBI classification applies to information assets that, if disclosed without authorization, could cause limited, or no material loss to the company, the asset owner, or relying parties. Important: The guidance provided in this document is for example purposes and every organization is unique. In the following sections, please be aware that your company’s HBI, MBI, and LBI information and data could require more or less restrictive classification levels. Classification of some common information types Below is table of guidelines that might be helpful in determining a type of data's classification level. Table 2. Guidelines to help determine data classification level Data includes the following info: HBI MBI LBI Email Address X Social Security Number X Documents regarding process or procedure X Private cryptographic keys X Username and Passwords X Publicly accessible information X Company trade secrets X Financial information related to revenue generation X List of Phone Numbers X Employee Zip Codes X Numeric ID sequences / PINs X
  • 3. 3 | Classifying and Protecting Your Business Information Tips:  Use the more restrictive classification if data falls into more than one classification level or if you are unsure of its classification.  Treat information as HBI if it does not have a classification, but is marked “confidential.” Important Notes:  It is your responsibility to understand the business value of your information and to apply the correct classification and protection.  Remove HBI or MBI information from your computer before retiring it or sending it offsite for repairs.  Remember to check your company policies as their classification levels may vary from the examples provided in the table above. Protecting your information Now that you know how to classify your information, you will learn what tools are available to ensure that your data is protected when it is sent, shared, stored, backed up, or deleted. This guide provides an overview of four technologies that can be used to help protect information.  Information Rights Management. An Office feature of Rights Management Services (RMS), IRM enables you to apply specific access permissions to documents, workbooks, and presentations to prevent unauthorized forwarding, printing, or copying; and to set expiration dates after which files no longer are available. More information about IRM is available at http://technet.microsoft.com/en-us/library/cc179103.aspx.  Secure/Multipurpose Internet Mail Extensions (S/MIME). With S/MIME you can encrypt and/or digitally sign your email messages. Encrypting your messages converts data with a cipher text so that only people who you specify can read it. Digitally signing an email message helps ensure that no tampering occurs while your message and its attachments are in transit. More information about S/MIME is included in the Message Encryption and Filtering topic at http://technet.microsoft.com/en- us/library/jj891023.aspx.  BitLocker Drive Encryption. BitLocker Drive Encryption is a data protection feature available in Windows Vista, Windows 7, and Windows 8. BitLocker encrypts the hard drives on your computer to provide enhanced protection against data theft or exposure on computers and removable drives that are lost, stolen, or decommissioned. More information about BitLocker is available at http://technet.microsoft.com/en- us/library/hh831713.aspx. BitLocker To Go provides drive encryption to prevent unauthorized access on your portable storage drives. This includes the encryption of USB flash drives, SD cards, external hard disk drives, and other removable drives formatted by using the NTFS, FAT, or exFAT file systems.
  • 4. 4 | Classifying and Protecting Your Business Information  Encrypted File System (EFS). If your computer is not BitLocker compatible, you can use Encrypted File System (EFS) to encrypt specific files and folders by using a certificate. EFS requires that users with whom you share information enter the appropriate decryption key before they can access the encrypted content. More information about EFS is available at http://windows.microsoft.com/en- us/windows/what-is-encrypting-file-system#1TC=windows-7. The following table provide some guidelines about which technology you should use to protect the HBI or MBI information that you transmit, share, or store on your computer: Table 3. Preferred technology used to transmit, share, and store business information IRM S/MIME EFS BitLocker Transmit with internal email Preferred Acceptable N/A N/A Transmit with external email Works only with other federated RMS organizations Preferred N/A N/A Share using SharePoint Online Preferred N/A N/A N/A Storing on computer Acceptable with BitLocker N/A Acceptable with BitLocker Required Storing on removable media Acceptable N/A Acceptable Preferred Notes:  Information about applying Information Rights Management to a list or library is available at http://office.microsoft.com/en-us/sharepoint-server-help/apply-information-rights- management-to-a-list-or-library-HA010154148.aspx  More information about Information Rights Management is available in “What’s New with Information Rights Management in SharePoint and SharePoint Online?” at http://blogs.office.com/2012/11/09/whats-new-with-information-rights-management-in- sharepoint-and-sharepoint-online/
  • 5. 5 | Classifying and Protecting Your Business Information Classification and data dissemination guidelines The following table provides some classification-level guidelines for sending, sharing, storing, backing up, and disposing of business information. Table 4. Guidelines for sending, sharing, storing, backing up, and disposing of business information Action HBI MBI LBI Send data (via file transfer or email)  Requires asset owner approval to forward, export, or copy.  Requires encryption for internal and external delivery.  Requires encryption with S/MIME or IRM for email.  Requires encryption for transfer outside of organization.  Requires encryption with S/MIME for email sent outside the corporate network. No special requirements. Share (via O365 SharePoint Online)  Use IRM to restrict forwarding, copying, and printing.  Restrict permissions to those identified by asset owner.  Requires formal agreement, which legal approves, for third parties, such as business partners.  Restricts permissions to those with legitimate business needs only.  Requires formal agreement, which legal approves, for third parties, such as business partners. No special requirements. Store (server, PC, CD, USB)  Requires encryption (BitLocker).  Allows storage on handheld devices only if device supports strong encryption and authentication security controls.  May require encryption (as determined by the asset owner). No special requirements. Back up  Performed only by authorized personnel and stored only at a location approved by IT Security.  Encrypt storage media.  Store in a physically secure location in which backups are logged and access is controlled and monitored. No special requirements. Dispose of  Cross-shred or incinerate paper documents.  Destroy tapes and other magnetic media. Request that hard disk drives be destroyed.  Follow your organization policies for the appropriate disposal of retired hardware and media.  Cross-shred or incinerate paper documents.  Destroy tapes and other magnetic media.  Remove data on hard disks that you plan to reuse or retire.  Destroy inoperable hard disk drives. No special requirements.
  • 6. 6 | Classifying and Protecting Your Business Information Recommended security practices Use the Microsoft Office System Document Inspector If you plan to share an electronic copy of a Microsoft Office Word document with clients or colleagues, it is a good idea to review the document for hidden data or personal information that might be stored in the document itself or in the document properties (metadata). Document Inspector is a built-in tool that can be used to scan your data before sharing it with others. For more information on how to use Document Inspector, see Remove hidden data and personal information by inspecting documents at http://office.microsoft.com/en-us/word- help/remove-hidden-data-and-personal-information-by-inspecting-documents- HA010354329.aspx. Guard confidential information Do not discuss confidential information in public places. Beware of multiple network connections Never concurrently connect your computer to your corporate network and the Internet, or any other network that your company does not manage. This compromises your company's network security. Review list of group recipients Think globally before posting any content. Before you send or reply to email, post to Yammer, One Drive, or any another social website, or post data to SharePoint, make sure that the information is appropriate for disclosure to everyone who has access to the email or website. Use Outlook Web Access Use Outlook Web Access (OWA) to check your email from your home computer. Be careful if you access corporate resources by using kiosks and other public locations, even though OWA, as key strokes may be monitored if the public network does not have the correct configuration. Do not leave documents or presentations unattended Remove all documents after meetings, and erase whiteboards. Beware of posting on walls or bulletin boards If your document is HBI, do not post it in hallways or on bulletin boards.
  • 7. 7 | Classifying and Protecting Your Business Information For more information This guide provides foundational knowledge to help you make better decisions about securing your data. Other guides are available to teach you how to help protect your information. Visit the Modern IT Experience featuring IT Showcase at http://microsoft.com/microsoft-IT and search for the following Work Smart titles:  Securing your business information  Secure collaboration using SharePoint Online  Securing your computer  Protecting data with Windows 8 BitLocker The following content may be of interest to you as well:  Introduction to IRM for email messages http://office.microsoft.com/en-us/outlook-help/introduction-to-irm-for-email- messages-HA102749366.aspx  Video: Getting Started with Encrypting File System in Windows 7 http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the- encrypting-file-system-in-windows-7.aspx  International Data Protection Standards http://download.microsoft.com/download/B/8/2/B8282D75-433C-4B7E-B0A0- FFA413E20060/international_privacy_standards.pdf  Work Smart by Microsoft IT http://aka.ms/customerworksmart This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2014 Microsoft Corporation. All rights reserved.