SlideShare a Scribd company logo
Clark University
Data Classification Policies
(http://www.clarku.edu/datasecurity)
Confidential
(highest, most sensitive)
Restricted
(moderate level of sensitivity)
Public
(low level of sensitivity)
Description
Data which is legally regulated; and data that would
provide access to confidential or restricted information.
Data which the Data Managers have not decided to
publish or make public; and data protected by
contractual obligations.
Data which there is no expectation for privacy or
confidentiality.
Legal Requirements Protection of data is required by law.
Protection of data is at the discretion of the Data
Manager or Data Custodian.
Protection of data is at the discretion of the Data
Manager or Data Custodian.
Reputation Risk High Medium Low
Data Access and
Control
Legal, ethical, or other constraints prevent access without
specific authorization. Data is accessible only to those
individuals designated with approved access and signed
non-disclosure agreements; and typically on a business
“need to know” basis.
May be accessed by Clark employees and non-
employees who have a business “need to know.”
No access restrictions. Data is available for public
access.
Transmission
Transmission of Confidential data through any non-Clark
network or Clark guest network is prohibited (e.g.
Internet). Transmission through any electronic
messaging system (e-mail, instant messaging, text
messaging) is also prohibited.
Transmission of Restricted data through any wireless
network, and any non-Clark wired network is strongly
discouraged. Where necessary, use of the University’s
VPN is required. Transmission through any electronic
messaging system (e-mail, instant messaging, text
messaging), is also strongly discouraged.
No other protection is required for public
information; however, care should always be taken
to use all University information appropriately.
Storage
Storage of Confidential data is prohibited on unauthorized
Qualified Machines and Computing Equipment unless
approved by the Information Security Officer. If approved,
ITS approved encryption is required on mobile Computing
Equipment. ITS approved security measures are also
required if the data is not stored on a Qualified Machine.
Storage of credit card data on any Computing Equipment
is prohibited.
Level of required protection of Restricted data is
either pursuant to Clark policy or at the discretion of
the Data Manager or Data Custodian of the
information. If appropriate level of protection is not
known, check with Information Security Officer before
storing Restricted data unencrypted.
No other protection is required for public
information; however, care should always be taken
to use all University information appropriately.
Documented Backup
& Recovery
Procedures
Documented backup and recovery procedures are
required.
Documented backup and recovery procedures are not
necessary, but strongly encouraged.
Documented backup and recovery procedures are
not necessary, but strongly encouraged.
Documented Data
Retention Policy
Documented data retention policy is required. Documented data retention policy is required.
Documented data retention policy is not required,
but strongly encouraged.
Audit Controls
Data Managers and Data Custodians with responsibility for
Confidential data must actively monitor and review their
systems and procedures for potential misuse and/or
unauthorized access. They are also required to submit an
annual report to the Information Security Officer outlining
departmental security practices and training participation.
Data Managers and Data Custodians with
responsibility for Restricted data must periodically
monitor and review their systems and procedures for
potential misuse and/or unauthorized access.
No audit controls are required.
Last Updated: June 2015
Confidential
(highest, most sensitive)
Restricted
(moderate level of sensitivity)
Public
(low level of sensitivity)
Data Examples
(not all-inclusive)
* exceptions apply
Information resources with access to confidential or
restricted data (username and password).
Personally Identifiable Information (PII): Last name, first
name or initial with any one of following:
- Social Security Number (SSN)
- Driver’s license
- State ID card
- Passport number
- Financial account (checking, savings, brokerage, CD,
etc .), credit card, or debit card numbers
Protected Health Information (PHI) *
- Health status
- Healthcare treatment
- Healthcare payment
Personal/Employee Data
- Worker's compensation or disability claims
Student Data not included in directory information. This
includes:**
- Loan or scholarship information
- Payment history
- Student tuition bills
- Student financial services information
- Class lists or enrollment information
- Transcripts; grade reports
- Notes on class work
- Disciplinary action
- Athletics or department recruiting information
Business/Financial Data
- Credit card numbers with/without expiration dates
* Exceptions apply
** Recent case law related to FERPA suggests that
email containing information about a student’s
academic performance is not considered part of a
student’s “education record” unless the email is
centrally maintained by the University (e.g., printed off
and placed in the student’s file). Clark suggests that
faculty and staff be very mindful and attentive to the
seriousness of the information being communicated
about students as email is not a secure means of
transmission. When electronic communication about a
student is deemed necessary, faculty and staff should
make use of Clark’s email system and not other third
party email systems (e.g. Gmail).
Personal/Employee Data
- Clark ID number
- Income information and payroll information *
- Personnel records, performance reviews, benefit
information
- Race, ethnicity, nationality, gender
- Date and place of birth
- Directory/contact information designated by the
owner as private
Business/Financial Data
- Financial transactions which do not include
confidential data
- Information covered by non-disclosure agreements
- Contracts that don’t contain PII
- Credit reports
- Records on spending, borrowing, net worth
Academic / Research Information
- Library transactions (e.g., circulation, acquisitions)
- Unpublished research or research detail / results
that are not confidential data
- Private funding information
- Human subject information
- Course evaluations
Anonymous Donor Information
Last name, first name or initial (and/or name of
organization if applicable) with any type of gift
information (e.g., amount and purpose of commitment).
Other Donor Information
Last name, first name or initial (and/or name of
organization if applicable) with any of the following:
- Telephone/fax numbers, e-mail & employment
information
- Family information (spouse(s), partner, guardian,
children, grandchildren, etc.)
- Medical information
Management Data
- Detailed annual budget information
- Conflict of Interest Disclosures
- University's investment information
Systems/Log Data
- Server event logs
Certain directory/contact information not designated
by the owner as private.
- Name
- Addresses (campus and home)
- Email address
- Listed telephone number(s)
- Degrees, honors and awards
- Most recent previous educational institution
attended
- Major field of study
- Dates of current employment, position(s)
- ID card photographs for University use
Specific for students:
- Class year
- Participation in campus activities and sports
- Weight and height (athletics)
- Dates of attendance
- Status
Business Data
- Campus maps
- Job postings
- List of publications (published research)

More Related Content

What's hot

Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
Eryk Budi Pratama
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
Ariel Evans
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
DATAVERSITY
 
Activate Data Governance Using the Data Catalog
Activate Data Governance Using the Data CatalogActivate Data Governance Using the Data Catalog
Activate Data Governance Using the Data Catalog
DATAVERSITY
 
Data Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation SlidesData Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation Slides
SlideTeam
 
Data Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsData Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced Analytics
DATAVERSITY
 
Data Governance Takes a Village (So Why is Everyone Hiding?)
Data Governance Takes a Village (So Why is Everyone Hiding?)Data Governance Takes a Village (So Why is Everyone Hiding?)
Data Governance Takes a Village (So Why is Everyone Hiding?)
DATAVERSITY
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Eryk Budi Pratama
 
Data Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and GovernanceData Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and Governance
Denodo
 
TOP_407070357-Data-Governance-Playbook.pptx
TOP_407070357-Data-Governance-Playbook.pptxTOP_407070357-Data-Governance-Playbook.pptx
TOP_407070357-Data-Governance-Playbook.pptx
SabrinaLameiras1
 
Introduction to Data Governance
Introduction to Data GovernanceIntroduction to Data Governance
Introduction to Data Governance
John Bao Vuu
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
Alan McSweeney
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 
Data Governance
Data GovernanceData Governance
Data Governance
Rob Lux
 
How to Make a Data Governance Program that Lasts
How to Make a Data Governance Program that LastsHow to Make a Data Governance Program that Lasts
How to Make a Data Governance Program that Lasts
DATAVERSITY
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
dj1arry
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
Precisely
 

What's hot (20)

Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Activate Data Governance Using the Data Catalog
Activate Data Governance Using the Data CatalogActivate Data Governance Using the Data Catalog
Activate Data Governance Using the Data Catalog
 
Data Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation SlidesData Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation Slides
 
Data Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsData Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced Analytics
 
Data Governance Takes a Village (So Why is Everyone Hiding?)
Data Governance Takes a Village (So Why is Everyone Hiding?)Data Governance Takes a Village (So Why is Everyone Hiding?)
Data Governance Takes a Village (So Why is Everyone Hiding?)
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Data Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and GovernanceData Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and Governance
 
TOP_407070357-Data-Governance-Playbook.pptx
TOP_407070357-Data-Governance-Playbook.pptxTOP_407070357-Data-Governance-Playbook.pptx
TOP_407070357-Data-Governance-Playbook.pptx
 
Introduction to Data Governance
Introduction to Data GovernanceIntroduction to Data Governance
Introduction to Data Governance
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Data Governance
Data GovernanceData Governance
Data Governance
 
How to Make a Data Governance Program that Lasts
How to Make a Data Governance Program that LastsHow to Make a Data Governance Program that Lasts
How to Make a Data Governance Program that Lasts
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
 

Similar to Data classification-policy

Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
myeaton
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Privacy - Useful resources for department staff
Privacy - Useful resources for department staffPrivacy - Useful resources for department staff
Privacy - Useful resources for department staff
NSWCESE
 
FTC Safeguard
FTC SafeguardFTC Safeguard
Safeguarding Personal Health Information: HIPAA Rules on De-Identification
Safeguarding Personal Health Information: HIPAA Rules on De-IdentificationSafeguarding Personal Health Information: HIPAA Rules on De-Identification
Safeguarding Personal Health Information: HIPAA Rules on De-Identification
Conference Panel
 
20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf
SarahLopezMirasol
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
Sandra (Sandy) Dunn
 
The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)
LawPlus Ltd.
 
Protecting PII
Protecting PIIProtecting PII
Protecting PII
- Mark - Fullbright
 
GDPR Presentation
GDPR PresentationGDPR Presentation
GDPR Presentation
CILIP Ireland
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
 
GDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptxGDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptx
pixvilx
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - V
pkaviya
 
GDPR Demystified
GDPR Demystified GDPR Demystified
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoMegan Bell
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection Bill
TrustArc
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
Dunton Environmental
 

Similar to Data classification-policy (20)

Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Privacy - Useful resources for department staff
Privacy - Useful resources for department staffPrivacy - Useful resources for department staff
Privacy - Useful resources for department staff
 
FTC Safeguard
FTC SafeguardFTC Safeguard
FTC Safeguard
 
Safeguarding Personal Health Information: HIPAA Rules on De-Identification
Safeguarding Personal Health Information: HIPAA Rules on De-IdentificationSafeguarding Personal Health Information: HIPAA Rules on De-Identification
Safeguarding Personal Health Information: HIPAA Rules on De-Identification
 
20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)
 
Protecting PII
Protecting PIIProtecting PII
Protecting PII
 
GDPR Presentation
GDPR PresentationGDPR Presentation
GDPR Presentation
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
GDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptxGDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptx
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - V
 
GDPR Demystified
GDPR Demystified GDPR Demystified
GDPR Demystified
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection Bill
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Data classification-policy

  • 1. Clark University Data Classification Policies (http://www.clarku.edu/datasecurity) Confidential (highest, most sensitive) Restricted (moderate level of sensitivity) Public (low level of sensitivity) Description Data which is legally regulated; and data that would provide access to confidential or restricted information. Data which the Data Managers have not decided to publish or make public; and data protected by contractual obligations. Data which there is no expectation for privacy or confidentiality. Legal Requirements Protection of data is required by law. Protection of data is at the discretion of the Data Manager or Data Custodian. Protection of data is at the discretion of the Data Manager or Data Custodian. Reputation Risk High Medium Low Data Access and Control Legal, ethical, or other constraints prevent access without specific authorization. Data is accessible only to those individuals designated with approved access and signed non-disclosure agreements; and typically on a business “need to know” basis. May be accessed by Clark employees and non- employees who have a business “need to know.” No access restrictions. Data is available for public access. Transmission Transmission of Confidential data through any non-Clark network or Clark guest network is prohibited (e.g. Internet). Transmission through any electronic messaging system (e-mail, instant messaging, text messaging) is also prohibited. Transmission of Restricted data through any wireless network, and any non-Clark wired network is strongly discouraged. Where necessary, use of the University’s VPN is required. Transmission through any electronic messaging system (e-mail, instant messaging, text messaging), is also strongly discouraged. No other protection is required for public information; however, care should always be taken to use all University information appropriately. Storage Storage of Confidential data is prohibited on unauthorized Qualified Machines and Computing Equipment unless approved by the Information Security Officer. If approved, ITS approved encryption is required on mobile Computing Equipment. ITS approved security measures are also required if the data is not stored on a Qualified Machine. Storage of credit card data on any Computing Equipment is prohibited. Level of required protection of Restricted data is either pursuant to Clark policy or at the discretion of the Data Manager or Data Custodian of the information. If appropriate level of protection is not known, check with Information Security Officer before storing Restricted data unencrypted. No other protection is required for public information; however, care should always be taken to use all University information appropriately. Documented Backup & Recovery Procedures Documented backup and recovery procedures are required. Documented backup and recovery procedures are not necessary, but strongly encouraged. Documented backup and recovery procedures are not necessary, but strongly encouraged. Documented Data Retention Policy Documented data retention policy is required. Documented data retention policy is required. Documented data retention policy is not required, but strongly encouraged. Audit Controls Data Managers and Data Custodians with responsibility for Confidential data must actively monitor and review their systems and procedures for potential misuse and/or unauthorized access. They are also required to submit an annual report to the Information Security Officer outlining departmental security practices and training participation. Data Managers and Data Custodians with responsibility for Restricted data must periodically monitor and review their systems and procedures for potential misuse and/or unauthorized access. No audit controls are required. Last Updated: June 2015
  • 2. Confidential (highest, most sensitive) Restricted (moderate level of sensitivity) Public (low level of sensitivity) Data Examples (not all-inclusive) * exceptions apply Information resources with access to confidential or restricted data (username and password). Personally Identifiable Information (PII): Last name, first name or initial with any one of following: - Social Security Number (SSN) - Driver’s license - State ID card - Passport number - Financial account (checking, savings, brokerage, CD, etc .), credit card, or debit card numbers Protected Health Information (PHI) * - Health status - Healthcare treatment - Healthcare payment Personal/Employee Data - Worker's compensation or disability claims Student Data not included in directory information. This includes:** - Loan or scholarship information - Payment history - Student tuition bills - Student financial services information - Class lists or enrollment information - Transcripts; grade reports - Notes on class work - Disciplinary action - Athletics or department recruiting information Business/Financial Data - Credit card numbers with/without expiration dates * Exceptions apply ** Recent case law related to FERPA suggests that email containing information about a student’s academic performance is not considered part of a student’s “education record” unless the email is centrally maintained by the University (e.g., printed off and placed in the student’s file). Clark suggests that faculty and staff be very mindful and attentive to the seriousness of the information being communicated about students as email is not a secure means of transmission. When electronic communication about a student is deemed necessary, faculty and staff should make use of Clark’s email system and not other third party email systems (e.g. Gmail). Personal/Employee Data - Clark ID number - Income information and payroll information * - Personnel records, performance reviews, benefit information - Race, ethnicity, nationality, gender - Date and place of birth - Directory/contact information designated by the owner as private Business/Financial Data - Financial transactions which do not include confidential data - Information covered by non-disclosure agreements - Contracts that don’t contain PII - Credit reports - Records on spending, borrowing, net worth Academic / Research Information - Library transactions (e.g., circulation, acquisitions) - Unpublished research or research detail / results that are not confidential data - Private funding information - Human subject information - Course evaluations Anonymous Donor Information Last name, first name or initial (and/or name of organization if applicable) with any type of gift information (e.g., amount and purpose of commitment). Other Donor Information Last name, first name or initial (and/or name of organization if applicable) with any of the following: - Telephone/fax numbers, e-mail & employment information - Family information (spouse(s), partner, guardian, children, grandchildren, etc.) - Medical information Management Data - Detailed annual budget information - Conflict of Interest Disclosures - University's investment information Systems/Log Data - Server event logs Certain directory/contact information not designated by the owner as private. - Name - Addresses (campus and home) - Email address - Listed telephone number(s) - Degrees, honors and awards - Most recent previous educational institution attended - Major field of study - Dates of current employment, position(s) - ID card photographs for University use Specific for students: - Class year - Participation in campus activities and sports - Weight and height (athletics) - Dates of attendance - Status Business Data - Campus maps - Job postings - List of publications (published research)