Data Classification Guide


All UCO Faculty, staff, students and contractors are responsible for protecting the university data they access or use within the scope of their employment and must comply with the UCO Information Security Policy.  The policy applies to all devices used to access university data including university owned and managed computers as well as personal devices (tablets, Smartphones, thumb drives).

It is your responsibility to know the security classification for the data you are authorized to use, the appropriate places to store the data, how to securely dispose of the data, and how to report a breach or compromise of university data.

The objective of this guide is to assist you in classifying the data you use and determining the appropriate storage options.  


Review the complete Data Classification Guide.

87% helpful - 15 reviews


Article ID: 41837
Thu 11/2/17 12:12 PM
Thu 10/12/23 2:20 PM

Related Articles (3)

In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.
The Office of Information Technology provides all UCO faculty and staff with a "P" Drive which is a secure and private environment for storing professional files. The P Drive can be accessed by all UCO faculty and staff regardless of if they are working on-campus or remotely.
The Office of Information Technology is committed to protecting the University of Central Oklahoma; its students, faculty and staff; and its partners from knowingly or unknowingly using technology illegally or through damaging actions. The complete list of policies, guidelines, and procedures regarding the protection and security of technological information that will serve as the University’s standards is listed within this article.