Description
All UCO Faculty, staff, students and contractors are responsible for protecting the university data they access or use within the scope of their employment and must comply with the UCO Information Security Policy. The policy applies to all devices used to access university data including university owned and managed computers as well as personal devices (tablets, smartphones, thumb drives).
It is your responsibility to know the security classification for the data you are authorized to use, the appropriate places to store the data, how to securely dispose of the data, and how to report a breach or compromise of university data.
The objective of this guide is to assist you in classifying the data you use and determining the appropriate storage options.
Instructions
The university's complete Data Classification Policy is available for your review.
Review the complete Data Classification Guide.
DATA CLASSIFICATION GUIDE
All UCO Faculty, staff, students and contractors are responsible for protecting the university data they access or use within the scope of their employment and must comply with the UCO Information Security Policy. The policy applies to all devices used to access university data including university owned and managed computers as well as personal devices (tablets, Smartphones, thumb drives).
It is your responsibility to know the security classification for the data you are authorized to use, the appropriate places to store the data, how to securely dispose of the data, and how to report a breach or compromise of university data.
The objective of this guide is to assist you in classifying the data you use and determining the appropriate storage options.
|
Confidential Information can only be shared on a “need to know” basis with a limited number of individuals who have been identified by the appropriate Information Owner/designee or by the Information Security Governance Board. Confidential information includes information that is protected under government, Regents, or university regulation. Controlled use. (High Risk)
Internal information can be shared with designated members of the University community. Sharing such information with individuals outside of the University community requires authorization by the appropriate Information Owner/designee. (Moderate Risk)
Public information can be freely shared with individuals on or off campus without any further authorization by the appropriate Information Owner/designee. (Low Risk)
Click image to enlarge
CLASSIFICATION OF COMMONLY USED UCO DATA
|
The following table identifies the security classification for data commonly used at UCO. This list is not comprehensive and is meant to serve only as an example. It is your responsibility as the user of data to know its classification and ensure that the correct storage and sharing procedures are followed.
|
Data Type
|
Confidential
|
Internal
|
Public
|
|
May be stored in…
|
OnBase, UCO Fileshares, UCO Designated File Share/Collaboration, Blackboard Transact, Banner, D2L, Qualtrics, People Admin, Maxient, Blackboard Analytics, UCO OneDrive*
* Social Security Numbers should NOT be stored in OneDrive
|
Wiki, Email, Portal, Video from Surveillance, Basecamp
Plus confidential storage options.
|
UCO – owned Desktop Computers, Web, Mobile Devices, Crash Plan, thumb drives, Non-UCO affiliated Dropbox accounts*, Non-UCO OneDrive accounts*, Non-UCO affiliated Google Drive accounts*, etc.
Plus confidential or internal storage options.
|
|
Banner ID
|
x
|
|
|
|
Student email address and communications
|
x
|
x
|
|
|
Student Grades
|
x
|
|
|
|
Student Ethnicity
|
x
|
|
|
|
Student Gender
|
x
|
|
|
|
Student and Staff Social Security Numbers
|
x
|
|
|
|
Date and Place of Birth
|
x
|
|
|
|
Credit Card
Credit Card information cannot be stored on UCO systems.
|
|
|
|
|
Bank Account Information
Bank Account information can be stored in UCO approved payroll system only.
|
|
|
|
|
Driver’s License Numbers
|
x
|
|
|
|
Compiled student data without identifiers
|
x
|
x
|
|
|
Text for Department Website
|
x
|
x
|
x
|
|
Conference Presentation
|
x
|
x
|
x
|
|
Department Report/Presentation
|
x
|
x
|
|
*A non-UCO affiliated account refers to any account that is established using an email other than an email address ending in "@uco.edu".
COMMON EXAMPLES OF EFFECTIVE DATA USE AND STORAGE
|
I have downloaded student grades from D2L and have them in an Excel document. Can I store that on my desktop computer?
- No. Student grades are considered confidential data and must be stored using a designated storage option.
You have a report that includes student Banner ID numbers. Can I send that report to a UCO employee using my UCO.edu email.
- No. Banner IDs are considered confidential data and must be stored and shared using a designated storage option. Email can only be used to share Internal or Public data.
I am giving a presentation at conference next week. Can I store my presentation files on a thumb drive?
- Yes. Depending on the data included in your presentation and with appropriate authorizations (e.g. IRB approval, etc.), conference presentation files would likely be classified as public and can be stored on a thumb drive.
QUESTIONS AND CONSULTATION REGARDING DATA CLASSIFICATION AND USE
For questions regarding data classification and storage, contact the UCO Service Desk at 405-974-2255 or support@uco.edu.
Data Classification Policy
Purpose
The purpose of this policy is to provide a security framework that will ensure the protection of University of Central Oklahoma ("University" or "UCO") information from unauthorized access, loss or damage while supporting the open, information-sharing needs of our academic culture. University Information may be verbal, digital, and/or hardcopy, individually controlled or shared, stand-alone or networked, used for administration, research, teaching, or other purposes. Standards and procedures related to this policy will be developed and published separately.
Terms and Definitions
| Term |
Definition |
| Data |
Groups of information that represent attributes of variables stored, transmitted and/or processed by information systems.
|
| Availability |
The function of establishing an individual's privilege levels to access and/or handle information.
|
| Confidentiality |
Ensuring that information is kept in strict privacy.
|
| Integrity |
Ensuring the accuracy, completeness, and consistency of information.
|
| Unauthorized access |
Looking up, reviewing, copying, modifying, deleting, analyzing, or handling information without proper authorization and legitimate business need.
|
| University information |
Information that UCO collects, possesses, or has access to, regardless of its source. This includes information contained in hard copy documents or other media, communicated over voice or data networks, or exchanged in conversation. |
![]()
Scope
This Policy applies to:
- This policy applies to all divisions, colleges and units established by the University of Central Oklahoma that exercise any information technology function relating to the mission of the University except for those specifically exempted in writing by the President of the University.
- This policy applies to University computer and telecommunications systems; faculty, staff, and students; academic and administrative units; affiliated entities, agents, contractors, and volunteers of the University, members of the community who use and/or administer such systems, or any information asset (as defined in the Information Security policy) that connects directly or indirectly to any UCO owned, leased, contracted, or operated computer or telecommunication system.
Rationale
- The ability for UCO to meet the daily needs of the academic, administrative, and research communities is facilitated, in large part, through the use of information assets to meet their diverse requirements (e.g., collaboration, research, communication, etc.). While critical to the business of the University, these assets also introduce risks. The risks and corresponding threats associated with information technology are increasing in both number and variety. Information technology (IT) infrastructures are increasingly complex to implement and administer. The advent of hacking tools and persons willing to distribute viruses and malicious code have increased the risks to organizations and the assets they are charged to safeguard.
- University mission-critical functions supported by information systems continue to expand. Although some data and systems may not be classified as mission critical, they nevertheless represent a significant investment in resources, may contain sensitive data, and are efficient methods of providing a wide range of education related services. Coupled with overall system integration and interconnectivity, University systems and networks are increasingly at risk to intrusions, misuse of data, and other attacks from both internal and external sources.
Policy Details
- The University must provide its faculty, students and staff (to include contractors or other authorized agents with access to University information resources, data or assets) with clear direction for the safeguarding of University information data.
- This data classification policy establishes the overall intent of the organization to support and promote data classification and data security in all its practices.
- Statements created to support particular elements of the data classification practice at the University will be organized into existing policies, standards, requirements, guidelines, and practices. Creation of new policies, standards, requirements, guidelines, and practices to support the intent of this policy is allowed.
- The Director of Information Security or designee(s), as appointed by the Chief Information Officer in the Office of Information Technology, will manage the data classification policy.
- Documents classified as either Restricted or Confidential (as described below) shall have the appropriate classification level noted on each page.
Classification Levels
All University Information is classified into one of four levels based on its sensitivity and the risks associated with disclosure. The classification level determines the security protections that must be used for the information.
-
RESTRICTED
The following University Information is classified as Restricted:
- Social Security numbers
- Bank account, credit card/debit card numbers
- Driver's License, state, government ID numbers
- Student education and financial records, including UCO ID/Banner/student ID numbers
- Information protected by the HIPAA Privacy Rule, under the Americans with Disabilities Act (e.g., individuals' medical records and other individually identifiable health information), or the Family Educational Rights and Privacy Act (FERPA).
- Other identifiers or records (as defined by State or Federal Law)
State and Federal laws require that unauthorized access to, or disclosure of, certain Restricted information must be reported to the appropriate agency or agencies. Any reporting of this nature to external parties must be done by or in consultation with the Office of the General Counsel and the Office of Information Technology (OIT) - Information Security Department (ISO) at the Service Desk, or by phone at (405) 974-2255.
SHARING RESTRICTED INFORMATION:
Sharing of Restricted information within the University may be permissible, if necessary, to meet the University's legitimate business needs. Restricted data elements are subject to specific sharing methods. Any sharing of Restricted information within the University must comply with this and other applicable University policies. Except as otherwise required by law (or for purposes of sharing between law enforcement entities), Restricted information may not be disclosed to parties outside the University, including contractors, without the proposed recipient's prior written agreement; the proposed recipient must agree:
- To take appropriate measures to safeguard the confidentiality of the Restricted information.
- Not to disclose the Restricted information to any other party for any purpose absent the University's prior written consent or a valid court order or subpoena.
- To notify the University Office of General Counsel in advance of any disclosure pursuant to a court order or subpoena unless the order or subpoena explicitly prohibits such notification.
- The proposed recipient must abide by the requirements of this policy.
CONFIDENTIAL
University Information is classified as Confidential if it falls outside the Restricted classification but is not intended to be shared freely within or outside the University due to its sensitive nature and/or contractual or legal obligations. Examples of Confidential Information include:
- Non-Restricted info in personnel files.
- Donor records.
- Internal memos, emails, forms, and non-public business documents.
- Information governed by non-disclosure agreements.
- Attorney-client communications.
- Digital copies of signatures.
- Information obtained via a UCO system requiring a username and password.
SHARING OF CONFIDENTIAL INFORMATION:
Sharing of Confidential information may be permissible, if necessary, to meet the University's legitimate business needs. Unless disclosure is required by law (or for purposes of sharing between law enforcement entities), when disclosing Confidential information to parties outside the University, the proposed recipient must agree:
- To take appropriate measures to safeguard the confidentiality of the information.
- Not to disclose the information to any other party for any purpose absent the University's prior written consent or a valid court order or subpoena.
- Notify the University in advance of any disclosure pursuant to a court order or subpoena unless the order or subpoena explicitly prohibits such notification.
- The proposed recipient must abide by the requirements of this policy.
UNRESTRICTED INTERNAL
University Information is classified as Unrestricted Internal if it falls outside the Restricted and Confidential classifications but is not intended to be freely shared outside the University.
The presumption is that Unrestricted Internal information will remain within UCO. However, this information may be shared outside of UCO if necessary, to meet the University's legitimate business needs, and the proposed recipient agrees not to re-disclose the information without the University's consent.
PUBLIC
University Information is classified as Publicly Available if it falls outside the Restricted, Confidential or Unrestricted Internal classification..
Protection, Handling, and Classification of Information
- Based on its classification, University information must be appropriately protected from unauthorized access, loss and disclosure.
- Handling of University Information from any source other than UCO may require compliance with both this policy and the requirements of the individual or entity that created, provided or controls the information. If you have concerns about your ability to comply, consult the Office of the General Counsel.
- When deemed appropriate, the level of classification may be increased, or additional security requirements imposed beyond what is required by the Data Classification Policy.
Responsibilities
- All UCO faculty, staff, students (when acting on behalf of the University through service on University bodies), and others granted use of University Information are expected to:
- Understand the information classification levels defined in the Data Classification Policy.
- As appropriate, classify and label the information for which one is responsible accordingly.
- Access information only as needed to meet legitimate business needs.
- Not divulge, copy, release, sell, loan, alter or destroy any University Information without a valid business purpose and/or authorization.
- Protect the confidentiality, integrity and availability of University Information in a manner consistent with the information's classification level and type.
- Handle information in accordance with this policy and any other applicable University standard or policy.
- Safeguard any physical key, ID card, computer account, or network account that allows one to access University Information.
- Discard media containing UCO information in a manner consistent with the information's classification level, type, and any applicable University retention requirement.
- Contact the Office of the General Counsel prior to disclosing information generated by that Office or prior to responding to any litigation or law enforcement subpoenas, court orders, and other information requests from private litigants and government agencies.
- Contact the appropriate University office prior to responding to requests for information from regulatory agencies, inspectors, examiners, and/or auditors.
Policy Violations
- Disciplinary action for violating this policy shall be governed by, but may not be limited to the applicable provisions of the Regional University System of Oklahoma Policy Manual, the UCO Code of Student Conduct, the UCO Employee Handbook, the UCO Faculty Handbook, the Oklahoma State Regents for Higher Education and state and federal laws. Persons who violate this policy may have their access privileges to UCO computing and networking systems revoked and/or other disciplinary action, including but not limited to termination of employment or enrollment.,
- All supervisory personnel are responsible for ensuring that employees whom they supervise complete all required training related to this policy and for reporting suspected violations of this policy to the UCO Office of Information Technology and the UCO Office of People and Culture. Any user may report University policy or law violations to their immediate supervisor, representative faculty or school personnel or using UCOMMENT (https://broncho2.uco.edu/ucomment/main menu).
Resources
Related Policies, Standards, and Requirements: Information Security Policy,
Privacy Policy,
Technology Acceptable Use Policy
Information Security Standards, Requirements, Guides, and Summaries:
| |
| |
![]() |
Data Classification Guide and Summaries
Approved: Andrew Benton, President
Date� 13, 2f21..�