Data Classification Guide

Description

All UCO Faculty, staff, students and contractors are responsible for protecting the university data they access or use within the scope of their employment and must comply with the UCO Information Security Policy.  The policy applies to all devices used to access university data including university owned and managed computers as well as personal devices (tablets, smartphones, thumb drives).

It is your responsibility to know the security classification for the data you are authorized to use, the appropriate places to store the data, how to securely dispose of the data, and how to report a breach or compromise of university data.

The objective of this guide is to assist you in classifying the data you use and determining the appropriate storage options.  

Instructions

The university's complete Data Classification Policy is available for your review.

Review the complete Data Classification Guide.

 

DATA CLASSIFICATION GUIDE

All UCO Faculty, staff, students and contractors are responsible for protecting the university data they access or use within the scope of their employment and must comply with the UCO Information Security Policy. The policy applies to all devices used to access university data including university owned and managed computers as well as personal devices (tablets, Smartphones, thumb drives).

It is your responsibility to know the security classification for the data you are authorized to use, the appropriate places to store the data, how to securely dispose of the data, and how to report a breach or compromise of university data.

The objective of this guide is to assist you in classifying the data you use and determining the appropriate storage options.

 

DATA CLASSIFICATION

CONFIDENTIAL

 
   

Confidential Information can only be shared on a “need to know” basis with a limited number of individuals who have been identified by the appropriate Information Owner/designee or by the Information Security Governance Board. Confidential information includes information that is protected under government, Regents, or university regulation. Controlled use. (High Risk)

INTERNAL

 
   
  Internal information can be shared with designated members of the University community. Sharing such information with individuals outside of the University community requires authorization by the appropriate Information Owner/designee. (Moderate Risk)

PUBLIC

  Public information can be freely shared with individuals on or off campus without any further authorization by the appropriate Information Owner/designee. (Low Risk)

 

Uploaded Image (Thumbnail)

Click image to enlarge

 

CLASSIFICATION OF COMMONLY USED UCO DATA

   

  The following table identifies the security classification for data commonly used at UCO. This list is not comprehensive and is meant to serve only as an example. It is your responsibility as the user of data to know its classification and ensure that the correct storage and sharing procedures are followed.

 

Data Type

Confidential

Internal

Public

 

 

 

 

 

 

 

May be stored in…

OnBase, UCO Fileshares, UCO Designated File Share/Collaboration, Blackboard Transact, Banner, D2L, Qualtrics, People Admin, Maxient, Blackboard Analytics, UCO OneDrive*

* Social Security Numbers should NOT be stored in OneDrive

 

 

 

Wiki, Email, Portal, Video from Surveillance, Basecamp

 

Plus confidential storage options.

UCO – owned Desktop Computers, Web, Mobile Devices, Crash Plan, thumb drives, Non-UCO affiliated Dropbox accounts*, Non-UCO OneDrive accounts*, Non-UCO affiliated Google Drive accounts*, etc.

Plus confidential or internal storage options.

Banner ID

x

 

 

Student email address and communications

x

x

 

Student Grades

x

 

 

Student Ethnicity

x

 

 

Student Gender

x

 

 

Student and Staff Social Security Numbers

x

 

 

Date and Place of Birth

x

 

 

Credit Card

 

Credit Card information cannot be stored on UCO systems.

 

 

 

Bank Account Information

 

Bank Account information can be stored in UCO approved payroll system only.

 

 

 

Driver’s License Numbers

x

 

 

Compiled student data without identifiers

x

x

 

Text for Department Website

x

x

x

Conference Presentation

x

x

x

Department Report/Presentation

x

x

 

 

*A non-UCO affiliated account refers to any account that is established using an email other than an email address ending in "@uco.edu".

 

COMMON EXAMPLES OF EFFECTIVE DATA USE AND STORAGE

I have downloaded student grades from D2L and have them in an Excel document. Can I store that on my desktop computer?

  • No. Student grades are considered confidential data and must be stored using a designated storage option.

You have a report that includes student Banner ID numbers. Can I send that report to a UCO employee using my UCO.edu email.

  • No. Banner IDs are considered confidential data and must be stored and shared using a designated storage option. Email can only be used to share Internal or Public data.

I am giving a presentation at conference next week. Can I store my presentation files on a thumb drive?

  • Yes. Depending on the data included in your presentation and with appropriate authorizations (e.g. IRB approval, etc.), conference presentation files would likely be classified as public and can be stored on a thumb drive.

QUESTIONS AND CONSULTATION REGARDING DATA CLASSIFICATION AND USE

For questions regarding data classification and storage, contact the UCO Service Desk at 405-974-2255 or support@uco.edu.

 

 

Data Classification Policy

Purpose

The purpose of this policy is to provide a security framework that will ensure the protection of University of Central Oklahoma ("University" or "UCO") information from unauthorized access, loss or damage while supporting the open, information-sharing needs of our academic culture. University Information may be verbal, digital, and/or hardcopy, individually controlled or shared, stand-alone or networked, used for administration, research, teaching, or other purposes. Standards and procedures related to this policy will be developed and published separately.

Terms and Definitions

Term Definition
Data

Groups of information that represent attributes of variables stored, transmitted and/or processed by information systems.

Availability The function of establishing an individual's privilege levels to access and/or handle information.
 
Confidentiality Ensuring that information is kept in strict privacy. 
 
Integrity Ensuring the accuracy, completeness, and consistency of information.
 
Unauthorized access Looking up, reviewing, copying, modifying, deleting, analyzing, or handling information without proper authorization and legitimate business need.
 
University information Information that UCO collects, possesses, or has access to, regardless of its source. This includes information contained in hard copy documents or other media, communicated over voice or data networks, or exchanged in conversation.

                                                                                                                                                                                                   

Scope

This Policy applies to:

  1. This policy applies to all divisions, colleges and units established by the University of Central Oklahoma that exercise any information technology function relating to the mission of the University except for those specifically exempted in writing by the President of the University.
  1. This policy applies to University computer and telecommunications systems; faculty, staff, and students; academic and administrative units; affiliated entities, agents, contractors, and volunteers of the University, members of the community who use and/or administer such systems, or any information asset (as defined in the Information Security policy) that connects directly or indirectly to any UCO owned, leased, contracted, or operated computer or telecommunication system.

Rationale

  1. The ability for UCO to meet the daily needs of the academic, administrative, and research communities is facilitated, in large part, through the use of information assets to meet their diverse requirements (e.g., collaboration, research, communication, etc.). While critical to the business of the University, these assets also introduce risks. The risks and corresponding threats associated with information technology are increasing in both number and variety. Information technology (IT) infrastructures are increasingly complex to implement and administer. The advent of hacking tools and persons willing to distribute viruses and malicious code have increased the risks to organizations and the assets they are charged to safeguard.
     
  2. University mission-critical functions supported by information systems continue to expand. Although some data and systems may not be classified as mission critical, they nevertheless represent a significant investment in resources, may contain sensitive data, and are efficient methods of providing a wide range of education related services. Coupled with overall system integration and interconnectivity, University systems and networks are increasingly at risk to intrusions, misuse of data, and other attacks from both internal and external sources.

Policy Details

  1. The University must provide its faculty, students and staff (to include contractors or other authorized agents with access to University information resources, data or assets) with clear direction for the safeguarding of University information data.
  2. This data classification policy establishes the overall intent of the organization to support and promote data classification and data security in all its practices.
  3. Statements created to support particular elements of the data classification practice at the University will be organized into existing policies, standards, requirements, guidelines, and practices. Creation of new policies, standards, requirements, guidelines, and practices to support the intent of this policy is allowed.
  4. The Director of Information Security or designee(s), as appointed by the Chief Information Officer in the Office of Information Technology, will manage the data classification policy.
  1. Documents classified as either Restricted or Confidential (as described below) shall have the appropriate classification level noted on each page.

Classification Levels

All University Information is classified into one of four levels based on its sensitivity and the risks associated with disclosure. The classification level determines the security protections that must be used for the information.

  1. RESTRICTED

The following University Information is classified as Restricted:

  1. Social Security numbers
  2. Bank account, credit card/debit card numbers
  3. Driver's License, state, government ID numbers
  4. Student education and financial records, including UCO ID/Banner/student ID numbers
  5. Information protected by the HIPAA Privacy Rule, under the Americans with Disabilities Act (e.g., individuals' medical records and other individually identifiable health information), or the Family Educational Rights and Privacy Act (FERPA).
  6. Other identifiers or records (as defined by State or Federal Law)

State and Federal laws require that unauthorized access to, or disclosure of, certain Restricted information must be reported to the appropriate agency or agencies. Any reporting of this nature to external parties must be done by or in consultation with the Office of the General Counsel and the Office of Information Technology (OIT) - Information Security Department (ISO) at the Service Desk, or by phone at (405) 974-2255.

SHARING RESTRICTED INFORMATION:

Sharing of Restricted information within the University may be permissible, if necessary, to meet the University's legitimate business needs. Restricted data elements are subject to specific sharing methods. Any sharing of Restricted information within the University must comply with this and other applicable University policies. Except as otherwise required by law (or for purposes of sharing between law enforcement entities), Restricted information may not be disclosed to parties outside the University, including contractors, without the proposed recipient's prior written agreement; the proposed recipient must agree:

  1. To take appropriate measures to safeguard the confidentiality of the Restricted information.
  2. Not to disclose the Restricted information to any other party for any purpose absent the University's prior written consent or a valid court order or subpoena.
  3. To notify the University Office of General Counsel in advance of any disclosure pursuant to a court order or subpoena unless the order or subpoena explicitly prohibits such notification.
  4. The proposed recipient must abide by the requirements of this policy.

CONFIDENTIAL

University Information is classified as Confidential if it falls outside the Restricted classification but is not intended to be shared freely within or outside the University due to its sensitive nature and/or contractual or legal obligations. Examples of Confidential Information include:

  1. Non-Restricted info in personnel files.
  2. Donor records.
  3. Internal memos, emails, forms, and non-public business documents.
  4. Information governed by non-disclosure agreements.
  5. Attorney-client communications.
  6. Digital copies of signatures.
  7. Information obtained via a UCO system requiring a username and password.

SHARING OF CONFIDENTIAL INFORMATION:

Sharing of Confidential information may be permissible, if necessary, to meet the University's legitimate business needs. Unless disclosure is required by law (or for purposes of sharing between law enforcement entities), when disclosing Confidential information to parties outside the University, the proposed recipient must agree:

  1. To take appropriate measures to safeguard the confidentiality of the information.
  2. Not to disclose the information to any other party for any purpose absent the University's prior written consent or a valid court order or subpoena.
  3. Notify the University in advance of any disclosure pursuant to a court order or subpoena unless the order or subpoena explicitly prohibits such notification.
  4. The proposed recipient must abide by the requirements of this policy.

UNRESTRICTED INTERNAL

University Information is classified as Unrestricted Internal if it falls outside the Restricted and Confidential classifications but is not intended to be freely shared outside the University.

The presumption is that Unrestricted Internal information will remain within UCO. However, this information may be shared outside of UCO if necessary, to meet the University's legitimate business needs, and the proposed recipient agrees not to re-disclose the information without the University's consent.

PUBLIC

University Information is classified as Publicly Available if it falls outside the Restricted, Confidential or Unrestricted Internal classification..

Protection, Handling, and Classification of Information

  1. Based on its classification, University information must be appropriately protected from unauthorized access, loss and disclosure.
  2. Handling of University Information from any source other than UCO may require compliance with both this policy and the requirements of the individual or entity that created, provided or controls the information. If you have concerns about your ability to comply, consult the Office of the General Counsel.
  3. When deemed appropriate, the level of classification may be increased, or additional security requirements imposed beyond what is required by the Data Classification Policy.

Responsibilities

  1. All UCO faculty, staff, students (when acting on behalf of the University through service on University bodies), and others granted use of University Information are expected to:
  2. Understand   the   information   classification   levels defined in  the Data Classification Policy.
  3. As appropriate, classify and label the information for which one is responsible accordingly.
  4. Access information only as needed to meet legitimate business needs.
  5. Not divulge, copy, release, sell, loan, alter or destroy any University Information without a valid business purpose and/or authorization.
  1. Protect the confidentiality, integrity and availability of University Information in a manner consistent with the information's classification level and type.
  2. Handle information in accordance with this policy and any other applicable University standard or policy.
  3. Safeguard any physical key, ID card, computer account, or network account that allows one to access University Information.
  4. Discard media containing UCO information in a manner consistent with the information's classification level, type, and any applicable University retention requirement.
  5. Contact the Office of the General Counsel prior to disclosing information generated by that Office or prior to responding to any litigation or law enforcement subpoenas, court orders, and other information requests from private litigants and government agencies.
  6. Contact the appropriate University office prior to responding to requests for information from regulatory agencies, inspectors, examiners, and/or auditors.

Policy Violations

  1. Disciplinary action for violating this policy shall be governed by, but may not be limited to the applicable provisions of the Regional University System of Oklahoma Policy Manual, the UCO Code of Student Conduct, the UCO Employee Handbook, the UCO Faculty Handbook, the Oklahoma State Regents for Higher Education and state and federal laws. Persons who violate this policy may have their access privileges to UCO computing and networking systems revoked and/or other disciplinary action, including but not limited to termination of employment or enrollment.,
  2. All supervisory personnel are responsible for ensuring that employees whom they supervise complete all required training related to this policy and for reporting suspected violations of this policy to the UCO Office of Information Technology and the UCO Office of People and Culture. Any user may report University policy or law violations to their immediate supervisor, representative faculty or school personnel or using UCOMMENT (https://broncho2.uco.edu/ucomment/main menu).

Resources

Related Policies, Standards, and Requirements: Information Security Policy,

Privacy Policy,

Technology Acceptable Use Policy

Information Security Standards, Requirements, Guides, and Summaries:

 

 

 
 


Data Classification Guide and Summaries

 

Approved: Andrew Benton, President

Date             13, 2f21..�

Print Article

Related Articles (3)

In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.
The Office of Information Technology provides all UCO faculty and staff with a "P" Drive which is a secure and private environment for storing professional files. The P Drive can be accessed by all UCO faculty and staff regardless of if they are working on-campus or remotely.
The Office of Information Technology is committed to protecting the University of Central Oklahoma; its students, faculty and staff; and its partners from knowingly or unknowingly using technology illegally or through damaging actions. The complete list of policies, guidelines, and procedures regarding the protection and security of technological information that will serve as the University’s standards is listed within this article.