Data Classification Categories

Tags governance

Question

What are the data classification categories used at the University of South Dakota?

Answer

What is data classification?

Data classification is the process of separating and organizing data into relevant groups (“classes”) based on their shared characteristics, such as their level of sensitivity, the risks they present, and the compliance regulations that protect them. To protect sensitive data, it must be located, classified according to its level of sensitivity, and accurately tagged. Then, enterprises must handle each group of data in ways that ensure only authorized people can gain access, both internally and externally, and that the data is always handled in full compliance with all relevant regulations.

There are endless ways to classify data, but the University of South Dakota categorize data as variations of a four-level data classification schema — public, private, confidential, and restricted.

  1. Public — Information that is freely available and accessible to the public without any restrictions or adverse consequences.  This is often referred to as directory data.
  2. Internal — Data with low security requirements, but not meant for public disclosure, such as student or client communications and organizational charts. Unauthorized disclosure of such information can lead to short-term embarrassment and loss of competitive advantage.
  3. Restricted — Highly sensitive university data that if compromised could put the organization at financial, legal, regulatory, and reputational risk. Examples include customers’ academic, Personal Identifying Information (PII), Personal Health Information (PHI), banking, credit card or financial information.

Details

Article ID: 8826
Created
Tue 12/19/23 1:43 PM
Modified
Fri 4/26/24 4:45 PM
KCS Article Status
WIP: Only Problem & some Environment captured
Not Validated: Complete & Resolution captured, confidence lacks in structure, content, no feedback
Validated: Complete & reusable, used by licensed KCS user, confidence in resolution & std. compliance
Validated

Related Articles (4)

How do I restrict or encrypt a document to protect it
Roles used in Data Governance at USD under the SD Board of Regents
Establish USD Generative AI IT Security Policy