Sample Data Classification Policy
Sample Data Classification Policy
Domains:
POLICY STATEMENT
1. Information Services (IS) ResponsibilityAll IS employees who come into contact with
sensitive (Company Name) internal information are expected to familiarize themselves with this
data classification policy and to consistently use these same ideas in their daily (Company Name)
business activities. Sensitive information is either Confidential or Restricted information, and both
are defined later in this document. Although this policy provides overall guidance, to achieve
consistent information protection, IS employees are expected to apply and extend these concepts to
fit the needs of day-to-day operations. This document provides a conceptual model for IS for
classifying information based on its sensitivity, and an overview of the required approaches to
protect information based on these same sensitivity classifications.
2. Addresses Major Risks - The IS data classification system, as defined in this document, is
based on the concept of need to know. This term means that information is not disclosed to any
person who does not have a legitimate and demonstrable business need to receive the information.
This concept, when combined with the policies defined in this document, will protect (Company
Name) information from unauthorized disclosure, use, modification, and deletion.
3. Applicable Information - This data classification policy is applicable to all electronic
information for which IS is the custodian.
PROCEDURES
1. Access Control
1.1 Need to KnowEach of the policy requirements set forth in this document are based on the
concept of need to know. If an IS employee is unclear how the requirements set forth in this policy
should be applied to any particular circumstance, he or she must conservatively apply the need to
know concept. That is to say that information must be disclosed only to those people who have a
legitimate business need for the information.
1.2 System Access ControlsThe proper controls shall be in place to authenticate the identity of
users and to validate each users authorization before allowing the user to access information or
services on the system. Data used for authentication shall be protected from unauthorized access.
Controls shall be in place to ensure that only personnel with the proper authorization and a need to
know are granted access to (Company Name) systems and their resources. Remote access shall be
controlled through identification and authentication mechanisms.
1.3 Access Granting DecisionsAccess to (Company Name) sensitive information must be
provided only after the written authorization of the Data Owner has been obtained. Access requests
will be presented to the data owner using the Access Request template. Custodians of the involved
information must refer all requests for access to the relevant Owners or their delegates. Special