Data Classification Template
Data Classification Template
Justification Access to some information, such as published reports, agency Some information, even though it is available to the public, may State agencies and institutes of higher education collect and Many agencies and institutes of higher education interact with
news, and other public related materials, does not need to be contain sensitive information. Such data should be maintain some information that is protected from disclosure the federal government or perform services that are regulated by
tracked or monitored. In such circumstances, it is most efficient vetted/verified before it is released. By protecting access to the either through a codified exception to the Public Information Act federal rules and laws. In such instances, the information
to keep the information available for citizen access without data and requiring an open records request, the organization or through opinions or decisions of the Attorney General’s Public maintained by those agencies must comply with federal controls.
requiring the intervention of state employees. ensures that the most accurate and relevant data is provided to Information office. Such information may also be subject to
the requestor without accidentally disclosing confidential data. breach notification requirements under Texas law.
Examples Information that is published to the public website and requires Data that meets the definition of PII under the Texas Business Data that has been excepted from public release under the Texas Data that meets the definition of SPI under the Texas Business
no authentication and Commerce Code §521.002(a)(1) and §521.002(a)(2) Government Code Ch. 552 or data, whose pubic release, may and Commerce Code 521.002(a)(1) and 521.002(a)(2): HIPAA
• Agency publications • Employee Records result in adverse consequences to the organization Security (45 CFR Parts 164), PCI DSS v2.0, FTI, FICA, tax
• Press releases • Gross Salary Information • Attorney-Client communications information
• Public web postings • Computer Vulnerability Reports
• Protected draft communications
• Net salary information
Consequence of Public Disclosure No adverse consequences • Loss of reputation Potential criminal or civil penalties Federal investigation or loss of right to collect revenue
• Loss of trust
Legal and/or Privacy Office • Develop and maintain information security policies, • Develop and maintain information security policies, • Develop and maintain information security policies, • Develop and maintain information security policies,
(Public Information Officer) procedures, and guidelines. procedures, and guidelines. procedures, and guidelines. procedures, and guidelines.
• Provide guidance on data classifications • Provide guidance on data classifications • Provide guidance on data classifications • Provide guidance on data classifications
Managers n/a • Ensure users are aware of data classification requirements • Ensure users are aware of data classification requirements • Ensure users are aware of data classification requirements
• Monitor user activities to ensure compliance • Monitor user activities to ensure compliance • Monitor user activities to ensure compliance
Users n/a • Identify, and Label where appropriate, Data • Identify, and Label where appropriate, Data • Identify, and Label where appropriate, Data
• Properly Dispose of Data • Properly Dispose of Data • Properly Dispose of Data
Handling n/a n/a Confidential data shall only be given to those persons with Confidential data shall only be given to those persons with
authorization and a need to know authorization and a need to know
Duplication n/a Information to be duplicated for business purposes or in Employees can duplicate confidential documents with data Employees can duplicate confidential documents with data
response to an "Open Records" request only owners authorization owners authorization
Mailing n/a n/a n/a • Confirmation of receipt required
• May require double-packaged delivery. Outside of the
package is not marked. Inside paperwork is appropriately
marked.
Disposition • Disposition based on requirements of the records • Disposition based on requirements of the records • Disposition based on requirements of the records • Disposition based on requirements of the records
retention schedule. retention schedule. retention schedule. retention schedule.
• Physical destruction required (e.g. shredding) • Physical destruction required (e.g. shredding)
• Destruction must be verified by agency personnel • Destruction must be verified by agency personnel
Storage of hardcopy • Store a "Master copy" in compliance with records • Store a "Master copy" in compliance with records • Store a "Master copy" in compliance with records • Store a "Master copy" in compliance with records
retention schedule. retention schedule. retention schedule. retention schedule.
• Documents should be locked up when not in use (e.g., in • Documents should be locked up when not in use (e.g., in • Documents should be locked up when not in use (e.g., in
locked desk, cabinet or office) locked desk, cabinet or office) locked desk, cabinet or office)
Storage on fixed media n/a • Access is password controlled • Access is password controlled • Access is password controlled
• Encryption required • Encryption required
Storage on removable media n/a Encryption recommended Encryption required. Encryption required.
Delete Access • Information owner defines permissions by user/role • Information owner defines permissions by user/role • Information owner defines permissions by user/role • Information owner defines permissions by user/role
• Controls (e.g., separation of duties) needed for processes • Controls (e.g., separation of duties) needed for processes
and transactions that are susceptible to fraudulent or other and transactions that are susceptible to fraudulent or other
unauthorized activities unauthorized activities
Retention criteria for Access Reports Logs must be retained in accordance with records retention Logs must be retained in accordance with records retention Logs must be retained in accordance with records retention Logs must be retained in accordance with records retention
guidelines guidelines guidelines guidelines
Retention criteria for Access Reports n/a The owner determines retention of violation logs The owner determines retention of violation logs The owner determines retention of violation logs
Classification review cycle timeframe Review & affirm date must be set but flexible, i.e., 1-2 years Review & affirm date must be set but flexible, i.e., 1-2 years Info Owner must review & affirm all info classification and Info Owner must review & affirm all info classification and
user rights, not to exceed 1 year user rights, not to exceed 1 year
Required Disclosure to Public No disclosure of public information No disclosure of public information No disclosure of public information No disclosure of public information
Required Disclosure to Federal No disclosure of public information No disclosure of public information No disclosure of public information No disclosure of public information
Partners
Required Disclosure to State Partners No disclosure of public information No disclosure of public information No disclosure of public information No disclosure of public information
Required Disclosure to Third Parties No disclosure of public information No disclosure of public information No disclosure of public information No disclosure of public information