0% found this document useful (0 votes)
0 views

Information Classification policy

COMPANY NAME has established an information classification policy to protect its information assets from unauthorized access and compromise. The policy outlines responsibilities for information owners and associates, categorizing information into four classifications: Public, Internal, Confidential, and Classified, each with specific handling and labeling requirements. This framework ensures that all information is adequately protected based on its sensitivity and importance to the organization.

Uploaded by

Vikyath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Information Classification policy

COMPANY NAME has established an information classification policy to protect its information assets from unauthorized access and compromise. The policy outlines responsibilities for information owners and associates, categorizing information into four classifications: Public, Internal, Confidential, and Classified, each with specific handling and labeling requirements. This framework ensures that all information is adequately protected based on its sensitivity and importance to the organization.

Uploaded by

Vikyath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

INFORMATION CLASSIFICATION POLICY

Purpose

COMPANY NAME . Provides fast, efficient, and cost-effective electronic services


for a variety of clients worldwide. As an industry leader, it is critical for COMPANY
NAME . to set the standard for the protection of information assets from
unauthorized access and compromise or disclosure. Accordingly, COMPANY NAME
has adopted this information classification policy to help manage and protect its
information assets.

Scope

COMPANY NAME and its associates (i.e. includes affiliates, third party, vendors,
and outsourcing partners) share in the responsibility for ensuring that organization’s
information assets receive an appropriate level of protection by observing this
policy.

Responsibility

 Department Managers or information ‘owners’ shall be responsible for


assigning classifications to information assets according to the standard
information classification system presented below. (‘Owners” have approved
management responsibility. ‘Owners’ do not have property rights.)
 Where practicable, the information category shall be embedded in the
information itself.
 All COMPANY NAME associates shall be guided by the information category
in their security-related handling of COMPANY NAME information.

Policy
All COMPANY NAME information and all information entrusted to COMPANY NAME
from third parties falls into one of four classifications in the table below, presented
in order of increasing sensitivity.

Information Category Description

Information is not confidential and can be


made public without any implications for
Public COMPANY NAME . Loss of availability due
to system downtime is an acceptable risk.
Integrity is important but not vital.
Information is restricted to internal access
within management approved departments
and protected from external access.
Unauthorized access could influence
COMPANY NAME ’s operational
Internal
effectiveness, cause an important financial
loss, provide a significant gain to a
competitor, or cause a major drop in
customer confidence. Information integrity
is vital.
Information received from clients or
produced within the COMPANY NAME
accessible to a restricted department or
members in any form for processing in
production by COMPANY NAME. The original
Confidential copy of such information must not be
changed in any way without written
permission from the owner (either Client or
the COMPANY NAME ). The highest
possible levels of integrity, confidentiality,
and restricted availability are vital.
Classified Information with a “Top Management Only”
visibility.
Example: Business Plan

Information labeling and handling (A.7.2.2)

All information assets shall be labeled and handled as per the following schemes.

Table 2: Asset Labeling Scheme

Classification Physical Asset Information Asset


Public Green sticker with ‘P’ Mark ‘Public ’ in
inscribed in it. footers/headers for electronic
Documents. For paper
documents
at least mark the container (e.g
folder, file cabinet), if not
possible to mark the individual
Documents.
Internal Yellow sticker with ‘I’ Mark ‘INTERNAL’ in
Inscribed in it. footers/headers for electronic
Documents. For paper
documents
at least mark the container (e.g
folder, file cabinet), if not
possible to mark the individual
Documents.
Confidential Blue sticker with ‘C’ inscribed Mark ‘CONFIDENTIAL’ in
in it. footers/headers for electronic
Documents. For paper
documents
at least mark the container (e.g
folder, file cabinet), if not
possible to mark the individual
Documents.
classified Red sticker Mark ‘classified ’ in
footers/headers for electronic
Documents. For paper
documents
at least mark the container (e.g
folder, file cabinet), if not
possible to mark the individual
Documents.
Asset Handling Scheme

Classification Physical Asset Information Asset


Public Availability of standby Availability of backup.
arrangement to meet the
Requirement.
Internal Access restricted to Access restricted to
authorized groups authorized groups.
 Exchange is restricted
among the group.
Confidential  Very strict physical and  Strict physical and
Logical access control. Logical access control.

 Placed in secure zone.  No transmission


Access by authorized through e-mail without
persons only on need to proper Encryption.
Use basis.
 Access by authorized
 Media containing persons only need to
confidential information know basis
(e.g. Hardcopy, CD,
DVD, Hard Disk etc)
shall be securely
erased/destroyed before
disposal.
Classified  Careful handling by  Availability of backup
Authorized persons. both onsite and at
offsite.
 Availability of suitable
and tested BCP  Storing a backup in a
suitable fireproof
cabinet.

You might also like