{"id":1783,"date":"2017-03-07T13:40:15","date_gmt":"2017-03-07T18:40:15","guid":{"rendered":"https:\/\/huangshizhaopin.com\/its\/?page_id=1783"},"modified":"2019-10-25T12:35:49","modified_gmt":"2019-10-25T16:35:49","slug":"data-classification","status":"publish","type":"page","link":"https:\/\/huangshizhaopin.com\/its\/policies\/data-classification\/","title":{"rendered":"Data Classification and Usage Policy"},"content":{"rendered":"
Approved by the IT Governance Committee 12\/13\/2016<\/p>\n
OVERVIEW:<\/strong> APPLICABILITY:<\/strong> PRINCIPLES:<\/strong> Level 1:<\/strong> Highly Confidential, Requires Notification:<\/strong> This includes data that is highly confidential and requires notification to subjects and various state and federal entities if breached. Level 1 data includes: A person’s first and last name, or first initial and last name in combination with any one or more of the following data elements relating to that person:<\/p>\n Rules for Usage of Level 1 Data:<\/strong> To this end, employees shall not store or copy this data to laptop or desktop computers (whether institutionally-owned or personally owned), smart phoness, USB devices or other portable media. In addition, this data shall not be transmitted via e-mail, instant message, chat or other social media technologies, with the exception of approved third party vendors with appropriate encryption in place. If data is transmitted on a recurring basis to external vendors, it shall be sent via a secure transmission, such as secure FTP (SFTP).<\/p>\n Electronic and hardcopy data shall be destroyed in accordance with Saint Peter’s University\u2019s Data Retention and Destruction Policy, and shall be rendered unreadable in paper or electronic form. All departments shall have policies in place and periodically review electronic storage areas and their hard copy storage areas to insure that data is being destroyed in a timely and effective manner.<\/p>\n Level 2: Confidential:<\/strong> This includes data protected by state or federal law, contractual agreements and proprietary information against unauthorized use, disclosure, modification and destruction. Confidential data includes, without limitation, the following:<\/p>\n Rules for Usage of Level 2 Data:<\/strong> To this end, employees are permitted to store data on institutionally-owned laptop or desktop computers and shared drives; however, the dissemination of this data shall be done securely. Data shall not be transferred via e-mail unless encrypted. If data is transmitted on a recurring basis to external vendors, it is preferable to send this data through secure transmissions such as secure FTP (SFTP).<\/p>\n Electronic data shall be destroyed in accordance with Saint Peter’s University\u2019s Data Retention Policy, and shall be rendered unreadable in paper or electronic form. All departments shall have policies in place and periodically review electronic storage areas and their hard copy storage areas to insure that data is being destroyed in a timely and effective manner.<\/p>\n Level 3: Internal Use Only:<\/strong> This includes information that requires protection from unauthorized use, disclosure, modification, or destruction, but is not subject to any of the items listed in the Level 1 or 2 definitions above. Internal Use Only data includes:<\/p>\n Rules for Usage of Level 3 Data:<\/strong> To this end, employees are permitted to transmit this data via unencrypted e-mail. Electronic data can be destroyed using traditional application delete functionality. Hard copy information can be destroyed in accordance with an employee\u2019s personal or departmental policy.<\/p>\n Level 4: Unrestricted:<\/strong> This includes data that can be disclosed to any individual or entity inside or outside of Saint Peter’s University. Security measures may or may not be needed to control the dissemination of this type of data. Level 4 data includes:<\/p>\n Rules for Usage of Level 4 Data:<\/strong> RELATED PROCESSES:<\/strong> ENFORCEMENT:<\/strong> Approved by the IT Governance Committee 12\/13\/2016 OVERVIEW: Information technology and data constitute valuable Saint Peter’s University assets. In order to protect the security, confidentiality and integrity of Saint Peter’s University data from unauthorized access, modification, disclosure, transmission or destruction, as well as to comply with applicable state and federal laws and regulations, all Saint […]<\/p>\n","protected":false},"author":32,"featured_media":0,"parent":234,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1783","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/1783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/comments?post=1783"}],"version-history":[{"count":11,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/1783\/revisions"}],"predecessor-version":[{"id":2156,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/1783\/revisions\/2156"}],"up":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/234"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/media?parent=1783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nInformation technology and data constitute valuable Saint Peter’s University assets. In order to protect the security, confidentiality and integrity of Saint Peter’s University data from unauthorized access, modification, disclosure, transmission or destruction, as well as to comply with applicable state and federal laws and regulations, all Saint Peter’s University data are now classified within security levels, with regulations on the usage of data at different levels.<\/p>\n
\nThe policy applies to all employees, student employees and contractors that access Saint Peter’s University information.<\/p>\n
\nThe following definitions and rules for usage delineate types of data and provide instructions for usage of that data.<\/p>\n\n
\nHighly confidential data shall be stored on institutionally supported applications . Level 1 data can also reside in approved third party hosted applications, but those applications must be approved by the CFO and CIO. Hard copy data shall be stored in locked receptacles and rooms. Access to this electronic data shall only be gained through authenticated access on the Saint Peter’s University network or approved VPN access. Hard copy data shall only be accessed when business requires such use and all storage receptacles and rooms shall be appropriately designed to allow for authorized access only.<\/p>\n\n
\nConfidential data shall be stored in institutionally supported applications, institutionally supported shared drives, or approved third party hosted applications. Third Party hosted applications that store Level 2 data must meet Saint Peter’s University\u2019s Third Party Assurance standard. Confidential data can be stored on University-owned laptop or desktop computers, but shall not be copied to non-University computers, USB devices or other portable media. Hard copy data shall be maintained in as few receptacles and rooms as business dictates. Copies of this data shall not generally be made unless business requires it.<\/p>\n\n
\nInternal Use data can be stored in institutionally supported applications located in the Saint Peter’s University Server Rooms, institutionally supported shared drives, third party hosted applications and laptop or desktop computers (both Saint Peter’s University issued and personally owned). This data can be copied to smartphoness, USB devices or other portable media. Hard copy data shall be maintained in as few receptacles and rooms as business dictates. Copies of this data shall not generally be made unless business requires it.<\/p>\n\n
\nAll information, whether in paper or electronic form, can reside in the public domain and is available to all students, faculty and staff; but, it is subject to Saint Peter’s University\u2019s Acceptable Usage Policy and federal copyright laws.<\/p>\n
\nIf there are any documented processes related to this policy, links to the process documentation should be listed here.<\/p>\n
\nAs described in Saint Peter’s University\u2019s Acceptable Usage Policy, anyone found to have violated this policy may be subject to disciplinary action, up to and including immediate termination.<\/p>\n","protected":false},"excerpt":{"rendered":"