ÌÇÐÄvlog¾«Æ·

Data Classification Procedure

Approver:
Academic Coordinating Committee
Policy Owner:
Associate Vice President, Risk Management
Policy Lead(s):
Manager, Campus Security
Defining policy:
Effective date:
2022-05-25
Date of last approval:
2022-05-25
Status:
Approved

Procedure Statement

Data is a collective asset that is acquired, used, and managed by multiple stakeholders within Conestoga. This procedure sets out the principles for classifying data, regardless of form or media, to meet business needs and regulatory requirements of The ÌÇÐÄvlog¾«Æ· Institute of Technology and Advanced Learning (Conestoga). 

Procedure Scope

This procedure applies to all data in Conestoga’s control and custody including research data. Security controls are documented in internal restricted information technology practices and standards. 

Definitions

ÌÇÐÄvlog¾«Æ· maintains a glossary of terms specific to the institution. The ones in use for this document are defined below.

Data
Individual symbols or pictures that represent raw facts or figures, which on their own do not comprise meaning and have no discernible arrangement. It can be processed by a computer, computer system or application.
Data Stewards
Data stewards are employees responsible for maintaining and protecting defined sets of data within the various lines of business throughout Conestoga. Data stewards are not data owners, data stewards fulfill a business focused oversight role ensuring data is fit for purpose for data driven business processes. Data stewards work with others to ensure data classification rules are followed and implement processes to manage the classified data.
Dataset
A dataset is an organized collection of data. The most basic representation of a dataset is data elements presented in tabular form and may also present information in a variety of nontabular formats, such as an extensible mark-up language (XML) file, a geospatial data file, or an image file, etc.
Information
Data that has been given value or meaning through interpretation or analysis and that has been organized to create meaning.
Inherent Risk
The risk to Conestoga in the absence of any controls to alter either the risks likelihood or impact of a risk.
Risk
a function of the magnitude or seriousness of the harm and the probability that it will occur (p. 22)

Procedure

  1. Data stewards classify Conestoga’s data as public, internal, or restricted. 
  2. Conestoga data is internal by default. 
    1. If there are conflicting guidelines defining specific data classification, the data is classified according to the most restrictive protection requirement. 
    2. Corporate Services will assist college stakeholders classify college data 
  3. Conestoga’s public data is shared in open formats. 
  4. Datasets are regularly reviewed by Conestoga’s data stewards to ensure access and security provisions correspond to the data classification. 
  5. Data stewards protect data from modification or deletion in accordance with approved Conestoga data governance standards. 
  6. Data stewards reassess and consider reclassification of data when there are major changes to systems housing data, changes to the data including new data sets, and access levels change. 

The following table identifies key descriptors and controls assigned to data by classification.  

  Public Data Internal Data Restricted Data
DescriptionData that can be made available to the general public without concernData intended for any Conestoga user but not for the general public.  Data that is defined in regulations, legislation, or by legal contract as sensitive, and/or its release could negatively impact strategic business decisions such as budgeting, human resources, legal negotiations, etc. 
Risk Minimal inherent risk.  Minimal controls are required for public data to protect it from unauthorized modification or destruction in order to have the data be a trustworthy representation of ConestogaModerate inherent risk.   Should the data be released, any data that is not explicitly classified as public or restricted shall be treated as internal data.  A reasonable level of security controls should be applied to prevent its unauthorized release, alteration, or destructionHigh inherent risk. The alteration, destruction, and or unauthorized release of restricted data is likely to cause a significant material level of risk to the Conestoga, consequently the highest level of access control, secured storage, transmission requirements, and secured destruction must be always applied
Access

Access to this data can be granted to any requestor. 

 

Access to this data can be granted to any Conestoga userAccess to this data can only be granted to users with a business need to access it and its release is limited in scope to only authorized users 
StorageNo security controls required

Electronic data must be stored on Conestoga approved systems (i.e., shared drives, servers, cloud-based storage) with controlled role-based access

Physical files must be stored in a secure Conestoga approved location 

Electronic data must be stored on Conestoga approved systems (i.e., shared drives, servers, cloud-based storage) with controlled role-based access, and audit trail

Physical files and those on portable devices (which must be password protected) must be stored in a secure Conestoga approved location in a locked space with limited and managed access

TransmissionNo Security controls requiredData must be transmitted via a secure networkData must be encrypted during transfer and transmitted via a secure network
DestructionData must be securely deleted or transferred to the archives according to approved retention schedules ​ ​

Revision Log

‸¾²¹³Ù±ð

‸¾±ð³Ù²¹¾±±ô²õ

​2022-04-20​Academic Forum 
​2022-05-25​Academic Coordinating Committee 

Data Classification Procedure