{"id":226,"date":"2016-11-01T11:01:10","date_gmt":"2016-11-01T15:01:10","guid":{"rendered":"http:\/\/sites.scranton.edu\/itmatters\/?p=226"},"modified":"2018-10-16T15:34:44","modified_gmt":"2018-10-16T19:34:44","slug":"information-classification-and-handling","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/itmatters\/2016\/11\/01\/information-classification-and-handling\/","title":{"rendered":"Information Classification and Handling"},"content":{"rendered":"<p>Do you know how important your data is? Have you thought about where it is stored? What would you do if your data was lost?<\/p>\n<p>Data is one of the University\u2019s most valuable assets. Because the majority of our employees rely on this information to conduct their day-to-day operations, we must learn to properly handle and secure it.<\/p>\n<p>As members of the University community, we have the responsibility to safeguard the information we process, which means that we need to familiarize ourselves with how data gets classified, stored and shared.<\/p>\n<div class=\"module combo-right\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-text-container\">\n<h2>How Does Data Get Lost?<\/h2>\n<p><span class=\"mimi-ul\"><span class=\"mimi-bullet\">&#x25aa; <\/span>Laptop and other technologies can get stolen by unauthorized visitors<br \/>\n<span class=\"mimi-bullet\">&#x25aa; <\/span>Computers or other technical equipment can get hacked through spear phishing emails<br \/>\n<\/span><\/p>\n<h2>What is the Impact of Data Loss?<\/h2>\n<p>The repercussions vary but could include loss of University reputation, loss of funding for the University, fines, long-term loss of critical campus or departmental service, and identity theft.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module text\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-text-container\">\n<h1>Manage Your Data<\/h1>\n<p>We hope the information below will help you manage your data in the most secure way possible. You may select the links below to jump to the corresponding section:<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module table-of-contents\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-text-container\"><span class=\"mimi-ul\"><span class=\"mimi-bullet\">&#x25aa; <\/span><a href=\"https:\/\/madmimi.com\/p\/1555c8#restricted_data\">Restricted Data<\/a><br \/>\n<span class=\"mimi-bullet\">&#x25aa; <\/span><a href=\"https:\/\/madmimi.com\/p\/1555c8#confidential_data\">Confidential Data<\/a><br \/>\n<span class=\"mimi-bullet\">&#x25aa; <\/span><a href=\"https:\/\/madmimi.com\/p\/1555c8#public_use_data\">Public Use Data<\/a><br \/>\n<span class=\"mimi-bullet\">&#x25aa; <\/span><a href=\"https:\/\/madmimi.com\/p\/1555c8#campus_resources\">Campus Resources<\/a><br \/>\n<\/span><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module divider\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-divider-container\" align=\"center\"><img decoding=\"async\" src=\"https:\/\/madmimi.com\/assets\/divider-1b71993797d09efd0347798f7d8cab0977a9253845ff32c2482416e5025aa574.png\" alt=\"***\" \/><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module header\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-header-container\">\n<h2><a name=\"restricted_data\"><\/a>Restricted Data<\/h2>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module combo-right\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<table width=\"236\" align=\"right\">\n<tbody>\n<tr>\n<td align=\"right\">\n<div class=\"madmimi-image-container\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cascade.madmimi.com\/promotion_images\/1423\/4177\/original\/red-secure.jpg?1475247636\" alt=\"red-secure\" width=\"216\" height=\"200\" \/><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"madmimi-text-container\">\n<p>Restricted data is the most important or sensitive type of information. This information is regulated by law, such as HIPAA, and\/or governed by other federal, state or local law, or University policy.<\/p>\n<p><strong>Examples<\/strong>: Social security numbers, driver license numbers, passwords, bank account numbers and credit card information.<\/p>\n<p><strong>Storage<\/strong>: Restricted information in electronic records should be secured with strong encryption when stored outside the central University administrative database. Restricted information in all forms of physical records must either be security locked or actively supervised in a private environment at all times.<\/p>\n<p><strong>Storage Option<\/strong>: RoyalDrive<\/p>\n<p><strong>Transmission<\/strong>: If you need to send restricted information through an email, please follow the following steps:<br \/>\n1. Save the information in RoyalDrive and set a password for it<br \/>\n2. Send the intended recipient an email containing the RoyalDrive ticket<br \/>\n4. Call the recipient and relay the password information to them<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module header\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-header-container\">\n<h2><a name=\"confidential_data\"><\/a>Confidential Data<\/h2>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module combo-right\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<table width=\"236\" align=\"right\">\n<tbody>\n<tr>\n<td align=\"right\">\n<div class=\"madmimi-image-container\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cascade.madmimi.com\/promotion_images\/1423\/4179\/original\/yellow-secure.jpg?1475247639\" alt=\"yellow-secure\" width=\"216\" height=\"200\" \/><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"madmimi-text-container\">\n<p>Confidential information, while not being overtly damaging to the user, can be potentially embarrassing to the University. It may contain records or information on events or activities that can be misinterpreted by people unfamiliar with those activities.<\/p>\n<p><strong>Examples:<\/strong> Grades, class lists, financial aid information, donor records, tuition bills, employee performance reviews, disability claims and department budget information.<\/p>\n<p><strong>Storage<\/strong>: Confidential information shall be stored in physical or electronic environments where access is limited to only those who need to conduct University business.<\/p>\n<p><strong>Storage Options<\/strong>: RoyalDrive and OneDrive for Business<\/p>\n<p><strong>Transmission<\/strong>: Confidential information may be transmitted over the University or external networks as required, but only with those who need to use the information.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module header\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-header-container\">\n<h2><a name=\"public_use_data\"><\/a>Public Use Data<\/h2>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module combo-right\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<table width=\"236\" align=\"right\">\n<tbody>\n<tr>\n<td align=\"right\">\n<div class=\"madmimi-image-container\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cascade.madmimi.com\/promotion_images\/1423\/4181\/original\/blue-secure.jpg?1475247645\" alt=\"blue-secure\" width=\"216\" height=\"200\" \/><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"madmimi-text-container\">\n<p>Public use information can be released without much concern for security.<\/p>\n<p><strong>Examples:<\/strong> Campus maps, event and class schedules, press releases and athletic scores and schedules.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module header\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-header-container\">\n<h2><a name=\"campus_resources\"><\/a>Campus Resources<\/h2>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"module text\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" width=\"530\">\n<div class=\"madmimi-text-container\">\n<p>If you have any questions regarding data classification, handling and storage, contact the Information Security Office at 570-941-4226 or email <a href=\"mailto:infosec@scranton.edu\">mailto:infosec@scranton.edu<\/a>.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Do you know how important your data is? Have you thought about where it is stored? What would you do if your data was lost? Data is one of the University\u2019s most valuable assets. Because the majority of our employees rely on this information to conduct their day-to-day operations, we must learn to properly handle [&hellip;]<\/p>\n","protected":false},"author":258,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[48,50,49],"class_list":["post-226","post","type-post","status-publish","format-standard","hentry","category-security","tag-data","tag-information-classification","tag-policies"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/users\/258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":2,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"predecessor-version":[{"id":722,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/226\/revisions\/722"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}