Preview only show first 10 pages with watermark. For full document please download

Working With Information Classifications

   EMBED


Share

Transcript

Working with Information Classifications Lancaster University Information Classifications Information Classification Description Examples • Information that has no constraints on its publication • Available to all including external parties Ordinary • Information of internal interest or being prepared for publication • Recipients may forward to others within the control of University, Confidential e.g. confidentiality agreement • Information which is for circulation to named recipients only Restricted • Contains personal data. Protected by law, Access should be by Personal Data relevant staff only • The information can be circulated to named recipients only • • • • • • • • • • Published Prospectus Information on website Job Description Documents being prepared for publication Unpublished research data (non-human) Committee papers Documents marked For the Attention Of… Student Contact Details Completed PDR form Completed Job Application Information Transfer Electronic Information Sending externally Ordinary Confidential Restricted Personal Data       ZendTo Email LU Box Encrypt and send using ZendTo Email (encryption recommended) LU Box  Encrypt and send using ZendTo  Emailing not recommended, if no other alternative, must encrypt  LU Box  Are the recipients registered as Data Processors? Are they allowed to have this information? Compliance team can do advice.  Is it possible to remove information (e.g. a Name) and send non personally identifiable information (e.g.ID number)  Encrypt and send using ZendTo  Emailing not recommended, if no other alternative, must encrypt personal information before emailing  LU Box (encrypt sensitive personal data before upload) Sending internally  Shared folders or SharePoint site with appropriate access permissions  ZendTo  Jabber File Transfer  Emailing acceptable  LU Box  Shared folders or SharePoint site with appropriate access permissions  ZendTo  Jabber File Transfer  Emailing not recommended, if no other alternative, must encrypt  LU Box  Shared folders or SharePoint site with appropriate access permissions  Is it possible to remove information (e.g. a Name) and send non personally identifiable information (e.g.ID number)  ZendTo- encrypt sensitive personal data  Jabber File Transfer- encrypt sensitive personal data)  Emailing not recommended, if no other alternative: o Encryption required if contains personal information of more than one person* o Encryption recommended if it’s about an individual and sent internally*  LU Box (encrypt sensitive personal data before upload) Paper Based Information Mail/ Internal Mail Recorded/ Special/ Courier delivery* Sealed envelope in internal mail (ideally hand deliver) * Depending on the content of the information you are transferring, you need to apply a s ensible/realistic level of protection (be pragmatic) Information Storage Information Classification Ordinary Confidential Paper Based Information Unlocked storage Locked storage recommended Electronic Information stored on (popular options – see the ‘Electronic File Storage Matrix’ for further information) Personal or Mobile/ External Departmental LU Box Other Cloud Storage Device Filestore Acceptable Encryption Recommended Acceptable Acceptable Acceptable Restricted Encryption required Locked storage required Personal Data Encryption required (FIPS 140-2 compliant) Acceptable, with restricted access sensitive personal data must be encrypted before upload Must not be processed on ad hoc Cloud Services (unless the University has an agreement with them, e.g. Office365) Disposal of Information Information should be disposed of once its useful life has ended. The University has a Records Retention Policy which states how long certain information should be kept for. The Data Protection Act states personal information should not be kept any longer than is necessary. Please remember, your department may have additional record retention information to follow. Information Classification Paper Based Information Hardware Ordinary Ordinary waste bin (ideally recycle waste bin) Ordinary disposal Confidential Restricted Ordinary disposal Confidential waste or shredder Personal Data Use a University approved computer disposal company that offers secure media disposal. If machine/device – contact ISS for disposal. Further Information • LancasterAnswers www.lancaster.ac.uk/answers provides further information and how to guidance. • Information Security online training: http://www.lancaster.ac.uk/iss/security/training • Your department may have additional Information Security guidance to follow. • The information in this document is based on Lancaster University policy: o Information Security Policy and Processes: https://gap.lancs.ac.uk/policy-info-guide/5-policies-procedures/Documents/ SEC-2016-4-0191-Information-Security-Policy-REVISED-FEB-2016.docx o Policy on Categorising and Protecting University Information Assets: http://www.lancs.ac.uk/depts/recman/docs/SEC-2011-4-0009-Policy-on-Categorising-andProtecting-University-Information-Assets.docx o Records Retention: https://gap.lancs.ac.uk/Records%20Management/Pages/default.aspx https://gap.lancs.ac.uk/Records%20Management/Downloads/Pages/default.aspx Version: 5.0 October 2016