Confidential Classification Of Data (DOCX)

advertisement
Description
CONFIDENTIAL
(highest level of security)
Data is designated as legally
regulated. Data which is
considered confidential or
restrictive.
Legal Requirements
Protection
required/identified by Red
Flag Rule and/or 210-CMR17.00
Reputation to College
Data Access and Control
High
Legal, ethical or other
reasons (College Policy)
prevent access without
authorization. Data is only
accessed by individuals with
specific approved access.
Transmission of
Confidential Data will be
sent only via an SSL-based
or higher encryption
method. For example,
XYTHOS ticketing/email
method. Transmission via email, texting, SMS, instant
messaging or any electronic
system (FTP or TFTP) is
prohibited.
The saving of confidential
data is prohibited on local
hard drives, desktops,
laptops, smartphones or
tablet computers. If these
devices are approved by the
Information Security
Officer, then approved
encryption is required.
Storage of credit card
information is never
allowed on local devices.
Documented backup and
recovery procedures are
required by law
Transmission
Storage
Data Backup and
Recovery
RESTRICTED
(moderate level of security)
Data which the owner or
owners (Department Heads)
have not decided to publish
or publicly announce. Data
protected by contract
obligations.
The protection of this data is
at the discretion of the
Department Head or
Gordon College.
High/Medium
Data is access by Gordon
College employees and/or
non-employees who have a
business need and were
approved by the
Department Head.
Transmission of restricted
data through ‘Guest’
wireless and non-Gordon
wired or wireless will be
prohibited. When
necessary, ‘GordonNET’ or
Gordon’s wired network will
be used. If off campus,
Gordon Colleges
https://vpn.gordon.edu will
be used.
Data will be stored using
NAS1, NAS2 and/or XYTHOS
drive. If the level of
protection is unknown,
check with the Information
Security Officer before
storing the data.
Documented backup and
recovery procedures are
required.
PUBLIC
(low level of security)
No expectation for
privacy or
confidentiality.
The protection of this
data is at the
discretion of the
Department Head or
Gordon College.
Low
No restrictions.
No protection is
required.
No protection is
required.
Documented backup
and recovery
procedures are
required.
Data Retention
Audit - internal
Audit - external
Protection
Protection - user
45 Days, copied every 15
minutes
Department Heads and data
custodians responsible for
confidential data must
actively review their data
process and procedures for
potential ‘Red Flags’,
misuse or unauthorized
access.
The Information Security
Officer is required to
periodically scan and detect
possible breaches in
departmental security.
The use of IPS/IDS, Firewall,
patch management,
encrypted wireless and
daily review of logs to
thwart possible breaches.
User client device has
adequate patch
management, Antivirus,
Anti-Malware installed and
file encryption if needed.
DATA CRITERIA AND CLASSIFICATION
DATA STORAGE AND TRANSMISSION
45 Days, copied every 15
minutes
Department Heads and data
custodians responsible for
restricted data. Periodic
review of data access is
required.
45 Days, copied
every 15 minutes
No audit controls
needed.
The Information Security
Officer is required to
periodically scan and detect
possible breaches in
departmental security.
Scanning of departmental
data to ensure correct user
access and no PII is stored
wrongly.
No audit controls
needed.
User client device has
adequate patch
management, Antivirus,
Anti-Malware installed.
No restrictions
because we have no
control over nonGordon computers.
DATA EXAMPLES:
Information resources labeled as ‘Confidential’.
Personally Identifiable Information (PII). The following must be true.
Last Name, and First Name or initial, with ANY one of the following –







Social Security Number
Driver’s License Number
State ID Number
Passport Number
Financial Account (checking, savings, brokerage, CD, routing, Bank ID)
Credit Card Number
Debit Card Number
Protected Health Information (PHI)



Health Status
HealthCare Treatment
HealthCare Payment
Personal/Employee Data



W-2’s
Worker’s Compensation or Disability Claims
Pay Record
Student Data not included in directory information or GAL.









Loan or Scholarship Information
Payment History
Student Tuition Bills
Student Financial Information.
Class Lists or Enrollment Information
Transcripts
Notes on Class Work
Disciplinary Action
Athletics Recruiting Information
Information resources labeled as ‘Restricted’.
Personal/Employee Data






Gordon ID Number
Income Information
Personal Records/Performance Reviews/Benefit Information
Race, ethnicity, nationality, gender
Date and place of birth
Contact Information
Business/Financial Data





Transactions that do not include Confidential Data
Non-Disclosure Information
Contracts that don’t contain PII
Credit Reports
Records on spending, borrowing, net-worth
Academic/Research Information





Library Transactions
Unpublished Research or Research
Private Funding Information
Human Subject Information
Course Evaluations
Anonymous Donor Information


Last Name, First Name or Middle/First Name Initial
Amount, Organization, Type, Purpose
Other Donor Information



Last Name, First Name or Middle/First Name Initial
Telephone, e-mail, employment information
Family Information
Management Data



Annual Budget Information
Conflict of Interest Disclosures
Gordon’s Investment information
Information resources labeled as ‘Public’.
Directory or Contact Information not Designated as Private (unless protected by FERPA)









Name
Address (Gordon and Home)
E-mail
Listed Telephone Number
Degrees, Honors or Awards
Previous Schools Attended
Field of Study
Dates of Current Employment and Position Held
ID Photos for Gordon Use Only
Specific for Students (unless protected by FERPA)




Class Year
Campus Activities
Athletic Information – Height, Weight
Attendance Status
College Data (unless protected by FERPA)




Maps
Job Postings
List of Published Research
Other?
Download