Impact Level and Data Classification discussions focus primarily on Confidentiality and occasionally on Integrity. application form, email, etc. during the course of conducting University business (administrative, financial, education, research or service).Data and system owners at UNSW are required to determine the data classification for the systems and data repositories for which they have responsibility. Data sensitivity is determined by the context within which the data exists.Sensitivity cannot be determined by subject (e.g. Unlike a risk assessment, data security classification is determined by the perceived level of impact to the organisation or individual (refer to Data Classification Standard).Listed below are details of controls which should be applied to ensure that appropriate protection is given to the Information Asset.To maintain confidentiality and integrity of classified Information Assets a strict audit logging process is to form part of the Information Asset Register. The CISO will review and may revise the materials and bring the result to the University’s Data Stewardship Council, or other appropriate authoritative body, to review and ask for their endorsement. Examples of Sensitive Data by Classification Level. In the case of Information Assets externally generated, and not otherwise classified, the University officer who receives the Information Asset should approach the Information System Owner to classify the Information Asset and guide its control within the University.Identify the Information Asset and review the.Perform a risk assessment and consider the vulnerabilities that are attributed to each Information Asset (refer to Data Classification Standard).Relevant data security issues for the Data Owner to consider might include:The highest security classification level determined by the impact assessment must be applied to that Information Asset. This standard provides the foundation for establishing protection profile requirements for each class of data.

It is intended to provide an overview of the kind of questions that ought to be considered during the process of data classification. Accepted materials will be incorporated into the Data Usage Guide.The following classifications are associated with each Data Type or Data Set as a means of identifying the level of security and privacy protection to be applied to it and the scope in which it can be shared. The Government Security Classification System sets out what level of classification should be applied to official information depending on the level of risk if the information was released or compromised. Nubera eBusiness uses its own cookies and third-party cookies. This standard for the University community has been created to help effectively manage information in daily mission-related activities.Determining how to protect and handle information depends on a consideration of the information’s type, importance, and usage. Some of the key questions to ask to determine and value/risk of your data are:Based on the above parameters if you find the value or business risk of the data type to be high, it is important that you classify it as sensitive.Here are some ways to implement your data classification policy throughout the business.The following technology strategies will help improve your overall security posture and prevent employees from inadvertently spilling business secrets.Use our downloadable data classification template to document your policy.This template will give you a broader understanding of the different data classification levels, associated security measures, and the responsibilities of specific roles.Note: The data security survey referenced in this article was conducted by GetApp in June 2019 among 714 respondents who reported full-time employment in the United States.© 2017 GetApp. It's easy to turn JavaScript on -.Sorry, this button doesn’t work without Javascript. Unlike a risk assessment, data security classification is determined by the perceived level of impact to the organisation or individual (refer to Data Classification Standard).