Main Menu

Data Classification Policy

PURPOSE

Information assets and IT resources that contain, distribute, and store data are vital to the systems that support Shepherd University’s ongoing mission of discovery, learning, and engagement. All information assets and IT resources, especially data, must be protected throughout various phases of their useful life, including when created, collected, stored, transferred, purged, and ultimately destroyed. To support its mission, Shepherd University classifies data into three categories: (1) sensitive; (2) protected; and (3) non-sensitive.

POLICY

Shepherd University information assets and IT resources contain various types of data that is to be used holistically and individually in an approved, ethical, and lawful manner to avoid loss and/or damage to Shepherd University data, operations, image, or financial interest. All affiliated data should be considered confidential and proprietary, thus every effort to protect the integrity of all types of data must be made.

SENSITIVE DATA
Sensitive data is highly confidential. Sensitive data is protected by laws, statutes, regulations, guidelines, and contractual language, which is exposed or breached could result in legal damages, fines, penalties, identify theft, and/or financial fraud.

Data examples/elements/fields exhibited as sensitive include, but are not limited to:


Collecting Sensitive Data


Sending/Receiving Sensitive Data


Storing Sensitive Data


PROTECTED DATA
Protected data is information that is protected by laws, statutes, regulations, university policies, or other contractual language, but does not carry the same level of risk as sensitive data.

Data examples/elements/fields exhibited as protected include, but are not limited to:


Sending/Receiving Protected Data


Storing Protected Data


NON-SENSITIVE DATA
Non-sensitive data is information that may be available to the general public and is defined with no existing local, national, or international legal restrictions on access or usage.

Data examples/elements/fields exhibited as non-sensitive include, but are not limited to:


PRIVACY, OPERATIONS, and MONITORING

Shepherd University seeks to maintain its IT environment and manage all information assets including data, computing devices, systems technology, telephony, and IT resources in a manner that respects individual privacy and promotes user trust. However, the use of Shepherd University IT resources is not completely private, and users should have no expectation of privacy in connection with the use of any information asset or IT resource.

Shepherd University has the legal right to access, preserve, and review all information stored on or transmitted through any information asset or IT resource, including the inspection of e-mail messages, logging of activities, monitoring usage patterns, and data audits/integrity checks. IT Services may, with or without notice to users, take any other action it deems necessary to preserve, secure, and protect systems, information assets, or IT resources for the betterment of Shepherd University. Without limiting its right to take action, Shepherd University may, it is sole discretion, disclose the results of any general or individual monitoring or access permitted by this policy, including the contents and records of individual communications, to appropriate Shepherd University personnel and/or law enforcement agencies.

SCOPE of AFFECTED PARTIES

This policy applies to all users, such as students, faculty, and staff of Shepherd University and to other persons accessing Shepherd University information assets and/or IT resources including but not limited to authorized agents or community members, regardless of whether such information asset or IT resource is accessed from on-campus or off-campus.

ROLES & RESPONSIBILITIES

All Shepherd University students, faculty, staff, and other parties with access to Shepherd University information assets and IT resources shall be responsible for:

USERS


CIO/CISO – INFORMATION PRIVACY OFFICER


IT SERVICES STAFF


RELATED TOOLS

RELATED POLICIES & GUIDELINES
BOG#35: Information Technology Security
Acceptable Use Policy
IT Information Security & Privacy Policy
Password Policy
Social Security Number Guidelines
Work from Home / Remote Access Guidelines

POLICY: Data Classification Policy
IMPACT: Data, Technology, and IT Resources
RESPONSIBLE OFFICE: IT Services
CREATED: November 28, 2022
REVISED: November 28, 2022
APPROVED BY: CIO/CISO – Information Privacy Officer
VERSION: 23.1