Data classification can be used to give data processors a quick view of how critical data is and how data should be processed and protected.
The data categories used and the corresponding security levels are defined. The category of information is defined by analyzing the confidentiality, integrity and availability of the information in question, as well as any other requirements. Each level is given a clear and descriptive name.
Data classifications can be, for example, the following:
CONFIDENTIAL paper information may require e.g. the following protections:
CONFIDENTIAL electronic information may require e.g. the following protections:
The dataset owners (or the owners of the related information asset, such as a data store or data system) are responsible for the classifications of the datasets and the correspondence of the classification to the definitions of the classes.
The owner updates the data classification over the life cycle of the asset according to variations in its value, sensitivity, and criticality.
Organization must determine the situations in which the protection of personal data or other confidential data is particularly important, and if necessary implement the hiding of such data using suitably strong methods, for example using masking, pseudonymization or anonymization.
In addition to anonymization and pseudonymization, possible techniques that can be used include:
Tiedon merkitsemistapojen pitää kattaa sekä fyysisessä että sähköisessä muodossa olevat tiedot ja niihin liittyvä suojattava omaisuus kuten tietovälineet.
Merkintöjen olisi oltava organisaation määrittelemien luokitteluperiaatteiden mukaisia ja helposti tunnistettavia. Organisaation olisi ohjeistettava, mihin ja miten merkinnät kiinnitetään. Ohjeistuksessa tulee ottaa huomioon myös tulosteet. Lisäksi tarpeettoman työn säästämiseksi kannattaa ohjeistaa, milloin merkintöjä ei tarvita.
Tietyissä tapauksissa, kuten esimerkiksi julkisuuslain mukaisista salassa pitoa koskevista merkinnöistä tulee myös käydä ilmi, miltä osin asiakirja on salassa pidettävä sekä mihin salassapito perustuu.
In addition to the records, the organization has also classified the sites and physical assets based on the criticality of the information they process.
The ways in which information is classified and classifications marked are defined, markings are easily identifiable and they cover both physical and electronic information and assets. The marking must indicate to what extent the document is to be kept secret and on what basis the secrecy is based. Personnel are instructed on how to make markings.
The organization must have a procedure for identifying new datasets containing confidential information during their reception or creation phase.
A retention period must be set for datasets containing confidential information, after which the data is deleted or archived.
The functionality and consistency of the data classification is regularly reviewed in the organization as a whole.
The principles of data classification should be consistent throughout the organization so that everyone has a common understanding of security requirements and equally critical protection is applied to equally critical information.
There are agreed procedures for identifying and marking media that require safe disposal.