| |
May 16, 2026
|
|
|
|
|
Policies
Technology Division
|
|
08:16:00 Data Classification and Protection
- Introduction and Purpose
- The College’s data is a vital asset. The College is committed to protecting the confidentiality, integrity, and availability of this data through a risk-based classification framework. This policy ensures that safeguards are commensurate with the sensitivity of the data and comply with the College’s regulatory environment.
- Scope
- This policy applies to all institutional data created, collected, or stored by faculty, staff, students, and third-party agents, regardless of the location of the data (on-campus or cloud-hosted).
- Data Classification Levels
- To ensure consistent protection, all institutional data shall be categorized into one of the following three levels:
- Restricted (Regulated): Data protected by federal or state law, or stringently controlled by contractual obligations. Examples may include Social Security numbers, student educational records (FERPA), and financial/payment card data (PCI).
- Confidential (Internal): Data that is not legally restricted but is sensitive to College operations. Unauthorized disclosure could cause financial loss or reputational damage.
- Public: Data intended for wide and open distribution. This information may be accessed by the public and carries no expectation of privacy (e.g., marketing materials, course catalogs).
- Roles and Responsibilities
- Data Custodians: Sometimes referred to as “data owners.” Designated College officials responsible for the oversight of specific data sets. Custodians are responsible for determining classification levels and authorizing access based on the “need to know”.
- Data Users: All individuals authorized to access institutional data. Users are responsible for adhering to the handling requirements of the highest level of data they possess.
- Technology Division: Responsible for implementing technical controls, such as encryption and access management, to support the requirements set by Data Custodians. Facilitates the Data Custodians’ periodic confirmation of the accuracy of users’ access levels.
- Protection and Handling Governance
- Storage and Transmission: Restricted and Confidential data must be stored only on College-authorized systems and encrypted during transmission over public networks.
- Cloud Vetting: Institutional data shall not be stored in any cloud service that hasn’t been vetted and approved by the Technology Division for the specific data classification level.
- Principle of Least Privilege: Access to Restricted data is granted only when essential for a user’s job function.
- Reporting: Any suspected loss or unauthorized acquisition of Restricted or Confidential data must be reported immediately to the Technology Division.
References:
1. TBR Policy 1.08.04.00 (Personally Identifiable Information)
Submitted to Policy Review Committee on March 2, 2026
Submitted to Policy Review Board on April 13, 2026
Approved by Policy Review Board on April 29, 2026
Policy Approved October 24, 2017 as Technology Deivision Policy 08:16:00, Data Security and Controls
|
|
|
|
|