UIS.401.3 Data Handling Guidelines
In support of UIS 401 Data Protection and Security Policy
Data Classification
Data classification, in the context of information security, is the classification of data based on its level of sensitivity and the impact to the University should that data be disclosed, altered or destroyed without authorization. The classification of data helps determine what baseline security controls are appropriate for safeguarding that data. All University data are classified into one of three sensitivity levels, or classifications, low, moderate or high. Please refer to the table below to learn more about each category’s operational impact, examples of such data, and GU-approved methods of handling the data.
[printable data handling pdf
Risk Classification |
Low The loss of its confidentiality, integrity, or availability would cause no harm to Georgetown’s mission, security, finances, or reputation. |
Moderate The loss of its confidentiality, integrity, or availability could cause measurable harm to Georgetown’s mission, security, finances, or reputation. |
High The loss of its confidentiality, integrity, or availability would cause significant harm to Georgetown’s mission, security, finances, or reputation. |
||
---|---|---|---|---|---|
Data Type |
Public Information Georgetown has made available to the public. |
Internal Information Georgetown has designated as private. |
Confidential Information Georgetown is obligated to make available only on a ‘need to know’ basis. |
Restricted Information Georgetown is obligated to make available only on a ‘need to know’ basis. |
Regulated Information Georgetown is obligated to keep protected from all unauthorized internal or external access. |
Examples Ask UIS if you’re not sure. These are examples, not exhaustive lists. |
Information in the public domain Publicly available campus data Faculty and staff appointments University marketing materials University directory information designated for public view |
University and employee GUID numbers Non-public meeting notes Processes, procedures, systems instructions |
Non-public contracts Georgetown University internal memos and email, non-public reports, budgets, plans, financial info, board documents Financial account numbers Donor agreements and agreements in progress |
Unpublished research data Social Security Numbers Personally Identifiable Information (PII); birth date, personal contact information; IDs/Passports/Driver Licenses Audit logs or records; infrastructure data Cyber Security Investigations |
Protected Health Information (PHI) Controlled Unclassified Information (CUI) Student records; Student admission data Payment Card Information (PCI) **No PCI data is to be transmitted through, processed or stored on GU networks** |
Printing | No data handling restriction | Do not leave unattended on copiers/printers | Send to printer using stored/locked job. Enter authorization code at printer | ||
Network Storage | No data handling restriction |
GU Google Drive |
GU Box GU GCP GU AWS |
GU Box GU GCP GU AWS Authorized external storage **CUI and PHI require UIS authorization** |
|
Computer Storage | No data handling restriction | Device must meet UIS cyber security requirements for processing moderate-risk data. Data cannot be stored long-term on GU work or personal computer. GU external hard drives, managed by UIS are permitted with authorization | Device must meet UIS cyber security requirements for processing high-risk data. Data cannot be stored on GU work or personal computer. Data is to remain in managed and authorized storage system of record GU external hard drives, managed by UIS are permitted with authorization | ||
Sharing/Collaboration | No data handling restriction | GU Email GU Box GU Google Workspace Apps GU Slack |
GU Box | ||
Transmitting | No data handling restriction | GU Email GU Box GU Google Workspace Apps |
GU Box restricted link | GU Box restricted link Method authorized by UIS/data controller/owner |
|
Online Meeting | No data handling restriction | GU Zoom GU Google Meet GU Teams |
GU Zoom (with authorization) | Method authorized by UIS/data controller/owner | |
Survey/Polling | No data handling restriction | GU Qualtrics Survey Monkey Doodle |
GU Qualtrics | Method authorized by UIS/data controller/owner | |
E-Signing | No data handling restriction | GU Docusign | GU Docusign Method authorized by UIS/data controller/owner |
||
Deleting and Destroying | When assets are no longer in use for University business, are being repurposed, or can be disposed of in accordance with the University Data Retention Rules, low-risk data must be cleared from technology assets or 3rd-party systems. |
When data is no longer in use for University business and can be disposed of in accordance with the University Data Retention Rules, moderate-risk data must be cleared: Cleared: A method of sanitization that applies programmatic, software-based techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques; typically applied through the standard read and write commands to the storage device, such as by rewriting with a new value or using a menu option to reset the device to the factory state. GU devices cannot be donated or disposed of without UIS data sanitization activities prior to disposal. 3rd-party access to moderate-risk data must include provisions to dispose of data upon service termination. |
When data is no longer in use for University business and can be disposed of in accordance with the University Data Retention Rules, high-risk data must be purged or destroyed: Purge: A method of sanitization that applies physical or logical techniques that render high risk data recovery infeasible using state-of-the-art techniques. Destruction: A method of sanitization that renders high risk data recovery infeasible using state-of-the-art techniques and results in the subsequent inability to use the media or drive for storage of data. GU devices cannot be donated or disposed of without UIS data sanitization activities prior to disposal. 3rd-party access to high-risk data must include provisions to dispose of data upon service termination |