Information Classification and Management Policy Template
Information Classification and Management Policy Template
Audience
The (Company) Information Classification and Management Policy applies to any individual, entity, or
process that interacts with any (Company) Information Resource.
Contents
Information Classification
Information Handling
Information Retention & Destruction
Responsibilities
Information User
The person, organization or entity that interacts with Information for the purpose of performing
an authorized task.
Have a responsibility to use Information in a manner that is consistent with the purpose intended
and in compliance with policy.
Information Owner
The person responsible for, or dependent upon, the business process associated with an
information resource.
Is knowledgeable about how the information is acquired, transmitted, stored, deleted, and
otherwise processed.
Determines the appropriate value and classification of information generated by the owner or
department.
Must communicate the information classification when the information is released outside of the
department and/or (Company).
Controls access to their information and must be consulted when access is extended or
modified.
Must communicate the information classification to the Information Custodian so that the
Information Custodian may provide the appropriate levels of protection.
Must periodically review their information to ensure the proper classification is applied.
Information Custodian
Maintains the protection of Information according to the information classification associated to
it by the Information Owner.
Delegated by the Information Owner and is usually Information Technology personnel.
Policy
Information Classification
Information owned, used, created or maintained by (Company) should be classified into one of
the following three categories:
o Public
o Internal
o Confidential
Public Information:
o Is information that may or must be open to the general public.
o has no existing local, national, or international legal restrictions on access or usage.
o While subject to (Company) disclosure rules, is available to all (Company) employees and
all individuals or entities external to the corporation.
Examples of Public Information include:
Publicly posted press releases,
Publicly available marketing materials,
Publicly posted job announcements.
Internal Information:
o Is information that must be guarded due to proprietary, ethical, or privacy considerations.
o Must be protected from unauthorized access, modification, transmission, storage or
other use and applies even though there may not be a civil statute requiring this
protection.
o Is restricted to personnel designated by (Company), who have a legitimate business
purpose for accessing such Information.
Examples of Internal Information include:
Employment Information,
Business partner information where no more restrictive confidentiality agreement
exists,
Internal directories and organization charts,
Planning documents,
Contracts.
Confidential Information:
o Is information protected by statutes, regulations, (Company) policies or contractual
language. Information Owners may also designate Information as Confidential.
Information Handling
All Information should be labelled according to the (Company) Labelling Standard.
Public:
o Disclosure of Public Information must not violate any pre-existing, signed non-disclosure
agreements.
Internal:
o Must be protected to prevent loss, theft, unauthorized access and/or unauthorized
disclosure.
o Must be protected by a confidentiality agreement before access is allowed.
o Must be stored in a closed container (i.e. file cabinet, closed office, or department where
physical controls are in place to prevent disclosure) when not in use.
o Is the “default” classification level if one has not been explicitly defined.
Confidential:
o When stored in an electronic format must be protected with a minimum level of
authentication to include strong passwords as defined in the Authentication Standard.
o When stored on mobile devices and media, must be encrypted.
o Must be encrypted at rest.
o Must be stored in a locked drawer, room, or area where access is controlled by a cipher
lock and/or card reader, or that otherwise has sufficient physical access control
measures to afford adequate protection and prevent unauthorized access by members of
the public, visitors, or other persons without a need-to-know.
o Must not be transferred via unsecure communication channels, including, but not limited
to:
Unencrypted email
Text messaging
Instant Messaging
Unencrypted FTP
Mobile devices without encryption
o When sent via fax, must be sent only to a previously established and used address or one
that has been verified as using a secured location.
o When transmitted via USPS or other mail service, must be enclosed in a sealed security
envelope.
o Must not be posted on any public website.
o (Company) Management must be notified in a timely manner if Information classified as
Confidential has been or is suspected of being lost or disclosed to unauthorized parties.
Definitions
See Appendix A: Definitions
References
ISO 27002: 8, 14, 18
NIST CSF: ID.AM, PR.DS, PR.IP
Authentication Standard
Data Retention Schedule
Labelling Standard
Media Reuse and Destruction Standard
Waivers
Waivers from certain policy provisions may be sought following the (Company) Waiver Process.
Enforcement
Personnel found to have violated this policy may be subject to disciplinary action, up to and including
termination of employment, and related civil or criminal penalties.
Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to
and including removal of access rights, termination of contract(s), and related civil or criminal penalties.
Version History
Version Modified Date Approved Date Approved By Reason/Comments
NEED HELP?
FRSecure is a full-service information security consultancy.
If you need assistance with anything in this resource, please don’t hesitate to reach out to us.
CONTACT US
More resources