Data Classification & Standards Policy
Data Classification & Standards Policy
In order to effectively secure Invisible Technologies’ data, team members must have a shared vocabulary
to describe the data and the corresponding protection it requires. This policy describes how company data
is classified and the levels of protection required for each classification.
All Invisible Technologies information and all information entrusted to Invisible Technologies from third
parties falls into one of four classifications, in order of increasing sensitivity.
Public
Public data is information that may be disclosed to any person regardless of their affiliation with Invisible
Technologies. The “public” classification is not limited to data that is of public interest or intended to be
distributed to the public; the classification applies to any data that does not require any level of protection
from disclosure.
While it might be necessary to protect original (source) documents from unauthorized modification, public
data may be shared with a broad audience both within and outside Invisible Technologies, and no steps
need be taken to prevent its distribution.
Internal
Internal data is information that is potentially sensitive and should not be shared with the public. Internal
data generally should not be disclosed outside of Invisible Technologies without the permission of Invisible
Technologies management. It is the responsibility of the data owner to designate information as internal
where appropriate.
Unauthorized access has the potential to influence Invisible Technologies’s operational effectiveness,
cause an important financial loss, provide a significant gain to a competitor, or cause a major drop in client
confidence.
Company Confidential
Company confidential data is information that, if made available to unauthorized parties, might adversely
affect Invisible Technologies. This information is to be protected against unauthorized disclosure or
modification, and might be limited to executives, HR, and legal parties employed by or under contract with
Invisible Technologies. Company confidential data should be used only by pre-authorized parties and
should be protected both when it is in use and when it is being stored, processed, or transmitted.
Unauthorized access has the potential to influence Invisible Technologies’ operational effectiveness,
violate contractual confidentiality agreements, initiate a security incident, or cause a major drop in team
member, client, and industry confidence.
Client Confidential
Client confidential data is information that, if made available to unauthorized parties, may adversely affect
Invisible Technologies’ clients. This classification also includes data that Invisible Technologies is required
to keep confidential, either by law or under a confidentiality agreement with non-client third parties, such as
vendors. This information is to be protected against unauthorized disclosure or modification. Client
confidential data should be used only when necessary for business purposes with the permission of the
client and should be protected both when it is in use and when it is being stored, processed, or transmitted.
Unauthorized access has the potential to influence Invisible Technologies’ operational effectiveness,
violate contractual confidentiality agreements, initiate a security incident, or cause a major drop in both
client and industry confidence.
Scope
This data classification standard and policy is to be applied to all Invisible Technologies data, both physical
and electronic. No data item is too small to be classified.
Policy
• Invisible Technologies managers or information owners shall be responsible for assigning classifications
to information assets according to Invisible Technologies Data Classification Standards
• Whenever possible, clearly label each piece of information with its data classification
• All Invisible Technologies team members shall be guided by the information category in their handling of
all Invisible Technologies information
Non-Compliance
Since classifying data is an important part of protecting data and systems for Invisible Technologies, team
members who purposely violate this policy are subject to disciplinary action up to and including denial of
access, legal penalties, and/or dismissal. Any employee aware of any violation of this policy is required to
report it to their supervisor or other authorized representative.
Responsibility
The Security Team is responsible for communicating and upholding the Data Classification Policy and
Standards.
All team members are responsible for following the Data Classification Policy and Standards.