To align University of Tennessee at Chattanooga (UTC) standards of practice with University of Tennessee System-wide policy for developing, maintaining and documenting an Information & Computer System Classification program.
This program applies but is not limited to employees, contractors, agents, and representatives accessing, using, or handling UTC information technology resources.
This document is a UTC-specific Standard based on University System-wide policy. Each User of UTC resources is required to be familiar and comply with University policies, and acceptance is assumed if the User accesses, uses, or handles UTC information technology resources.
The Chief Information Officer (CIO) is the Position of Authority (POA) for Information
Technology at UTC and responsible for IT security at the University of Tennessee Chattanooga.
The CIO has overall responsibility of the Information & Computer System Classification program at UTC and ensures:
- The program is developed, documented, and disseminated to appropriate UTC entities in accordance with University policy.
- The program is reviewed and updated annually.
- The Chief Information Security Officer (CISO) is responsible for overseeing the Information & Computer System Classification program and consulting system owners to ensure effective procedures are implemented.
- System owners/administrators are responsible for adhering to this Standard for their respective system(s).
- All business systems supporting mission-essential functions are included in UTC’s Audit & Accountability program.
- The CISO will create and maintain security procedures for the various types of classifications used by the University:
- Minimum Security Procedures for Devices with Sensitive Information.
- Minimum Security Procedures for Devices with Internal or Public Information.
- A security guide for the handling of physical data.
- All system owners/administrators must:
- Identify and document information types stored or processed by each information system.
- Assign the appropriate classification level for data on the system.
- Utilize the appropriate guidance provided by Information Security to protect data and systems based on their classification.
- Classification of Data –
- All University data will be classified into levels of sensitivity to provide a basis for understanding and managing University data.
- Accurate classification provides the basis to apply an appropriate level of security to University data.
- These classifications of data take into account the legal protections (by statute or regulation), contractual agreements, ethical considerations, or strategic or proprietary worth.
- Data can also be classified as a result of the application of “prudent stewardship,” where the best reason to protect the data is to reduce the possibility of harm to individuals or to the University.
- Classification Levels –
- The classification level assigned to data will guide Information Owners, Information System Owners, business and technical project teams, and any others who may obtain or store data, in the security protections and access authorization mechanisms appropriate for that data.
- Such categorization encourages the discussion and subsequent full understanding of the nature of the data being displayed or manipulated. Data is classified as one of the following:
- Public (low level of sensitivity). Public data is not considered confidential. Examples of Public data include published directory information and academic course descriptions.
- Internal (moderate level of sensitivity). Internal data is information that is not required to be protected by law or regulation but its disclosure could be harmful or embarrassing to the University. Examples of Internal data include purchasing data, financial transactions (that do not include sensitive data), and information covered by non-disclosure agreements.
- Sensitive (highest level of sensitivity). Sensitive data is information that must be protected by law or regulation. Examples of Sensitive data includes information related to types of research, the Family Educational Rights and Privacy Act, the Health Insurance Portability and Accountability Act, the Gramm–Leach–Bliley Act, and the Payment Card Industry Data Security Standard.
- Notes – Certain special provisions and requirements that apply to information classification are provided to ease the interpretation and implementation process.
- The university, except as recognized in the Statement of Policy on Patents, Copyrights, and Licensing, retains ultimate ownership of all information.
- Computer systems meeting the criteria of multiple classification levels must protect the highest level of information on the system or a detailed plan must be provided detailing a clear separation of data and the protections for each classification of data on the system.
- All computer systems that handle, process, or store the university’s information at an offsite location must adhere to this program. Contracts with third-party vendors that handle, process, or store the university’s information should reflect a requirement that they acknowledge and adhere to this program.
IT0115 – Information and Computer System Classification