Information Classification and Handling Standard
Information asset classification is required to determine the relative sensitivity and criticality of information assets, which provide the basis for protection efforts and access control. This document provides guidelines for the classification of information as well as its labeling, handling, retention and disposition.
A. Information Classification
Information classification is the process of assigning value to information in order to organize it according to its risk to loss or harm from disclosure. The Cal Poly information classification and handling standard establishes a baseline derived from federal laws, state laws, regulations, California State University (CSU) Executive Orders, CSU policies, and campus policies that govern the privacy and confidentiality of information.
This information classification and handling standard applies to:
- All information or data collected, generated, maintained, and entrusted to Cal Poly and its auxiliary organizations (e.g., student, research, financial, employee data) except where superseded by grant, contract, or federal copyright law.
- Information in electronic or hard copy form.
Vice Provost/Chief Information Officer
Information Security Officer
|Updated Facilities classification levels
|Updated handling section for electronic mail of level 2 information to indicate that it may be sent by electronic mail to those who have a business need-to-know and are Cal Poly employees, its auxiliary employees, contractors or vendors who have signed a confidentiality-security agreement.
|Released final version for posting on the web and notified campus constituents
|Reviewed and consulted with Information Resource Management Policy and Planning Committee (IRMPPC)
|Reviewed and consulted with Administrative Advisory Committee on Computing (AACC)
|Reviewed and consulted with Instructional Advisory Committee on Computing (IACC)
|Reviewed and consulted with LAN Coordinators
|Reviewed and consulted with Information Security Committee
|Reviewed and consulted with Information Security Management Team
|Made additions and revisions for Cal Poly
|Acquired source document from Cal Poly Pomona