_____________ in its simplest form is a way to identify the value of data.
Data classification
Three approaches to reducing the time and effort required to classify data are:
1 - Classify only the most important data
2 - Classify data by storage locaftion or point of origin
3 - Classify data at time of creation or use
The Department of Energy uses the following 3 classifications:
Unclassified Controlled Nuclear Information (UCNI), Formerly Restricted Data (FRD), and Restricted Data.
The US DoD uses the following classifications:
Confidential, secret, and top secret
The three most common reasons to classify data are:
-To protect information
-To retain information
-To recover information
The need to protect information is often referred to as the _________________.
security classification
You need to retain data for two major reasons:
legal obligation and needs of the business.
In the US, financial and tax records are generally retained for _______ years.
7
________________ requires all customer correspondence to be retained for three years. This is to ensure a record is kept in case of an accusation of fraud or misrepresentation.
The Securities and Exchange Commission (SEC) Rule 17a-4
______________ is demonstrated through a retention policy that demonstrates how data is routinely classified, retained, and deleted.
“Good faith”
There are various approaches, sometimes called _______________, to classifying data.
classification schemes
When training employees on classification schemes, a good rule is to use ________________ classes. Many organizations use _________.
five or fewer
three
With ____________ data, unauthorized disclosure would reasonably be expected to cause damage to national security.
confidential
With ____________ data, unauthorized disclosure would reasonably be expected to cause serious damage to national security.
secret
With ____________ data, unauthorized disclosure would reasonably be expected to cause grave damage to national security.
top secret
__________________ is confidential data not subject to release under the Freedom of Information Act.
Sensitive but unclassified
_________________ automatically removes the classification after 25 years.
Automatic declassification
________________ reviews those records exempted from automatic declassification.
Systematic declassification
_________________ reviews specific records when requested.
Mandatory declassification
In the business world, _____________ closely align with measured business results.
impact definitions
When developing a customized data classification scheme, consider the following 5 general guidelines:
1 - Determine the number of classification levels
2 - Define each classification level
3 - Name each level
4 - Align the classification to specific handling requirements
5 - Define the audit and reporting requirements
You need to consider two primary issues when classifying data:
1 - data ownership
2 - security controls
As with data classification, the data owner must strike a balance between ____________ and _______________.
protection and usability
The majority of states today have privacy laws that fall under two types of encryption requirements:
1 - Laws that require private data to be encrypted
2 - Laws that require notification of breaches when private data is not encrypted