Information Classification Scheme
Information Classification Scheme
I. Scope
All full-time, part-time, and temporary employees and contractors, health care providers,
health care clearinghouses, and health plans with authorized access to HIC, Inc. information
systems or data contained within, are covered by this policy and must comply with the
associated standard (Palmer, Robinson, Patilla, & Moser, 2000, p. 25).
II. Objectives
HIC, Inc. defines information classifications based on the sensitivity, criticality, and value of
the information. All information assets, whether generated internally or externally, must be
categorized into one of four information classifications: Highly Sensitive, Sensitive, Internal,
and Public (Johnson, 2015, p. 302). Information collections or documents made up of
information from different classifications shall be classified at the most restrictive level of
existing information contained within. Guidance for the classification of information can be
found in the Asset Identification and Classification Standard section of this policy (Palmer et
al., 2000, p. 25). This policy references a combination of mandatory and discretionary access
controls depending on whether the information is regulated or not.
III. Responsibilities
The Chief Information Security Officer (CISO) is responsible for the development,
implementation, and maintenance of the Asset Identification and Classification Policy and
associated standard (Palmer et al., 2000, p. 25).
Users are responsible for understanding the information classifications, abiding by the
implemented access controls, maintaining the information classification, and contacting the
HIC, Inc. data steward if information classifications are unknown (Palmer et al., 2000, p. 26).
a. Highly Sensitive
i. Definition: Information that is critical to HIC, Inc. operations and/or regulated by
local, state, and/or federal governments. Unauthorized access of information in this
classification presents a risk of catastrophic disruptions to operations or financial
loss.
ii. Example(s): protected health information (PHI), electronic PHI (ePHI), personally
identifiable information (PII), HIC, Inc. financial information, encryption keys
(private)
iii. Access granted to (the “Grantee”):
1. Health providers have read/write access to PHI and ePHI after the health record
owner has provided express written consent.
2. Human resources, security departments, etc. have read/write access to employee
PII.
3. All others are granted read and/or write access to information classified as Highly
Sensitive based on the individual’s job role as determined by the HIC, Inc. data
steward.
iv. Grantee responsibilities and restrictions: Grantees must comply with all applicable
regulations and may not distribute Highly Sensitive information to others without the
express written consent of the information owner.
v. Security label(s): “CONFIDENTIAL - HIGH”, “PROTECTED HEALTH
INFORMATION”
b. Sensitive
i. Definition: Information that is important to HIC, Inc. operations. Unauthorized access
of information in this classification presents a risk of major disruptions to operations
or financial loss.
ii. Example(s): Health plan member lists, corporate network topologies
iii. Access granted to (the “Grantee”): Read and/or write access to information classified
as Sensitive is on a need-to-know basis and dependent on the individual’s job role as
determined by the HIC, Inc. data steward.
iv. Grantee responsibilities and restrictions: Grantees may not distribute Sensitive
information to others without information owner approval.
v. Security label(s): “CONFIDENTIAL – MEDIUM”
c. Internal
i. Definition: Information that is not related to HIC’s core business operations.
Unauthorized access of information in this classification presents a risk of minor
disruptions to operations or financial loss.
ii. Example(s): Internal communications, internal website content
iii. Access granted to (the “Grantee”): Employees
iv. Grantee responsibilities and restrictions: Grantees may not distribute Internal
information externally without public information grantor approval.
v. Security label(s): “FOR INTERNAL USE ONLY”, “CONFIDENTIAL – LOW”
d. Public
i. Definition: Information that presents no risk of disruption to operations or financial
loss.
ii. Example(s): Press releases, HIC, Inc. website content (information accessible without
login credentials)
iii. Access granted to (the “Grantee”): The public and others external of HIC, Inc.
iv. Grantee responsibilities and restrictions: The grantee has no responsibilities
surrounding publicly available information. However, only those designated as public
information grantors may classify HIC, Inc. information as Public.
v. Security label(s): “APPROVED FOR PUBLIC USE”
Approved: _________________________________________________________
Signature
Edward R. Locke
Chief Information Security Officer
References
Palmer, M., Robinson, C., Patilla, J., and Moser, E. (2000) META Security Group Information
Security Policy Framework: Best Practices for Security Policy in the Internet and
e-Commerce Age.
Johnson, R. (2015) Security Policies and Implementation Issues (2nd ed.). Burlington, MA: Jones
& Bartlett Learning.