Data Loss Prevention
Data Loss Prevention
Data Loss Prevention
ADMINISTRATIVE PROCEDURE
Purpose
Data Loss Prevention (DLP) encompasses the processes and rules used to detect and prevent
the unauthorized transmission or disclosure of confidential information. The purpose of this
procedure is to establish a framework of controls for classifying and handling college data based
on the data’s level of sensitivity, storage location, value, and criticality to the college. The control
elements of DLP help to ensure data is utilized in its intended manner.
Confidential data can reside on or in a variety of mediums (pictures, paper documents, shred
bins, physical servers, virtual servers, databases, file servers, personal computers, point-of-sale
devices, USB drives and mobile devices) and can move through a variety of methods (human,
network, wireless, etc.). The college relies on a variety of DLP strategies and solutions to
prevent data loss. The college’s DLP strategies and solutions are reevaluated regularly to
ensure their relevancy and effectiveness.
This security procedure applies to all college employees and users of the college’s computer
systems. Individuals working for institutions affiliated with the college are subject to the same
rules when they are using the college’s information technology resources or have any means of
access to college data that has been classified as confidential or private.
Data Classification
Data classification, in the context of information security, is the classification of data based on its
level of sensitivity and the impact to the college should that data be disclosed, altered or
destroyed without authorization. Classification of data will aid in determining baseline security
controls for the protection of the data. All institutional data is classified into one of three
sensitivity levels (tiers), or classifications:
Tier1-Confidential Data
Data is classified as Confidential when the unauthorized disclosure, alteration or
destruction of that data could cause a significant level of risk to the college or its
affiliates. Unauthorized access to or disclosure of confidential information could
constitute an unwarranted invasion of privacy and cause financial loss and damage to
the college’s reputation and the loss of community confidence. Examples of Confidential
data include data protected by state or federal privacy regulations and data protected by
confidentiality agreements. The highest level of security controls should be applied.
Access to Confidential data must be controlled from creation to destruction, and will be
granted only to those persons affiliated with the college who require such access in
Data Loss Prevention – Page 2
Access to Internal/Private data must be requested for an individual and approved by the
individual’s Vice President, Provost or Executive Director. Data access granted to
individuals must be reviewed and authorized by the Data Owner who is responsible for
the data. Access to Internal/Private data may also be authorized to groups of persons by
their job classification or responsibilities (“role-based” access), and may also be limited
by one’s department.
Public data is not considered sensitive; therefore, it may be granted to any requester or
published with no restrictions. The integrity of Public data should be protected. The
impact on the institution should Level 3 Public data not be available is typically low,
(inconvenient but not debilitating).
Data Collections
Data Owners may wish to assign a single classification to a collection of data that is common in
purpose or function. When classifying a collection of data, the most restrictive classification of
any of the individual data elements should be used. For example, if a data collection consists of
a student’s name, address and social security number, the data collection should be classified
as Confidential even though the student’s name and address may be considered Public
information unless specifically marked as Do Not Publish.
Restricted Data
“Restricted data” is a particularly sensitive category of Tier 1-Confidential data. Restricted data
is defined as ‘any confidential or personal information that is protected by law or policy and that
requires the highest level of access control and security protection, whether in storage or in
transmission’.
Data Loss Prevention – Page 3
The student can create and manage their Personal Identification Number on the MyCF portal.
College personnel will first verify that the PIN provided is the student’s current personal
identification number before proceeding to discuss any of the student’s FERPA restricted data.
The PIN cannot be used to authorize access to student records for anyone other than the
student. In order to give permission to another individual to discuss student records, the student
must complete and submit the Student Authorization for Access to Educational Records..
For each restricted data classification, the data handling requirements and restrictions are
defined to appropriately safeguard the information. All employees must adhere to the following
requirements and restrictions regarding the storage and handling of unencrypted restricted data:
Personal email No No No
Personally-managed computer No No No
(home computer)
Personal Smart Phone No No No
Electronic data files that contain confidential or private data should be deleted and completely
removed from the trash, if applicable, as soon as they are no longer necessary.
Electronic devices that may have contained confidential or private data and are ready for
disposal must be drilled or destroyed.
Data Discovery
Data discovery is one of the key elements of a DLP program. Regardless of the amount of
security controls that have been implemented, it is likely that confidential data may be at risk.
The college relies on several strong discovery tools to conduct data discovery and to remediate
potential data leaks. A data discovery assessment will be conducted regularly.
Employee generated data is unstructured and can be difficult to secure. There is a rapid and
seemingly endless growth of employee generated data. A data discovery assessment will be
conducted regularly to identify and protect confidential data when it has been stored in an
unstructured environment. The college will use data discovery software to provide visibility into
the content of data across all file systems, detect sensitive data, identify when the data was
Data Loss Prevention – Page 6
stored, when the data was last accessed and who has access to the data. As a result, the
confidential data will be deleted if it is no longer needed or encrypted if it must be retained.
Violations
Anyone who knows or has reason to believe that another person has violated this procedure
shall report the matter promptly to his/her supervisor, department head or the Chief Information
Officer. After a violation of this procedure has been reported or discovered, the issue will be
handled as soon as possible to reduce harm to the college and its affiliates. Violators of this
procedure may be subject to disciplinary action, up to and including the termination of
employment depending on the severity of the violation or data breach.