Assest Classification Policy
Assest Classification Policy
1 INTRODUCTION
With the U.S. Congress on full alert regarding the protection of information assets and
the international community certifying organizations to information security standards,
the requirement for an asset classification policy is at hand. As a security professional, it
is important to know that an asset or information classification policy is only one element
in the overall information management process. The Information Classification Policy
must be coupled with a Records Management Policy.
Any security standard or best practice must be founded on a solid foundation of an
asset classification. To ensure proper protection of our information resources, it is
necessary to define what an owner is and how that entity has ultimate responsibility for
the information assets within its business unit; this includes classification and assigning
retention requirements. By implementing an asset management scheme and supporting
methodology, we are able to determine required controls commensurate with the
sensitivity of the information as classified by the owner.
This chapter explores the need for both policies, examines the contents of these
policies, and then critiques various examples of these policies.
2 OVERVIEW
Information is an asset and the property of the organization. All employees are to protect
information from unauthorized access, modification, disclosure, and destruction. Before
employees can be expected to protect information, they must first understand what they
have. An information classification policy and methodology will provide them with the
help they need.
There are four essential aspects of information classification: (1) information
classification from a legal standpoint, (2) responsibility for care and control of
information, (3) integrity of the information, and (4) the criticality of the information and
systems processing the information. Examples of how the classification process fits into
the application and system development life cycle are presented to assist you in the
development of your own information classification process.
As discussed later in this chapter, information classification is only one of the
elements in an effective information management program. Knowing what we have and
how important it is to the organization is key to the success for the information security
program. The implementation of this program will require that representatives of the
organization be charged with exercising the organization’s proprietary rights. In addition,
Asset Classification Policy 75
a full inventory of these assets must be conducted with a requirement for annual review
established.
The portion of Internet access that is behind your zone of protection and contains
information for use by employees is your intranet connection. This area contains
information that is unavailable to the outside world but has been made accessible to
employees for use while performing their assigned tasks.
For years the information handling standard was that all information is closed until the
owner opens it. This worked well in the mainframe environment when access control
packages ruled the single platform of information processing. With the introduction of
the client/server environment and the multiple platforms operating situation, no one
access control package could handle all the needs. With decentralized processing and
then the move to connect to the Internet, the restrictions on information closure began to
weaken. The operating concept during this period was that all information was open until
the owner classified it and closed access to it.
Now we have gone full circle. As the decentralized processing environment matures
and national and international laws, statutes, and privacy concerns become stronger, the
information protection concept was reverted to all information access is closed until the
owner opens access. For this to be effective and to allow the organization to demonstrate
due diligence, it is incumbent for the organization to establish an effective information
classification policy and support handling standards.
Most organizations do not have information that is all the same value or sensitivity. It
is necessary to at least develop an initial high-level attempt at classification. This should
be done if for no other reason than to ensure that budgeted resources are not misused in
over-protecting nonsensitive, noncritical information assets. Before employees can
protect information assets, they must first have a policy that identifies classification
levels and then a methodology to implement the policy requirements. An information
classification policy that is not overly complex and a methodology that relies on common
sense and is facilitated by either information security or records management will make
acceptance possible.
from Tennessee and Pam comes from Kentucky.” So before you develop an answer,
make sure you understand the question.
When conducting interviews with management and other key personnel, develop a set
of questions to ensure a consistency in the direction of the responses. These questions
might include some of the following:
• What are the mission-critical or sensitive activities or operations?
• Where is mission-critical or sensitive information stored?
• Where is this information processed?
• Who requires access to this information?
There are no hard-and-fast rules for determining what constitutes sensitive information.
In some instances, it may be that the number of people who require access may affect the
classification. The real test of an information classification system is how easy is it for
the reader to understand what constitutes sensitive information and what organization-
approved label should be affixed to the information asset resource.
5 WHERE TO BEGIN?
After you have a clearer idea of what management is expecting, it is time to do some
research. I like to contact my fellow information security professionals and find out what
they have done to answer the problems I have been assigned. By being a member of the
Computer Security Institute (CSI), the Information System Security Association (ISSA),
and the Information Systems Audit and Control Association (ISACA), I have a ready
access to people in my area who are usually willing to share examples of their work.
When developing classification levels, I prefer to discuss the topic with fellow
professionals. I recommend that you cultivate contacts in similar business environments
and see what your peers are doing. The Internet can generate some examples of
classification policies, but many of them are university or government-agency-related. Be
careful of what you uncover in your research; while there are many good ideas and terms
out there, they are only good if they are applicable to your specific needs.
Use the information you gather from fellow professionals as a starting point. Your
organization will have its own unique variation on the classification policy and
categories. We examine a number of examples of information categories in the
subsequent subsection. If you are a government agency, or do work for a government
agency, be sure to check with your regulatory affairs group to see if there are any
government-imposed requirements.
policy after a government standard is that there might be confusion regarding what is
government contact information and what is normal business information. Also, the
number of employees exposed to the government standards may impact the drafting of
these standards.
I recently discussed the classification scheme shown in Table 4 with the company that
created it to find out how they use the color coding. The sample “Information Security
Handbook” included in this book also uses color codes for information classification. The
company does not actually use the colors to color-code the documents. Instead, the
company identifies the level of classification but requires the footer to contain “Company
Red” or whatever color. It gives a good visual for the employees.
The company in Table 5 also requires that specific levels of information contain
appropriate markings to identify it as classified information. We discuss an Information
Handling Matrix later in this chapter. When you create your organization’s handling
requirements, use the following as thought starters:
• MAKE NO COPIES
• THIRD-PARTY CONFIDENTIAL
• ATTORNEY-CLIENT PRIVILEGED DOCUMENT
• DISTRIBUTION LIMITED TO_______
• COVERED BY A NON-ANALYSIS AGREEMENT
Table 1. Information Classification Category
Example 1
Mega Oil Corporation
HIGHLY CONFIDENTIAL—Information whose unauthorized disclosure will cause the
corporation severe financial, legal, or reputation damage. Examples: acquisitions data, bid details,
and contract negotiation strategies.
CONFIDENTIAL—Information whose unauthorized disclosure may cause the corporation
financial, legal, or reputation damage. Examples: employee personnel and payroll files, and
competitive advantage information.
GENERAL—Information that, because of its personal, technical, or business sensitivity, is
restricted for use within the company. Unless otherwise classified, all information within Mega Oil
Corporation is in this category.
At this point in the classification scheme, this company has included a mechanism to establish the
criticality of the information. It has established its three information classification categories and
now adds three impact categories, Using these sets of definitions, the manager of the information
resources will be able to determine how critical the asset is to the company.
MAXIMUM—Information whose unauthorized modification and destruction will cause the
company severe financial, legal, or reputation damage.
MEDIUM—Information whose unauthorized modification and destruction may cause the company
financial, legal, or reputation damage. Examples: electronic funds, transfer, payroll, and
commercial checks.
MINIMUM—Although an error in this data would be of minimal consequence, this is still
important company information and therefore will require some minimal controls to ensure a
Asset Classification Policy 79
minimal level of assurance that the integrity of the data is maintained. This applies to all data that is
not placed in one of the above classifications. Examples: lease production data, expense data,
financial data, and exploration data.
CRITICAL—It is important to assess the availability requirements of data, applications, and
systems. A business decision will be required to determine the length of unavailability that can be
tolerated prior to expending additional resources to ensure the information availability that is
required. Information should be labeled “CRITICAL” if it is determined that special procedures
should be used to ensure its availability.
to our reputation or the public image. Disclosure would cause a severe loss of market share or the
ability to be first to market. Disclosure would cause a loss of an important customer, shareholder,
or business partner. Disclosure would cause a long-term or severe drop in stock value. Strong
likelihood somebody is seeking to acquire this information.
Company Confidential Yellow—Provides a competitive advantage. Disclosure could cause
moderate damage to the company or an individual. Relates to or describes an important part of the
operational direction of the company over time. Provides important technical or financial aspects of
a product line or a business unit. Disclosure could cause a loss of Customer or Shareholder
confidence. Disclosure could cause a temporary drop in stock value. Very likely that some third
party would seek to acquire this information.
Company Confidential Green—Might provide a business advantage over those who do not have
access to the same information. Might be useful to a competitor. Not easily identifiable by
inspection of a product. Not generally known outside the company or available from public
sources. Generally available internally. Little competitive interest.
Company Public—Would not provide a business or competitive advantage. Routinely made
available to interested members of the General Public. Little or no competitive interest.
There are a number of ways to look at information that may be classified as confidential.
A number of statements relating to confidential information are examined below. The
first is a general statement about sensitive information.
For a general definition of what might constitute confidential information, it may be
sufficient to define such information as:
The Economic Espionage Act of 1996 (EEA) defines “trade secret” information to
include “all forms and types of financial, business, scientific, technical, economic, or
engineering information,” regardless of “how it is stored, complied, or memorialized.”
The EEA criminalizes the actions of anyone who:
• Steals or, without authorization, appropriates, takes, carries away, or conceals, or by
fraud, artifice, or deception obtains a trade secret
• Without authorization, copies, duplicates, sketches, draws, photographs, downloads,
uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails,
communicates, or conveys a trade secret
• Receives, buys, or possesses a trade secret, knowing the same to have been stolen or
appropriated, obtained, or converted without authorization
• Conspires with one or more other persons to commit any offense described in any part
of the EEA under the heading “conspiracy”
The inf ormation classification policy that you will be developing will discuss
organization-confidential information. Typically, this type of information will consist of
either competitive-advantage or trade secret information or personal information.
The laws regarding trade secret information were developed from the duty of good
faith imposed generally in commercial dealings. A trade secret is commonly defined as
Information Security Policies and Procedures 82
information deriving actual or potential economic value by virtue of its not being readily
ascertainable through proper means by the public, and which is the subject of reasonable
efforts to maintain its secrecy. The legal system protects the owner (in our case, the
organization) from someone who uses improper means to learn the trade secret, either
directly or indirectly. Therefore, anyone using improper means to learn the trade secret
has breached a duty of good faith dealing with the trade secret owner.
The breach of that duty of good faith usually takes the form of an abuse of a
confidence, the use of improper means to ascertain the secret, or a breach of contract.
Anyone involved in the breach of that duty is liable for trade secret stealing.
The laws are requirements governing trade secret and competitive-advantage
information, are well established, and offer substantial penalties for noncompliance (see
Figure 2). The area of personal information has become hotter during the past couple of
years. The passage of the Health Insurance Portability and Accountability Act (HIPAA),
Gramm-Leach-Bliley Act (GLBA), European Union privacy laws, and organizations
such as Privacy International are working to increase the safeguards required for personal
information.
8 EMPLOYEE RESPONSIBILITIES
When I was doing research for this section of the book, I came across the following
policy statement:
The “Information Owner” means the party who confides the referenced
Confidential Information to the other party, the Confidant . Despite the
name, the Information Owner benefits from a Confidentiality Engagement
with respect to Confidential Information that it owns or possesses.
These two sentences have five terms that require the reader to get further definitions. As I
attempted to determine exactly what it means to “confide,” I was sent to a hypertext page
that explained that it meant to “entrust” the information to a “confidant,” which means
the “party receiving the information,” and at that point I started looking elsewhere for
examples.
The two lines of policy above provide a good example of what should be avoided
when you are writing a policy—or writing anything. The document just referenced came
from an organization with strong roots in the legal and government sector. If this is your
audience, then this is the language for you. If not, try to think like Henry David Thoreau
and simplify.
There are typically three areas of employee responsibility: owner, user, and custodian.
We discuss each of these concepts and examine how other organizations have defined
these responsibilities.
8.1 Owner
The information owner is the entity within the organization that has been assigned the
responsibility to exercise the organization’s proprietary rights and grant access privileges
to those with a true business need. This role is normally assigned to the senior level
manager within the business unit where the information asset was created, or is the
primary user of that asset. The manager will have the ultimate responsibility for
compliance, but will probably delegate the day-to-day activities to some individual who
reports to him or her.
• For each document or file within each of the classification categories, append its agreed
(confidentiality) classification. Its availability should be determined by the respective
classification.
• Ensure that, for each classification type, the appropriate level of information security
safeguards is available; for example, the log-on controls and access permissions
applied by the Information Custodian provide the required levels of confidentiality.
• Periodically check to ensure that information continues to be classified appropriately
and that the safeguards remain valid and operative.
I am not certain what being designated “head” actually means, but I do not believe I
would want that title. The term “initial owner” may also lead the reader to believe that
someone else may come along and become the “final” or “ultimate” leader.
We now review the owner definition from a global media organization.
This is a fairly good definition. The only element that I might add is the requirement that
the owner monitor the safeguards to ensure custodian compliance. Let us examine one
more example.
8.2 Custodian
The next responsibility we have to create is that of the information custodian. This entity
is responsible for protecting the information asset based on the requirements established
by the owner. In an organization that has an information systems organization, the
operations group might be considered the custodian of client data and information. They
do not have the right to permit anyone access to the information asset, nor can they alter
that information in any way without approval from the owner. This would include any
programming or system upgrades that would modify the information or the output from
applications and transactions.
This example started out well but finished oddly. Giving examples of what might be
considered a custodian is good. Trying to liken a filing cabinet to the opening sentence
where the policy identifies the custodian as a “person” is not. Remember that when you
are writing, go back and read what you just wrote to make sure the concepts match from
beginning to end. Do not try to be cute. Stick to what the subject is, and make sure you
say exactly what needs to be said.
The use of the term “steward of the data” brings out a point that needs to be made. Some
organizations and cultures prefer other terms than the ones discussed here. When I was
younger, I played Pony League baseball for a team called the “Custodians.” Our uniforms
were the most realistic because we had the name on the front and number on the back.
The other teams had names like “Tigers” and “Braves” but had some advertisement about
their sponsor on the back. It was not until we played a few games that the other team
started calling us the janitors. Custodian to some is a noble name; to others, maybe not so
noble. So choose your terms wisely. Curator, Keeper, and Guardian are other terms that
might work.
Recently we were doing work for HIPAA compliance. While developing policies for a
hospital, we discussed the definition for “user.” The hospital staff started to chuckle and
told us that the term “user” had a totally different meaning there and we needed to find
another term.
Information Security Policies and Procedures 86
It is important to remember that when we use the term “employee,” we are actually
discussing the virtual employee. We can only write policy for employees; for all third
parties, a contract must contain compliance language. So it is perfectly acceptable to
identify “employees” even if we know that someone other than an employee may actually
perform the function. This is true for all employee responsibilities except “owner.” The
owner must be an employee; after all, it is the organization’s information.
8.3 User
The final element is the user. The owner grants permission to access the information asset
to this individual. The user must use the information in the manner agreed upon with the
owner. The user has no other rights. When granting access, the owner should use the
concept of “least privilege.” This means that users are granted only the access they
specifically need to perform their business task, and no more.
The inventory discussed here will be addressed in both the classification policy and the
records management policy. Including who has been assigned access needs to be tracked.
The Custodian is generally responsible for providing the tools to monitor the user list.
9 CLASSIFICATION EXAMPLES
9.1 Example 1
Critique of Example 1 ( Table 6 ): This is an actual classification policy (very high level)
for the executive branch of a national government. There is little here to help the average
user. This is an example of a Program or General Policy Statement; however, a Topic-
Specific Policy Statement might have been more beneficial. Perhaps the next two
examples will provide more information.
9.2 Example 2
Critique of Example 2 ( Table 7 ): The policy seems to stress competitive advantage
information in its opening paragraphs. It does not appear to address personal information
about employees or customers. It does provide for these topics as categories under
Confidential but it never really mentions them by name. This appears to be a policy that
is somewhat limited in scope. Additionally, it does not establish the scope of the
information (is it computer generated only, or exactly what information is being
addressed). The employee responsibilities are missing. What is management’s
responsibility with respect to information classification, and what is expected of the
employees? Finally, what are the consequences of noncompliance?
Table 6. Information Classification Policy
Example 1
Information Classification
Policy: Security classifications should be used to indicate the need and priorities for security
protection.
Objective: To ensure that information assets receive an appropriate level of protection.
Statement: Information has varying degrees of sensitivity and criticality. Some items may require
an additional level of security protection or special handling. A security classification system
should be used to define an appropriate set of security protection levels, and to communicate the
need for special handling measures to users.
The information must be the result of some minimal expense or investment by the organization.
The information is somewhat unique in that it is not generally known in the industry or to the
public or may not be readily ascertained.
The information must be maintained as a relative secret, both within and outside the organization,
with reasonable precautions against disclosure of the information. Access to such information could
only result from disregarding established standards or from using illegal means.
Top Secret (Secret, Highly Confidential)
Attributes:
Provides the organization with a very significant competitive edge
Is of such a nature that unauthorized disclosure would cause severe damage to the organization
Shows specific business strategies and major directions
Is essential to the technical or financial success of a product
Examples:
Specific operating plans, marketing strategies
Specific descriptions of unique parts or materials, technology intent statements, new technologies,
and research
Specific business strategies and major directions
Confidential (Sensitive, Personal, Privileged)
Attributes:
Provides the organization with a significant competitive edge
Is of such a nature that unauthorized disclosure would cause damage to the organization
It shows operational direction over extended period of time
Is extremely important to the technical or financial success of a product
Examples:
Consolidated revenue, cost, profit, or other financial results
Operating plans, marketing strategies
Descriptions of unique parts or materials, technology intent statements, new technological studies,
and research
Market requirements, technologies, product plans, revenues
Business information
Organization policies, standards, procedures
Internal organization announcements
Public (Unclassified)
Attributes:
Information that, due to its content and context, requires no special protection, or
Information that has been made available to the public distribution through authorized company
channels
Examples:
Online public information, Web site information
Internal correspondence, memoranda, and documentation that do not merit special controls
Public corporate announcements
9.3 Example 3
Critique of Example 3 ( Table 8 ): Examples 2 and 3 are very similar; this one does
address the role of the Owner but it fails to define what an Owner is. The issue of
noncompliance is not addressed and the scope of the policy is vague.
9.4 Example 4
Critique of Example 4 ( Table 9 ): The intent of the policy is stated as “Information is a
corporate asset and is the property of Corporation.” The scope of the policy is “Corporate
information includes electronically generated, printed, filmed, typed, or stored.” The
responsibilities are well established. The issue of compliance is the only policy element
that appears to be lacking.
10 DECLASSIFICATION OR RECLASSIFICATION OF
INFORMATION
classification is assigned, and that an information handling set of standards will help
maintain control of information copies.
The Records Management Policy will require that the owner provide a brief
description of the information record and the record retention requirements. These
requirements will be a set of standards that support the Records Management Policy.
We next briefly examine what is typically part of a Records Management Policy.
Table 9. Information Classification Policy
Example 4
Information Management
General
Corporate information includes electronically generated, printed, filmed, typed, or stored.
Information is a corporate asset and is the property of Corporation.
Information Retention
Each organization shall retain information necessary to the conduct of business.
Each organizational unit shall establish and administer a records management schedule in
compliance with applicable laws and regulations, and professional standards and practices, and
be compatible with Corporate goals and expectations.
Information Protection
Information must be protected according to its sensitivity, criticality, and value, regardless of the
media on which it is stored, the manual or automated systems that process it, or the methods by
which it is distributed.
Employees are responsible for protecting corporate information from unauthorized access,
modification, destruction, or disclosure, whether accidental or intentional. To facilitate the
protection of corporate information, employee responsibilities have been established at three
levels: Owner, Custodian, and User.
Owner: Company management of the organizational unit where the information is created, or
management of the organizational unit that is the primary user of the information. Owners are
responsible to:
Identify the classification level of all corporate information within their organizational unit
Define appropriate safeguards to ensure the confidentiality, integrity, and availability of
the information resource
Monitor safeguards to ensure they are properly implemented
Authorize access to those who have a business need for the information
Remove access from those who no longer have a business need for the information
Custodian: Employees designated by the owner to be responsible for maintaining the
safeguards established by the owner.
User: Employees authorized by the owner to access information and use the safeguards
established by the owner.
Asset Classification Policy 93
Each Vice President shall appoint an Organization Information Protection Coordinator who will
administer an information protection program that appropriately classifies and protects corporate
information under the Vice President’s control and makes employees aware of the importance of
information and methods for its protection.
Information Classification: To ensure the proper protection of corporate information, the owner
shall use a formal review process to classify information into one of the following classifications:
Public: Information that has been made available for public distribution through authorized
company channels. (Refer to Communication Policy for more information.)
Confidential: Information that, if disclosed, could violate the privacy of individuals, reduce the
company’s competitive advantage, or could cause significant damage to the company.
Internal Use: Information that is intended for use by all employees when conducting company
business. Most information used in the company would be classified Internal use.
An organization’s records are one of its most important and valuable assets. Almost every
employee is responsible for creating or maintaining organization records of some kind,
whether in the form of paper, computer data, optical disk, electronic mail, or voice-mail.
Letters, memoranda, and contracts are obviously information records, as are things such
as a desk calendar, an appointment book, or an expense record.
Organizations are required by law to maintain certain types of records, usually for a
specified period of time. The failure to retain such documents for these minimum time
periods can subject an organization to penalties, fines, or other sanctions, or could put it
at a serious disadvantage in litigation. Therefore, every organization should implement a
Records Management Policy to provide standards for maintaining complete and accurate
records in order to ensure that employees are aware of what records to keep and for how
long, what records to dispose of, and how to dispose of them.
Cost of storage and administration problems involved in retaining material beyond its
useful life are a few important reasons to establish a Records Management Policy.
Consideration should also be given to the impact that a failure to produce subpoenaed
records might have on the organization when defending itself against a lawsuit.
Determining the proper retention periods for information records is a requirement in
today’s operating environment. Information records should be kept only as long as they
serve a useful purpose, or until legal requirements are met. At the end of the retention
period, records should be destroyed in a verifiable manner. Implementing effective
information classification and records management policies makes sound business sense
and shows that management is practicing its due diligence.
Before drafting a Records Management Policy, consult with your legal staff to ensure
that the policy reflects any relevant statutes. The retention standards that support the
policy should be reviewed annually when an information asset inventory is conducted
organizationwide.
Information Security Policies and Procedures 94
Later in the book we discuss standards and how they support the implementation of the
policy. Because information classification and records management are unique in their
standards requirements, I thought it appropriate to give examples now of what these
standards might look like. When you are developing your standards, use these as a
guideline—not a standard.
• Review performed by/Phone: the name and phone number of the individual performing
the review.
• Date: the date of the review.
• Information Name/Description: an identifier and description of the information being
reviewed.
Table 10. Sample Records Management Policy
Records Management Policy
Introduction
It is the policy of the Company to accommodate the timely storage, retrieval, and disposition of
records created, utilized, and maintained by the various departments. The period of time that
records are maintained is based on the minimum requirements set forth in State and Federal
retention schedules.
1. Role of Retention Center
The role of the Retention Center is to receive, maintain, destroy, and service inactive records that
have not met their disposition date. Each business unit is to establish schedules to comply with the
minimum amount of time records should be maintained in compliance with State and Federal
guidelines. Retention requirements apply whether or not the records are transferred to the Retention
Center. Copies of the schedules must be maintained by the business unit and available for
inspection.
2. Role of Records Manager
The role of the Records Manager is to administer the Records Management program. The Records
Manager is well acquainted with all records and/or record groups within an agency and has
expertise in all aspects of records management. The duties of the Records Manager include
planning, development, and administration of records management policies. These duties also
include the annual organization-wide inventory of all information assets to be conducted by the
business unit manager with reports sent to the Records Manager.
3. Role of Management Personnel
Management Personnel are responsible for records under their control.
4. Role of Departmental Records Coordinator
The Departmental Records Coordinator is to be a liaison between the department and the Retention
Center. It is recommended that each department appoint a Records Coordinator in writing. The
letter of appointment should include the Records Coordinator’s full name, department, and
telephone extension. The letter should be forwarded to the Retention Center and maintained on file.
5. Type of Documents Maintained in Retention Center
5.1 Record Retention accepts only public records that are referenced in the State Retention
Schedule, except student transcripts. Copies of student transcripts may be obtained from
Records and Admissions located at the Student Service Center.
5.2 Record Retention does not accept personal, active, or non-records.
5.3 Record Retention stores only inactive and permanent records until final disposition
according to State and Federal retention schedules. Examples include personnel files,
purchase orders, grade books, or surveys.
Information Security Policies and Procedures 96
5.4 Record Retention receives and stores inactive permanent records from TVI departments
until final disposition according to State and Federal retention guidelines.
5.5 Record Retention ensures records are classified according to State and Retention
guidelines.
5.6 Record Retention ensures records are tracked and entered into an electronic records
management software system that tracks record boxes, assigns retention schedules,
permanent box numbers, destruction dates, and shelf locations.
6. Services
6.1 If a department has obsolete records that are deemed confidential or sensitive, or copies of
non-records, a special request for shredding may be sent to the Record Retention Center.
The records can be shredded by the Record Retention Center staff or transferred to the
State Record Center for destruction.
6.2 Departments must complete a Request for Destruction form for confidential or non-records
to be shredded. Departments are required to purchase forms from Central Stores at
Shipping & Receiving.
6.3 The Record Retention Center provides consulting services to departments on filing systems
and maintenance of records.
7. Transferring Records
7.1 Departments should transfer records in January, July, and October to Record Retention for
storage.
7.2 Records with a retention period of two years or more should be transferred to Record
Retention.
8. Record Retrieval
8.1 Records are retrieved and delivered to customers by request, given a 24hour notice.
8.2 Records can be retrieved for customers on an emergency basis, as requested.
8.3 Management personnel, the records coordinator, or the requester will sign for receipt of
records. Records are to be checked out for no longer than 30 days. If a longer period is
required, a written request should be sent to the Retention Center. If records are checked
out for more than a year, the records will be permanently withdrawn from inventory.
8.4 Permanent Withdrawal: If a department wishes to withdraw a record permanently from
storage, forward a request to Record Retention by phone, fax, or inter-office mail. The
department will complete a Withdrawal Request form and the records will be deleted from
inventory
8.5 Second-Party Withdrawal: If a department requests a record originating from another
department, then the requesting department must contact the department of origin to obtain
authorization. The department of origin will contact Record Retention for records
withdrawal. The department requester must view the requested records at the Record
Retention Center.
8.6 Records should not be returned via inter-office mail due to the confidential nature of the
documents.
9. Record Destruction
Asset Classification Policy 97
9.1 Record Retention destroys records in January, July, and October according to State
guidelines.
9.2 Records are destroyed by Record Retention according to State and Federal guidelines
when legal requirements are met. A Destruction Request form will be sent to the
originating department for review and signature by the Departmental Records
Coordinator and by management personnel. Only when the Destruction Request has
been reviewed, signed, and returned to Record Retention will the expired records be
destroyed. Authorized personnel will shred confidential records. If departments wish to
keep the records past their assigned destruction date, management personnel can extend
the date no longer than one year unless a litigation, audit, or investigation is pending.
Records kept by the department past the retention date of destruction will be
permanently withdrawn from inventory.
9.3 All records scheduled for destruction are reviewed by the Institute’s Records Manager
and by State Records Analysts for approval.
10. Supplies
10.1 Records must be stored in the appropriate record retention boxes, which are obtained
from Central Stores at Shipping & Receiving.
10.2 Storage Ticket forms and Request for Destruction forms are obtained from Central
Stores at Shipping & Receiving.
– Asset allocation
– Trading activities
Table 11. Information Handling Matrix for
Printed Material
Confidential Internal Use Public
Labeling of Document should identify owner and No special Document may be
documents be marked “CONFIDENTIAL” on requirements marked “PUBLIC”
cover or title page on cover or title page
Duplication of Information owner to determine Duplication for No special
documents permissions business purposes requirements
only
Mailing of No classification marking on Mailing No special
documents external envelope; requirements requirements
“CONFIDENTIAL” marking on determined by
cover sheet; confirmation of receipt information owner
at discretion of information owner
Disposal of Owner observed physical destruction Controlled No special
documents beyond ability to recover physical requirements
destruction
Storage of Locked up when not in use Master copy Master copy secured
documents secured against against destruction
destruction
Read access to Owner establishes user access rules; Owner establishes No special
documents generally highly restricted user access rules; requirements;
generally widely generally available
available within and outside
company
Review of Information owner to establish Information owner No special
document specific review date (not to exceed to review at least requirements
classification one year) annually
level
– Production formulas
– Production cost information
– Customer lists
• Distribution Records:
– Distribution models
– Inventory records
– Parts supplies
Using the definitions, the person(s) performing the review would place a checkmark in
the appropriate column—only one check for each item being reviewed. This process
would allow the user department to identify
Asset Classification Policy 99
facility
Review of classified Information owner to Information owner to Information
information for establish specific review review annually owner to review
reclassification date (not to exceed one annually
year)
Logging access Log all access attempts; Log all violation No special
activity information owner to attempts; information requirements
review all access and owner reviews as
violation attempts appropriate
Access report Information owner to Information owner to No special
retention determine retention of determine retention of requirements
requirements access logs (not to exceed violation logs (not to
one year) exceed six months)
all the various types of information found in their department and then be able to
determine into which classification they probably fall.
14.1 Owners
Minimally, the information owner is responsible for:
• Judging the value of the information resource and assigning the proper classification
level
• Periodically reviewing the classification level to determine if the status should be
changed
Table 13. Information Handling Matrix for
Electronically Transmitted Information
Confidential Internal Use Public
By FAX Attended at receiving FAX Information owner to No special
define requirements requirements
By WAN Confirmation of receipt required; No special No special
encryption optional requirements; requirements
encryption optional
Asset Classification Policy 101
14.2 Custodians
At a minimum, the custodian is responsible for:
• Providing proper safeguards for processing equipment, information storage, backup,
and recovery
• Providing a secure processing environment that can adequately protect the integrity,
confidentiality, and availability of information
• Administering access requests to information properly authorized by the owner
14.3 User
The user must:
• Use the information only for the purpose intended.
• Maintain the integrity, confidentiality, and availability of information accessed.
Information Security Policies and Procedures 102
Being granted access to information does not imply or confer authority to grant other
users access to that information. This is true whether the information is electronically
held, printed, hardcopy, manually prepared, copied, or transmitted
Table 14. Sample Record Retention Schedule
Record Retain
Accounts payable schedules Permanent
Accounts receivables schedules Permanent
Bank drafts and paid notices 10 Years
Bank statements and reconciliations 10 Years
Bills of lading 7 Years
Cancelled checks 10 Years
Cash disbursements journals Permanent
Cash receipts journals Permanent
Claims register 7 Years
Corporate minutes book Permanent
Correspondence 10 Years
Counter tickets 7 Years
CPA audit reports Permanent
Credit memos 7 Years
Customer files 7 Years
Customer repair orders (both office and hard copy) 7 Years
Documents pertaining to litigation Permanent
Duplicate deposit slips 10 Years
Employee earning and history record Permanent
Employment contracts Permanent
Federal revenue agents’ reports and related papers Permanent
Federal tax returns Permanent
Financial statements Permanent
General journals Permanent
General ledgers Permanent
Insurance policies Until Expiration
Internal repair orders (hard copy only) 7 Years
Internal sales journals Permanent
Asset Classification Policy 103
15 SUMMARY
Information classification drives the protection control requirements and this allows
information to be protected to a level commensurate with its value to the organization.
The costs of overprotection are eliminated and exceptions are minimized. With a policy
and methodology, specifications are clear and accountability is established.
Information Security Policies and Procedures 104
There are costs associated with implementing a classification system. The most
identifiable costs include labeling classified information, implementing and monitoring
controls and safeguards, and proper handling of confidential information.
Information, wherever it is handled or stored, must be protected from unauthorized
access, modification, disclosure, and destruction. All information is not created equal.
Consequently, segmentation or classification of information into categories is necessary
to help identify a framework for evaluating the information’s relative value. By
establishing this relative value, it will be possible to establish cost-effective controls that
will preserve the information asset for the organization.
The information classification program will require the identification of the record
type, the owner, and the classification level. Two thirds of this information may already
be gathered by the record management program. Link these two vital processes together
to ensure that employee time is not wasted on redundant activities. By combining the
effort, the organization will have a better overall information security program.