Data Classification Policy
Data Classification Policy
Version 1 - 5/5/2020
Data Classification Policy
1
1. Data Classification Policy
1.1 Scope
The provisions of this Policy shall apply to all data received, produced,
or managed by public entities regardless of its source, form, or nature. This
shall include paper records, meetings, communications through social media
and applications, emails, information stored on electronic media, audio or
video cassettes, maps, photographs, handwritten documents, or any other
form of recorded information.
Protective Marking
§ Protective marking shall be applied to paper and electronic documents
(including emails) as per each classification level.
Access
§ Access to data – logical and physical – shall be granted based on the
principles of “Least Privilege” and “Need to Know.”
§ Access shall be denied immediately upon the expiration or termination
of the professional service of entity employees.
Usage
§ Classified data shall be used as per the requirements of the
classification levels. For example, “Top Secret” data shall only be used
within specified locations whether physical (e.g. offices) or virtual (e.g.
using cryptography or special applications).
Storage
§ Data classified as “Top Secret,” “Secret” and “Restricted,” as well as
mobile devices that process or store such data, shall not be left
unattended.
§ Unattended “Top Secret,” “Secret” and “Restricted” data shall be
protected while being physically or electronically stored, using any of
the encryption mechanisms approved by the National Cybersecurity
Authority.
Data Sharing
§ Entities shall decide on the appropriate physical and digital means of
secure data sharing that ensure minimization of potential risks and
compliance with data sharing regulations.
§ Entities shall agree on the data sharing mechanism, whether they will
utilize existing sharing mediums, e.g. Government Service Bus, National
Information Center Network, or Secured Government Network, or will
set up a new direct connection, removable storage media, Wi-Fi,
remote access, VPN, etc.
Data Retention
§ A schedule defining the retention period of all data shall be prepared.
§ The retention period shall be defined based on the applicable business,
contractual, regulatory and legal requirements.
§ The retention schedule shall be reviewed periodically/annually or when
there are changes in the relevant requirements.
Disposal of Data
§ All data shall be securely disposed of according to the data retention
schedule upon the approval of the relevant Business Data Executive.
§ Data which is classified as “Top Secret” or “Secret” and which is
electronically controlled shall be disposed of by using the latest
electronic media disposal methods.
§ All paper-based data shall be disposed of using a cross-cut shredder.
§ A detailed log of all disposed of data shall be maintained.
Archiving
§ Data shall be archived in secure storage locations, as recommended by
the relevant Business Data Executive.
§ Archived data shall be backed up.
§ Archived data classified as “Top Secret” and “Secret” shall be
protected using any of the encryption mechanisms approved by the
National Cybersecurity Authority.
§ A detailed list of users authorized to access archived data shall be
prepared and documented.
Declassification
§ Data shall be declassified or downgraded upon the expiration of the
classification period, or when protection is no longer required at the
original classification level.
§ In case data has been wrongly classified, a data user shall notify the
Business Data Executive to determine the extent to which it is required
to re-classify such data appropriately.
§ Data declassification triggers shall be set when the initial classification
levels are first applied and shall be captured in the data register. These
triggers may include:
o A specified period after data creation or receipt (e.g. two years after
creation);
o A specified period after taking the last action on data (e.g. six months
from the date of the last use);
o After the lapse of a specific date (e.g. to be reviewed on 1 January
2021);
o After particular circumstances or events that have a direct impact on
the data (e.g. a change of strategic priorities or a change of the
employees of government entities).
§ Declassification or downgrading of data, beyond the clear
declassification triggers, shall require a sound understanding of both
the sensitive data content and its context.
All potential risks identified throughout the impact assessment process shall
be specific and evidence-based, in an attempt to limit the subjectivity of the
person classifying the data .
Based on the identified impacts and their levels, the Business Data Executive
shall determine the data classification level:
§ High Impact: data shall be classified as “Top Secret.”
§ Medium Impact: data shall be classified as “Secret”
§ Low Impact: further assessments need to be conducted (please refer to
Steps 4 and 5)
§ No Impact: data shall be classified as “Public”
A detailed description of the key considerations for each impact category and
level is outlined in Table 2 “Data Classification Impact Assessment Categories
and Levels”.
Steps 4 and 5 must be taken into consideration whenever the impact
level identified is Low.
Go to step 6 if data has been classified as “Top Secret”, “Secret” or
“Public.”
Step 4: Identify relevant laws and regulations (only if impact level is Low)
If the impact level identified is Low, additional assessments must be
performed in order to maximize the classification level of the data classified
as “Public.”
In this regard, the Business Data Executive must study whether
disclosure of such data would conflict with the Kingdom’s laws, including, but
not limited to, the Anti-Cybercrime Law and the E-Commerce Law. If such
disclosure of data proves to be against the laws and regulations, data shall
then be classified as “Restricted;” otherwise the Business Data Executive
must proceed to carry out Step 5.
Step 5: Balance between the benefits of disclosure and negative impacts
(only if the answer to Step 4 is “NO”)
After confirming a low impact level and ensuring that the data
disclosure shall not imply any breach of any existing law, an assessment of
the potential benefits of this disclosure must be conducted to make sure
whether or not those benefits would outweigh the negative impacts. Potential
benefits include data use for the development of new value-added services,
improvement of the transparency of government operations, or greater
involvement of the citizens with the government.
§ If benefits are greater than negative impacts, data shall be classified as
“Public”
§ If benefits are less than negative impacts, data shall be classified as
“Restricted.”