Classification and Handling of Information
Classification and Handling of Information
Application
Rules applicable to all employees and/or individuals performing work for Ericsson and to be
used within the entire Ericsson Group when handling information owned by, or in the custody
of, Ericsson.
Contents
1 Instruction .................................................................................................................................. 1
1.1 How to classify information ..............................................................................................2
1.2 Classification levels..............................................................................................................2
1.2.1 Open .........................................................................................................................................2
1.2.2 Ericsson Internal ...................................................................................................................3
1.2.3 Ericsson Confidential...........................................................................................................3
1.3 Labeling ...................................................................................................................................3
1.3.1 Other labeling ........................................................................................................................3
1.4 Access control ........................................................................................................................4
1.4.1 Information produced and classified by external party ..........................................4
1.5 Photography/Audio-Video recording Requirements ...............................................4
1.6 Changes in classification....................................................................................................5
1.7 Handling of information .....................................................................................................5
1.8 Connection to Ericsson Business Processes.................................................................8
1.9 Adherence/Compliance Controls ....................................................................................8
2 Responsibility ............................................................................................................................ 8
3 Exemption/Deviation .............................................................................................................. 8
4 Contacts for this Instruction ................................................................................................... 8
5 References .................................................................................................................................. 8
6 Change information.................................................................................................................. 9
1 Instruction
Ericsson’s workforce has access to information owned by Ericsson, or information that is
entrusted to Ericsson by external parties. Wrongful disclosure of such information may
cause damage to Ericsson, customers, workforce and/or partners & suppliers.
The term information refers to any collection of information that is printed, written on paper,
stored and/or processed electronically, transmitted, shown as film or clips, or spoken in
conversation.
Confidentiality Class External Confidentiality Label Document Type Page
The level of protection applied shall reflect the value of the information to ensure relevant,
consistent, and cost-efficient protection of information within Ericsson.
Information created and processed in Ericsson Group Management System (EGMS) [1] is
subject to the right protection measures. The Criticality Assessment [2] and the selection of
protection level supports the Process Owner1 in deciding adequate protection measures.
Ericsson information shall be classified and labeled in accordance with its confidentiality.
Information is classified based on confidentiality of the information and as such the level of
harm it may cause the organization if the information is disclosed to unauthorized persons.
The level of harm is often connected to financial loss, reputational damage, loss of
operations and deals and is expressed in terms of no harm, limited harm or noticeable or
severe harm to the company.
To classify information and label it gives transparency and assists in protecting the
information to the right level.
In Ericsson we have three classification levels: Open, Ericsson Internal and Ericsson
Confidential.
1.2.1 Open
Open information is open to all and is intended for wide distribution inside and outside of
Ericsson. It contains no information that may have negative impact on the Company, e.g.,
no harm.
This classification level is used for external or public presentations, published press releases
etc.
Open Information shall still be protected to ensure the integrity and availability of
information but has no requirements on confidentiality.
1 Process Owner is intended at any level. About Information managed in EBP, responsibility on Information and classification
is assigned to the Process Owner, as described in the EBP document. About information in scope for EGMS, i.e., beyond EBP,
reference is Description of the EGMS document, sec. 1.7 “Document Handling”
Confidentiality Class External Confidentiality Label Document Type Page
Ericsson Internal information may cause limited harm to Ericsson if it is wrongfully disclosed
to unauthorized parties.
This is information intended for internal use or for limited distribution to external parties
and shall be used for most information produced in Ericsson. Ericsson Internal is in general
accessible widely within Ericsson. Ericsson Internal information may only be distributed
externally under Non-Disclosure Agreement (NDA) [3], [11].
The classification and label Ericsson Confidential shall be used for information that needs
the highest level of protection for confidentiality.
Access shall be limited, and protection requirements against unauthorized access are strict.
1.3 Labeling
All Ericsson information shall be classified and labeled according to its classification with
Open, Ericsson Internal or Ericsson Confidential where feasible. If no labeling is possible or
in place, default classification ‘Ericsson Internal’ shall be assumed. 2
1.3.1.1 Public
2 Additional labeling of information may be provided for certain needs. For example, information related to attorney-client
privilege may be labeled to inform the reader of such legal obligations. This and similar labeling requirements, not directly
related to information security, are not in scope for this Group Instruction.
Confidentiality Class External Confidentiality Label Document Type Page
Information intended for publication i.e., financial reports, can be confidential up to its
release and shall be handled accordingly. Information shall be re-classified to open and
labeled as public when the decision has been taken to publish it externally.
Information intended to be shared with external parties shall be labeled according to its
classification with the addition of “Commercial in confidence”.
This labeling shall be applied either as an additional label or in the form of a watermark.
Access shall be granted role based. Accesses must be reviewed by the Process Owner
regularly. The following rules apply depending on classification:
Open
No Access restrictions. Protection measures to protect integrity and availability still apply.
Label may be Open or Public.
Ericsson Internal
Access to information is given to a wide Ericsson Workforce audience, although role-based
access may be applied.
Ericsson Confidential
Access to information is role-based. Label may be Ericsson Confidential or Commercial in
Confidence.
Any restrictions on pictures taking and audio-video recording must be communicated to all
concerned individuals. This communication can be in the form of awareness training, signs,
information flyers etc. The manager responsible for the area or object with restrictions may
grant exceptions through a written permission.
Furthermore, it is not permitted to take pictures or record videos of any documents whether
electronic or in paper, or of any other objects which are sensitive from a trade secret view,
such as prototypes or specific equipment or that are classified as Confidential or higher.
Images identifying individuals are to be considered as personal data and must be handled
accordingly [4].
A permit for taking pictures and/or filming and recording must state time, place, responsible
within Ericsson, name of the photographer and name of the photographer’s company. The
permit document must be carried and presented when requested. A copy of the permit must
be stored by the approver. Preferably, use the Photographing / film permission request form
[5] to handle permissions.
Pictures must not be taken, and videos not recorded, of any individuals without their
consent.
The photographer has the sole responsibility to seek necessary consents when required
from individuals intended to be subject to photographing or video recording. Decline of
consent must always be respected.
The confidentiality of information can change during its life cycle. The Classification label
shall reflect the current level of confidentiality.
The classification level determines the handling requirements for the information to ensure
the right level of protection.
Information, regardless of what media it is stored on, must be protected from unauthorized
access. Electronically processed, stored, and transmitted information that is non-public has
restrictions regarding access, handling, communication and disposal or destruction.
Non-public information that is printed or written on paper has restrictions regarding access
control, storage, distribution, and destruction of the information.
Confidentiality Class External Confidentiality Label Document Type Page
The minimum restrictions for handling information according to its classification are listed in
the below quick chart of handling guidelines3. Further restrictions may be introduced by the
Process Owner.
No additional
If authorized and
requirements If authorized and commercial
Sharing information with commercial agreement
on top of the agreement (NDA) is in place
customers and (NDA) is in place. Apply
Information Apply “Commercial in
“Commercial in
external parties Security Confidence” as a label or
Confidence” as a label
Requirements watermark.
or watermark.
(ISR) [7]
No additional
Storage in green zone requirements Safe, secure cabinet or
Not allowed
Public areas on top of the locked furniture
ISRs
No additional
Storage in No additional
requirements Access controlled areas, locked
requirements on top of
red zone on top of the furniture or cabinet
the ISRs
ISRs
No additional
Kept under surveillance
Storage outside Ericsson requirements
or stored in a secure In safe or under surveillance
premises on top of the
place
ISRs
No additional
Document containers Shredder or document
requirements
Destruction and disposal for recycling in containers for secure recycling in
on top of the
yellow/red zones yellow/red zones
ISRs
No
E-mail Internal No requirements Encrypted
requirements
Communication
No
E-mail External No requirements Encrypted4
requirements
3 The restrictions in the quick guide are the comprehensive selection of requirements in the Information Security Management
System (ISMS – part of the Ericsson Group Management System, EGMS) regarding confidentiality and handling of
information.
4 Please see instructions for External e-mail encryption
Confidentiality Class External Confidentiality Label Document Type Page
This Instruction provides rules and work procedures to be embedded in relevant parts of the
Ericsson Business Processes (EBP) and in approved tools for the effective management of
Information Classification and Handling, in all Ericsson Units and across all Ericsson
Business Capability Areas, where Ericsson, customer and partner information is handled.
Adherence to this Instruction is required at all levels, through execution of the rules for
Classification and Handling of Information. Detailed Controls are listed as part of the
Information Security Requirements [7], in detail section 8.2 Information Classification.
2 Responsibility
Process Owners have the responsibility to set the classification for information created in
their respective areas and appropriate handling procedures.
Managers on all levels are responsible for ensuring that information is handled in their units
and relevant tools as applicable and in accordance with the classification.
This responsibility includes informing workforce about applicable rules and procedures.
Group Security is responsible for providing the framework for information security which is
available through the Information Security Management System [8]and the Information
Security Requirements [7] and the general guidelines on the handling of information for the
different classification levels.
3 Exemption/Deviation
In line with Governance of Steering Documents [9], all Group Instructions are mandatory
unless an exemption/deviation is granted following process described in Rules for writing
and handling Group and Local Steering Documents [10].
5 References
[1] Group Directive, 034 02-2431 Uen, Ericsson Group Management System (EGMS)
Confidentiality Class External Confidentiality Label Document Type Page
[8] Group Directive, 034 02-3137 Uen, – Information Security Management System
[10] Work Instruction, 000 21-2908 Uen, Rules for writing and handling Group and Local
Steering Documents
[11] Ericsson Internal web page: Non-Disclosure Agreements (NDA) with external
parties - Internal (ericsson.com)
6 Change information
Summary of changes compared to previous revision: