The following Data Classification Guide was developed by UC Berkeley. The guide was issued under the authority vested in the UC Berkeley Chief Information Officer by the UC Business and Finance Bulletin IS-3 Electronic Information Security (link is external) (UC BFB IS-3). The Guide presents the data classifications in a clear and concise manner, and UC Davis is including this guide on the UC Davis website with permission from UC Berkeley.
Issue Date: November 7, 2019, Originally issued July 16, 2012 (Administrative revision: April 22, 2013)
Effective Date: November 7, 2020, for Protection Levels; November 7, 2021, for Availability Levels.
Responsible Executive: Associate Vice Chancellor for Information Technology and Chief Information Officer
Responsible Office: Information Security Office
Contact information for Data Classification at UC Davis: Email: cybersecurity@ucdavis.edu
I. Overview
The UC Systemwide Data Classification Standard or UC BFB IS-3 establishes that Institutional Information and IT Resources must be protected according to their classifications. This Standard is a framework for assessing the adverse impact that loss of confidentiality, integrity or availability of Institutional Information and IT Resources would have upon the Campus. It provides the foundation for establishing security requirements for each classification of data.
Summary definitions and examples are included below. Full definitions and additional examples are available in the UC Systemwide Standard and Guides(link is external).
II. Scope
The Data Classification Standard covers Institutional Information and IT Resources. This Standard does not apply to Individually-Owned Data, which is defined as an individual’s own personal information that is not considered Institutional Information.
Note: Data classification does not alter public information access requirements. California Public Records Act or Federal Freedom of Information Act requests and other legal obligations may require disclosure or release of information from any category.
III. Definitions
Definitions of Key Terms (capitalized and italicized) used in this Standard are included in the Information Security Policy Glossary (courtesy of UC Berkeley).
IV. Data Classification Levels
Business Impact
Considerations for evaluating potential adverse impact due to loss of data or resource confidentiality, integrity, or availability include:
- Loss of critical Campus operations
- Negative financial impact (money lost, lost opportunities, value of the data)
- Damage to the reputation of the Institution
- Risk of harm to individuals (such as in the case of a breach of personal information)
- Potential for regulatory or legal action
- Requirement for corrective actions or repairs
- Violation of University of California or UC Davis mission, policy, or principles
Data Classification Table - Protection Levels
Data Classification | Adverse Business Impact | Definition | Examples (not an exhaustive list) May be updated in response to changes in UC systemwide policy and UC Berkeley campus-level risk decisions. |
Protection Level P4 | High | Institutional Information and related IT Resources that require notification to affected parties in case of a confidentiality breach. This category also includes data and systems that create extensive "Shared-Fate" risk, where a compromise would cause further and extensive compromise among multiple (even unrelated) sensitive systems. Unauthorized disclosure or modification of P4 data or resources could result in significant fines or penalties, regulatory action, or civil or criminal violations. There is also an inherent significant risk to UC reputation and business continuity, along with harm or impairment to UC students, patients, research subjects, employees, or guests/program participants. |
|
Protection (formerly UCB PL1 | Moderate | Institutional Information and IT Resources whose unauthorized use, access, disclosure, acquisition, modification, loss, or deletion could result in moderate fines, penalties or civil actions. This classification level also includes lower risk items that, when combined, represent an increased risk. Unauthorized disclosure or modification of P3 data or resources could result in legal action, harm the privacy of a group, cause moderate financial loss, or contribute to reputational damage. |
|
Protection (formerly UCB PL0 and PL1) | Low | Institutional Information and IT Resources that may not be explicitly protected by statutes or other contractual regulations, but are not commonly intended for public use or access and should only be accessed on a need-to-know basis. Unauthorized disclosure or modification of P2 data could result in minor damage or small financial loss, or cause a minor impact on the privacy of an individual or group. |
|
Protection (formerly UCB PL0) | Minimal | Information intended for public access, but whose integrity is important. For P1, unauthorized modification is the primary protection concern. The application of minimum security requirements is sufficient. |
|
Data Classification Table - Availability Levels
Data Classification | Adverse Business Impact | Definition | Examples (not an exhaustive list) May be updated in response to changes in UC systemwide policy and campus-level risk decisions. |
Availability Level A4 | High | Definition: Loss of Availability would have a significant business impact to the Campus, a Campus Unit, and/or essential services. It may also cause serious financial losses. IT Resources that are required to be available by statutory, regulatory and/or legal obligations fall into this risk level. Critical IT Infrastructurealso falls into this category. |
|
Availability Level A3 | Moderate | Definition: Loss of availability would result in moderate financial losses and/or reduced customer service. |
|
Availability Level A2 | Low | Definition: Loss of availability may cause minor losses or inefficiencies. |
|
Availability Level A1 | Minimal | Definition: Loss of availability poses minimal impact or financial loss. |
|
V. Additional Information
Statutory Requirement for Notification
See definition in the Information Security Policy Glossary (courtesy of UC Berkeley).
The following registration and approval requirements apply to information with a statutory requirement for notification (“Notice Triggering” information):
- Campus Credit Card Coordinator(link is external) approval is required to handle credit card transactions.
- Storage, transmission or use of Notice-Triggering data requires registration in the campus data registration portal.
VI. Responsibilities
The following roles have key responsibilities related to this Standard. Details are available in Roles and Responsibilities Policy Draft.
- Institutional Information and IT Resource Proprietors
- Researchers
- Service Providers
- Unit Heads
- Workforce Members
VII. Related Documents and Policies
- Data Classification Guideline
- Data Classification handouts for Protection Levels and Availability Levels
- UC BFB-IS-3: Electronic Information Security(link is external)
- UC Institutional Information and IT Resource Classification Standard and Guides(link is external)
- UCB Minimum Security Standards for Electronic Information (MSSEI)
- Campus data registration portal
- How to Classify Research Data
Change Log
- Oct. 11, 2019: Draft posted on Information Security Office website
- Nov. 7, 2019: Updates endorsed by Information Risk Governance Committee
- Nov. 27, 2019: Clarification on passport data classification added
- Dec. 12, 2019: Clarification on P2 de-identified human subject or patient information added
- Jan. 20, 2020: Clarification on P4 human subject and human genetic information added; clarification on P4 and P2 high risk export controlled data or technology added