Data Classification Standard
Note:
This is a new version of the Data Classification Standard. The archived version can be found here: Data Classification Standard - Archived
--------------------
The UC Berkeley Data Classification Standard is issued under the authority vested in the UC Berkeley Chief Information Officer by the UC Business and Finance Bulletin IS-3 Electronic Information Security(link is external) (UC BFB IS-3).
Issue Date: November 7, 2019 Originally issued July 16, 2012 (Administrative revision: April 22, 2013)
Effective Date: November 7, 2020 for Protection Levels; November 7, 2021 for Availability Levels.
Responsible Executive: Associate Vice Chancellor for Information Technology and Chief Information Officer
Responsible Office: Information Security Office
Contact: Email cybersecurity@ucdavisedu
I. Overview
The UC Berkeley Data Classification Standard is UC Berkeley’s implementation of the UC Systemwide Data Classification Standard.
UC BFB IS-3 establishes that Institutional Information and IT Resources must be protected according to their classifications. This Standard is a framework for assessing the adverse impact that loss of confidentiality, integrity or availability of Institutional Information and IT Resources would have upon the Campus. It provides the foundation for establishing security requirements for each classification of data.
Summary definitions and examples are included below. Full definitions and additional examples are available in the UC Systemwide Standard and Guides(link is external). Additionally, UC Berkeley-specific guidance is available in the Campus Data Classification Guideline.
II. Scope
The Berkeley Data Classification Standard covers UC Berkeley Institutional Information and IT Resources. This Standard does not apply to Individually-Owned Data, which is defined as an individual’s own personal information that is not considered Institutional Information.
Note: Data classification does not alter public information access requirements. California Public Records Act or Federal Freedom of Information Act requests and other legal obligations may require disclosure or release of information from any category.
III. Definitions
Definitions of Key Terms (capitalized and italicized) used in this Standard are included in UC Berkeley’s Information Security Policy Glossary.
IV. Data Classification Levels
Business Impact
Considerations for evaluating potential adverse impact to UC Berkeley due to loss of data or resource confidentiality, integrity, or availability include:
- Loss of critical Campus operations
- Negative financial impact (money lost, lost opportunities, value of the data)
- Damage to the reputation of the Institution
- Risk of harm to individuals (such as in the case of a breach of personal information)
- Potential for regulatory or legal action
- Requirement for corrective actions or repairs
- Violation of University of California or UC Berkeley mission, policy, or principles
Data Classification Table - Protection Levels
Data Classification |
Adverse Business Impact |
Definition | Examples (not an exhaustive list) May be updated in response to changes in UC systemwide policy and UC Berkeley campus-level risk decisions. |
Protection Level P4 |
High |
Institutional Information and related IT Resources that require notification to affected parties in case of a confidentiality breach. This category also includes data and systems that create extensive "Shared-Fate" risk, where a compromise would cause further and extensive compromise among multiple (even unrelated) sensitive systems. Unauthorized disclosure or modification of P4 data or resources could result in significant fines or penalties, regulatory action, or civil or criminal violations. There is also an inherent significant risk to UC reputation and business continuity, along with harm or impairment to UC students, patients, research subjects, employees, or guests/program participants. |
|
Protection (formerly UCB PL1 |
Moderate |
Institutional Information and IT Resources whose unauthorized use, access, disclosure, acquisition, modification, loss, or deletion could result in moderate fines, penalties or civil actions. This classification level also includes lower risk items that, when combined, represent an increased risk. Unauthorized disclosure or modification of P3 data or resources could result in legal action, harm the privacy of a group, cause moderate financial loss, or contribute to reputational damage. |
|
Protection (formerly UCB PL0 and PL1) |
Low |
Institutional Information and IT Resources that may not be explicitly protected by statutes or other contractual regulations, but are not commonly intended for public use or access and should only be accessed on a need-to-know basis. Unauthorized disclosure or modification of P2 data could result in minor damage or small financial loss, or cause a minor impact on the privacy of an individual or group. |
|
Protection (formerly UCB PL0) |
Minimal | Information intended for public access, but whose integrity is important. For P1, unauthorized modification is the primary protection concern. The application of minimum security requirements is sufficient. |
|
Data Classification Table - Availability Levels
Data Classification | Adverse Business Impact | Definition | Examples (not an exhaustive list) May be updated in response to changes in UC systemwide policy and UC Berkeley campus-level risk decisions. |
Availability Level A4 |
High | Definition: Loss of Availability would have a significant business impact to the Campus, a Campus Unit, and/or essential services. It may also cause serious financial losses. IT Resources that are required to be available by statutory, regulatory and/or legal obligations fall into this risk level. Critical IT Infrastructurealso falls into this category. |
|
Availability Level A3 |
Moderate | Definition: Loss of availability would result in moderate financial losses and/or reduced customer service. |
|
Availability Level A2 |
Low | Definition: Loss of availability may cause minor losses or inefficiencies. |
|
Availability Level A1 |
Minimal | Definition: Loss of availability poses minimal impact or financial loss. |
|
V. Additional Information
Statutory Requirement for Notification
See definition in UC Berkeley’s Information Security Policy Glossary.
The following registration and approval requirements apply to information with a statutory requirement for notification (“Notice Triggering” information):
- Campus Credit Card Coordinator(link is external) approval is required to handle credit card transactions.
- Storage, transmission or use of Notice-Triggering data requires registration in the campus data registration portal.
VI. Responsibilities
The following roles have key responsibilities related to this Standard. Details are available in UC Berkeley’s Roles and Responsibilities Policy Draft.
- Institutional Information and IT Resource Proprietors
- Researchers
- Service Providers
- Unit Heads
- Workforce Members
VII. Related Documents and Policies
- Data Classification Guideline
- Data Classification handouts for Protection Levels and Availability Levels
- UC BFB-IS-3: Electronic Information Security(link is external)
- UC Institutional Information and IT Resource Classification Standard and Guides(link is external)
- UCB Minimum Security Standards for Electronic Information (MSSEI)
- Campus data registration portal
- How to Classify Research Data
Change Log
- Oct. 11, 2019: Draft posted on Information Security Office website
- Nov. 7, 2019: Updates endorsed by Information Risk Governance Committee
- Nov. 27, 2019: Clarification on passport data classification added
- Dec. 12, 2019: Clarification on P2 de-identified human subject or patient information added
- Jan. 20, 2020: Clarification on P4 human subject and human genetic information added; clarification on P4 and P2 high risk export controlled data or technology added