Securely sending data to All n One
Revision as of 14:04, 19 April 2016 by Philip Lacey (talk | contribs) (Created page with "= Overview = From time to time there is a need to transfer the All n One team data. We ask you please to consider security before sending us something. This article is de...")
Revision as of 14:04, 19 April 2016 by Philip Lacey (talk | contribs) (Created page with "= Overview = From time to time there is a need to transfer the All n One team data. We ask you please to consider security before sending us something. This article is de...")
1 Overview
From time to time there is a need to transfer the All n One team data. We ask you please to consider security before sending us something. This article is designed to provide some guidance and alternatives on transferring data securely to us.
2 Data Handling
Before you send us any data please have a read of the following and rate the data for yourself before you send it to us.
| Type | Title |
|---|---|
| A. | Restricted Data |
| Data should be classified as Restricted when the unauthorized disclosure, alteration or destruction of that data could cause a significant level of risk to the University or its affiliates. Examples of Restricted data include data protected by law, regulations and data protected by confidentiality agreements. The highest level of security controls should be applied to Restricted data. | |
| B. | Private Data |
| Data should be classified as Private when the unauthorized disclosure, alteration or destruction of that data could result in a moderate level of risk to the Company or its affiliates. By default, all Company Data that is not explicitly classified as Restricted or Public data should be treated as Private data. A reasonable level of security controls should be applied to Private data. | |
| C. | Public Data |
| Data should be classified as Public when the unauthorized disclosure, alteration or destruction of that data would results in little or no risk to the University and its affiliates. Examples of Public data include press releases, course information and research publications. While little or no controls are required to protect the confidentiality of Public data, some level of control is required to prevent unauthorized modification or destruction of Public data. |