Data Classification Policy
Version Control
Version | Date | Author | Rationale |
0.1 | March 21, 2020 | First Draft |
Introduction
Data classification policy is concerned with the personification of an institution’s tolerance for risks. It is concerned with the management of information to make sure the sensitive data is dealt with well as per the threat it has to an institution (Luna et al., 2016). It allows authorized personnel to access the permitted information at the authorized time, and ensure that only the allowed users are able to view or access the information. Information and data owner is responsible for classifying and information to different types to enable the institution to safeguard the CIA based on the contents. The classification shall be used to design and communicate fundamental security controls. Don't use plagiarised sources.Get your custom essay just from $11/page
The purpose of the guideline is to map out a variety of components in the institution. It will establish a framework for grouping the institutional information according to its magnitude of the threat, value, regulatory requirements, and vitality to the hospital. The grouping of information aid in determining the fundamental security controls tools for protecting information in the hospital information systems.
Hospital Data Classification Policy
This classification policy contains every information owned, created, collected, managed, stored, and disseminated by the hospital. No data item is small to be classified in this policy. The guideline is compulsory and applied to all the hospital staff, like contractors, the doctors in the hospital, students, volunteers, and agency personnel. The agency personnel includes all the third party personnel in the hospital.
Policy Goals and Objectives
- Establish a framework of classifying the hospital data
- Protection of sensitive hospital information from unauthorized personnel
- To safeguard the creditability of the hospital to the outside world.
Policy Statement
The hospital shall use a four-tiered classification schema. The criteria for each schema level shall be maintained from the office of information security. The hospital information and data are classified in the following levels: Public data, Confidential, Protected, and Internal or restricted data.
Public data/information
The hospital data that is classified as the public can be disclosed to anyone regardless of their relationship with the hospital. Any information which is not public is considered sensitive and should be protected (Body, 2018). This data/information is meant for the public. This data is not protected against disclosure to the public at large (Santos, 2018). There is no risk associated with this level of information.
Confidential information/data
This information is not to be publicly disclosed. If the information in this classification level is made available to unauthorized users, the individuals or businesses in the hospital may be highly affected. This classification level encompasses the data required by the hospital to keep confidential data. This information is to be protected against modification, disclosure, and deletion by unauthorized personnel (Santos, 2018). The risk associated with this level of information is very high/major.
Internal/Protected information
This information is protected by the contractual obligation, law, regulation, or management discretion. This data is always available to hospital staff. The data can also be made accessible to external parties with specific authorization. Unauthorized access to this information may inconvenience the running of the hospital and result in serious damage to the credibility of the hospital to the outside world. The risk associated with this information is low to moderate.
Restricted data
This data includes the information that the hospital has a licit, predetermined, or supervisory obligation to shield in a highly stringent manner. In this classification level, unauthorized disclosure or loss of this information will require the hospital to inform the affected state authorities. Occasionally, modification of the information may involve informing those affected.
Policy exceptions
Exceptions to this policy statement shall only be allowed where the court demands some information. Other exceptions shall include the authorization of auditors. These exceptions are not allowed to modify the hospital information. The exceptions are to be approved by an Information Security Officer.
Policy Enforcement Clause
The enforcement of the policy shall include procedural methods like periodic monitoring of employee user accounts and automated methods like configuring the settings which have been implemented on the hospital information systems.
References
Body, G. (2018). Data Protection, Records Management, and Freedom of Information Policies. Policy.
Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health information systems: A systematic review. Technology and Health Care, 24(1), 1-9.
Santos, O. (2018). Developing Cybersecurity Programs and Policies. Pearson IT Certification.