From the Winter 2019 Issue

Data Classification Business Process Changes Part 3 Conclusion

Bill Bonney
CISO Desk Reference Guide | CISO DRG Venture

  •  
  •  
  •  
  •  
  •  
  •  

In the first article in this series, “Data Classification is the Key to Data Protection,” I asserted that “Data gains value from its use, not from being hidden and protected.” In the second article, “Data Classification That Honors Business Value,” I suggested that five new attributes be added to the standard five-tier (public, internal use only, confidential, sensitive, and secret) data classification scheme. They are:

  • Business value of the data
  • Impact of compromise
  • Retention period
  • Reevaluation period
  • Approved techniques for data handling

The same five attributes would . . .

Leave a Comment