Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The WVU Data Classification Policy establishes the rules that govern the classification of information generated through the academic, administrative, research, and outreach activities conducted at WVU into four categories: Sensitive, Confidential, Internal, and Public. The WVU Information Security Policy identifies the criticality of information systems into four categories: mission critical, core, business critical, and operational.

The following table provides a examples that can be used to assist in selecting a security category for an information system. For assistance classifying the information system you manage, review the information provided in the Security Objectives section or contact Information Security Services at infosec@mail.wvu.edu.

Security Objectives

The Security Category = [Confidentiality impact + Integrity impact + Availability impact]

Confidentiality means preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

Integrity means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.

Availability mean ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system.

Level 1 - Low

Level 2 - Moderate

Level 3 - High

Impact on WVU’s mission

None

No impact

Potential impact

Impact on WVU’s reputation

At most a minimal risk

Moderate risk

Significant risk

Impact on WVU’s finances

None

Mild impact

Significant impact

Risk to the security of other systems protecting data

None

Mild impact

Significant impact

Risk to life safety

None

None

Potential risk

Data Classification

Public

Internal/Confidential

Confidential/Sensitive

Minimum Security Requirements

The table below identifies the minimum security requirements for a WVU system or application based on the classification of the data stored within the system and/or the system’s criticality. Security requirements are based on implemented technology governance and are organized below based on the NIST Cybersecurity Framework

...