{"id":8451,"date":"2025-01-29T13:58:23","date_gmt":"2025-01-29T18:58:23","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/"},"modified":"2026-02-02T16:27:46","modified_gmt":"2026-02-02T21:27:46","slug":"data-classification-collaboration","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/","title":{"rendered":"Data Classification &amp; Collaboration"},"content":{"rendered":"<p>Trinity College is dedicated to creating a safe, secure research, teaching, and learning environment. Your actions play a vital role in safeguarding this environment. Please explore the resources below to learn how you can contribute to maintaining security and integrity in our academic community.<\/p>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 33.2776%;border-style: solid;border-color: #000000\">\n<h3 style=\"text-align: center\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/data-classification\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8457 size-thumbnail\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672-150x150.png 150w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672-300x300.png 300w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672-400x400.png 400w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672.png 512w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/h3>\n<h3 id=\"page-title\" style=\"text-align: center\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/data-classification\/\">Data Classification<\/a><\/h3>\n<\/td>\n<td style=\"width: 33.2776%;border-style: solid;border-color: #000000;text-align: center\">\n<h3><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/privacy-principles\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8459 size-thumbnail\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/17093264-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/17093264-150x150.png 150w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/17093264-300x300.png 300w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/17093264-400x400.png 400w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/17093264.png 512w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/h3>\n<h3 id=\"page-title\" style=\"text-align: center\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/privacy-principles\/\">Privacy Principles<\/a><\/h3>\n<\/td>\n<td style=\"width: 33.2776%;border-style: solid;border-color: #000000;text-align: center\">\n<h3><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/collaboration-matrix\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8461 size-thumbnail\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/11331481-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/11331481-150x150.png 150w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/11331481-300x300.png 300w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/11331481-400x400.png 400w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/11331481.png 512w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/h3>\n<h3 id=\"page-title\" style=\"text-align: center\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/collaboration-matrix\/\">Collaboration Matrix<\/a><\/h3>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Trinity College is dedicated to creating a safe, secure research, teaching, and learning environment. Your actions play a vital role in safeguarding this environment. Please explore the resources below to learn how you can contribute to maintaining security and integrity in our academic community. Data Classification Privacy Principles Collaboration Matrix<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":2477,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8451","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Classification &amp; Collaboration - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Classification &amp; Collaboration\" \/>\n<meta property=\"og:description\" content=\"Trinity College is dedicated to creating a safe, secure research, teaching, and learning environment. Your actions play a vital role in safeguarding this environment. Please explore the resources below to learn how you can contribute to maintaining security and integrity in our academic community. Data Classification Privacy Principles Collaboration Matrix\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-02T21:27:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\",\"name\":\"Data Classification &amp; Collaboration - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672-150x150.png\",\"datePublished\":\"2025-01-29T18:58:23+00:00\",\"dateModified\":\"2026-02-02T21:27:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#primaryimage\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672.png\",\"contentUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672.png\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance Risk and Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Information Security Policy &amp; Standards\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Data Classification &amp; Collaboration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Classification &amp; Collaboration - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/","og_locale":"en_US","og_type":"article","og_title":"Data Classification &amp; Collaboration","og_description":"Trinity College is dedicated to creating a safe, secure research, teaching, and learning environment. Your actions play a vital role in safeguarding this environment. Please explore the resources below to learn how you can contribute to maintaining security and integrity in our academic community. Data Classification Privacy Principles Collaboration Matrix","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2026-02-02T21:27:46+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/","name":"Data Classification &amp; Collaboration - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#primaryimage"},"image":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672-150x150.png","datePublished":"2025-01-29T18:58:23+00:00","dateModified":"2026-02-02T21:27:46+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#primaryimage","url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672.png","contentUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/10295672.png","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Governance Risk and Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/"},{"@type":"ListItem","position":5,"name":"Information Security Policy &amp; Standards","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/"},{"@type":"ListItem","position":6,"name":"Data Classification &amp; Collaboration"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=8451"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8451\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/2477"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=8451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}