{"id":8465,"date":"2025-01-29T14:17:46","date_gmt":"2025-01-29T19:17:46","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/data-classification\/"},"modified":"2025-04-08T14:43:46","modified_gmt":"2025-04-08T18:43:46","slug":"data-classification","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/","title":{"rendered":"Data Classification &amp; Handling"},"content":{"rendered":"<h3><strong>Quick Reference Guide:<\/strong> Data Classifications with Administrative Examples<\/h3>\n<table style=\"border-collapse: collapse;width: 100%;height: 940px\">\n<tbody>\n<tr style=\"height: 24px\">\n<td style=\"border-color: #000000;background-color: #c9c9c9;text-align: center;height: 24px\" colspan=\"4\"><strong>CLASSIFICATION<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 104px;background-color: #0fde04;text-align: center\" valign=\"top\">\n<p class=\"p2\"><b>Level 1:<\/b><\/p>\n<p class=\"p2\">Information intended and released for public use.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 104px;background-color: #e8e117;text-align: center\" valign=\"top\">\n<p class=\"p2\"><b>Level 2:<\/b><\/p>\n<p class=\"p2\">Information that may be shared only within the Trinity community.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 104px;background-color: #fca417;text-align: center\" valign=\"top\">\n<p class=\"p2\"><b>Level 3:<\/b><\/p>\n<p class=\"p2\">Confidential and sensitive information intended only for those with a \u201cbusiness need to know.\u201d<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 104px;background-color: #eb1c34;text-align: center\" valign=\"top\">\n<p class=\"p2\"><b>Level 4:<\/b><\/p>\n<p class=\"p2\">High-risk information that requires strict controls.<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p2\">The College intentionally provides this information to the public.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p2\">The College keeps this information private, but its disclosure would not cause material harm.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p2\">Disclosure of this information beyond intended recipients might cause material harm to individuals or the College.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p2\">Disclosure of this information beyond specified recipients would likely cause serious harm to individuals or the College.<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 960px\">\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 684px\" valign=\"top\">\n<p class=\"p2\"><b>Examples <\/b><b><\/b><\/p>\n<ul>\n<li class=\"p2\">Published research<\/li>\n<li class=\"p2\">Course catalogs<\/li>\n<li class=\"p2\">Published faculty and staff information<\/li>\n<li class=\"p2\">Student directory information*<\/li>\n<li class=\"p2\">Basic emergency response plans (life safety)<\/li>\n<li class=\"p2\">College-wide policies<\/li>\n<li class=\"p2\">Trinity publications<\/li>\n<li class=\"p2\">Press releases<\/li>\n<li class=\"p2\">Published marketing materials<\/li>\n<li class=\"p2\">Regulatory and legal filings<\/li>\n<li class=\"p2\">Published annual reports<\/li>\n<li class=\"p2\">Code contributed to Open Source<\/li>\n<li class=\"p2\">Released patents<\/li>\n<li class=\"p2\">Plans of public spaces<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p2\">*Directory information about students who have requested FERPA blocks must be classified and handled as Level 3, at minimum.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 684px\" valign=\"top\">\n<p class=\"p2\"><b>Examples <\/b><b><\/b><\/p>\n<ul>\n<li class=\"p2\">Department policies and procedures<\/li>\n<li class=\"p2\">Employee web\/intranet portals<\/li>\n<li class=\"p2\">Trinity training materials<\/li>\n<li class=\"p2\">Pre-release articles<\/li>\n<li class=\"p2\">Drafts of research papers<\/li>\n<li class=\"p2\">Work papers<\/li>\n<li class=\"p2\">Patent applications<\/li>\n<li class=\"p2\">Grant applications<\/li>\n<li class=\"p2\">Non-public building plans or layouts (excluding L3 or L4 items)<\/li>\n<li class=\"p2\">Information about the physical plant (excluding L3 or L4 items)<\/li>\n<li class=\"p2\">Non-sensitive administrative survey data<\/li>\n<\/ul>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 684px\" valign=\"top\">\n<p class=\"p2\"><b>Examples <\/b><b><\/b><\/p>\n<ul>\n<li>Non-directory student information<\/li>\n<li class=\"p2\">Non-published faculty and staff information<\/li>\n<li class=\"p2\">HUID tied to an individual<\/li>\n<li class=\"p2\">Personnel records<\/li>\n<li class=\"p2\">Donor information (excluding L4 data points or special handling)<\/li>\n<li class=\"p2\">Non-public legal work and litigation information<\/li>\n<li class=\"p2\">Budget \/financial transactions information<\/li>\n<li class=\"p2\">Non-public financial statements<\/li>\n<li class=\"p2\">Information specified as confidential by vendor contracts and NDAs<\/li>\n<li class=\"p2\">Information specified as confidential by Data Use Agreements<\/li>\n<li class=\"p2\">General security findings or reports (e.g., SSAE16)<\/li>\n<li class=\"p2\">Most Trinity source code<\/li>\n<li class=\"p2\">Non-security technical specifications\/architecture schema<\/li>\n<li class=\"p2\">Library\/museum object valuations<\/li>\n<li class=\"p2\">IRB records<\/li>\n<li class=\"p2\">Sensitive administrative survey data, such as performance reviews or course feedback, especially if free text response is permitted.<\/li>\n<\/ul>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 684px\" valign=\"top\">\n<p class=\"p2\"><b>Examples <\/b><b><\/b><\/p>\n<ul>\n<li class=\"p2\">Passwords and PINs<\/li>\n<li class=\"p2\">System credentials<\/li>\n<li class=\"p2\">Private encryption keys<\/li>\n<li class=\"p2\">Government-issued identifiers (e.g., Social Security Number, Passport number, driver\u2019s license)<\/li>\n<li class=\"p2\">Individually identifiable financial account information (e.g., bank account, credit or debit card numbers)<\/li>\n<li class=\"p2\">Individually identifiable health or medical information*<\/li>\n<li class=\"p2\">Individually identifiable research data<\/li>\n<li class=\"p2\">Details of significant security exposures at Trinity (e.g., vulnerability assessment and penetration test results)<\/li>\n<li class=\"p2\">Security system procedures and architectures<\/li>\n<li class=\"p2\">Trade secrets<\/li>\n<li class=\"p2\">Systems managing critical Operational Technology<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*Trinity business units or programs that qualify as &#8220;covered entities&#8221; under the Health Insurance Portability and Accountability Act (HIPAA) must comply with HIPAA\u2019s data security rules.<\/p>\n<ul>\n<li class=\"p2\"><b>Know the policies<\/b>: The full Data Classification Standard can be found <a href=\"https:\/\/trincoll.sharepoint.com\/:b:\/r\/sites\/TrinityInfosec\/Shared%20Documents\/Policy%20Management\/Final%20-%20Policies%20%26%20Standards\/Data%20Classification%20Standard\/Data%20Classification%20Final%2023-0105.pdf?csf=1&amp;web=1&amp;e=4xV4hb\">here<\/a>, and additional policies are at <a href=\"https:\/\/www.trincoll.edu\/policies\/\">https:\/\/www.trincoll.edu\/policies\/<\/a><\/li>\n<li><strong>Seek Guidance:<\/strong> If you have any questions or concerns regarding this policy or are aware of any items that may not comply, please get in touch with your manager for guidance.<\/li>\n<li class=\"p2\"><b><strong>Exercise Discretion: <\/strong><\/b>The lists above are intended as examples and should not be considered definitive classifications. Please rely on your good judgment when assessing compliance.<\/li>\n<\/ul>\n<hr \/>\n<h3 class=\"p1\"><b>Quick Reference Guide: <\/b>Data Handling Reference Guide<\/h3>\n<table style=\"border-collapse: collapse;width: 100%;height: 571px\">\n<tbody>\n<tr>\n<td style=\"width: 25%;border-style: solid;border-color: #000000;background-color: #c9c9c9;text-align: center\" colspan=\"4\"><strong>HANDLING<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td class=\"td1\" style=\"width: 25%;height: 104px;border-style: solid;border-color: #000000\" valign=\"top\">\n<p class=\"p1\"><b>Activity by Data Level <\/b><b><\/b><\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 104px;background-color: #e8e117;border-style: solid;border-color: #000000;text-align: center\" valign=\"top\">\n<p class=\"p2\"><b>Level 2<\/b><\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 104px;background-color: #fca417;border-style: solid;border-color: #000000;text-align: center\" valign=\"top\">\n<p class=\"p2\"><b>Level 3<\/b><\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 104px;background-color: #eb1c34;border-style: solid;border-color: #000000;text-align: center\" valign=\"top\">\n<p class=\"p2\"><b>Level 4<\/b><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td class=\"td1\" style=\"width: 25%;height: 104px;border-style: solid;border-color: #000000\" valign=\"top\">\n<p class=\"p1\"><b>Printing <\/b><b><\/b><\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 104px;background-color: #fcfcac;border-style: solid;border-color: #000000\" valign=\"top\">\n<p class=\"p1\">Do not leave unattended on copiers\/printers<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 104px;border-style: solid;border-color: #000000;background-color: #f5e2bc\" valign=\"top\">\n<p class=\"p1\">Do not leave unattended on copiers\/printers<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 104px;border-style: solid;background-color: #f7b2b2;border-color: #000000\" valign=\"top\">\n<p class=\"p1\">Send to the printer using Trinity&#8217;s ID swipe printing system. Swipe your ID at the machine to print.<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p1\"><b>Mailing paper-based info <\/b><b><\/b><\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;background-color: #fcfcac;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p1\">Put it in a closed mailing envelope\/box and send it via Interoffice or US mail.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;background-color: #f5e2bc;height: 128px\" valign=\"top\">\n<p class=\"p1\">Put it in a sealed envelope\/box and send it via interoffice or US mail.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;background-color: #f7b2b2;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p1\">Put in a sealed envelope or box and send via FedEx\/UPS\/USPS mail with tracking\/delivery confirmation where feasible.<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p1\"><b>Storing electronic files on work or personal computer (including portable devices) <\/b><b><\/b><\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;background-color: #fcfcac;border-style: solid;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p1\">Devices must have current patches, encryption, and remote wiping.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;border-color: #000000;background-color: #f5e2bc;height: 128px\" valign=\"top\">\n<p class=\"p1\">Trinity College-provided devices must be in compliance. Have anti-virus, current patches, encryption, and remote wiping.<\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;border-style: solid;background-color: #f7b2b2;border-color: #000000;height: 128px\" valign=\"top\">\n<p class=\"p1\">Never copy\/store L4 data onto your work or personal computer. Data should remain within Trinity&#8217;s secure, managed, encrypted storage location.<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 25%;height: 24px;border-style: solid;border-color: #000000\">\n<p class=\"p1\"><b>Storing files on external <\/b><b>portable storage media<\/b><\/p>\n<\/td>\n<td style=\"width: 25%;height: 24px;background-color: #fcfcac;border-style: solid;border-color: #000000\">\n<p class=\"p1\">No specific requirements<\/p>\n<\/td>\n<td style=\"width: 25%;height: 24px;border-style: solid;border-color: #000000;background-color: #f5e2bc\">USB sticks, CDs\/DVDs, backup tapes, etc. must be encrypted and password protected.<\/td>\n<td style=\"width: 25%;height: 24px;border-style: solid;background-color: #f7b2b2;border-color: #000000\">USB sticks, CDs\/DVDs, backup tapes, etc. must be encrypted and password protected.<\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 25%;height: 24px;border-style: solid;border-color: #000000\">\n<p class=\"p1\"><b>Sharing files with <\/b><b>authorized individuals<\/b><\/p>\n<\/td>\n<td style=\"width: 25%;height: 24px;background-color: #fcfcac;border-style: solid;border-color: #000000\">\n<p class=\"p1\">Use approved collaboration tools and share with specific individuals, not anonymous or guest links.<\/p>\n<\/td>\n<td style=\"width: 25%;height: 24px;border-style: solid;border-color: #000000;background-color: #f5e2bc\">Use approved collaboration tools and share with specific individuals, not anonymous or guest links.<\/td>\n<td style=\"width: 25%;height: 24px;border-style: solid;background-color: #f7b2b2;border-color: #000000\">Use only security-cleared L4 SharePoint or network locations to share files with named individuals.<\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 25%;height: 24px;border-style: solid;border-color: #000000\">\n<p class=\"p1\"><b>Sending data\/files <\/b><b>to authorized individuals<\/b><\/p>\n<\/td>\n<td style=\"width: 25%;height: 24px;background-color: #fcfcac;border-style: solid;border-color: #000000\">\n<p class=\"p1\">Use email and send it only to those authorized to view it.<\/p>\n<\/td>\n<td style=\"width: 25%;height: 24px;border-style: solid;border-color: #000000;background-color: #f5e2bc\">Encrypt data when transmitting it both internally and externally: Use a School-supported Secure File Transfer method (e.g., OneDrive, SharePoint, etc.). On website forms, use HTTPS.<\/td>\n<td style=\"width: 25%;height: 24px;border-style: solid;background-color: #f7b2b2;border-color: #000000\">Encrypt data when transmitting internally and externally: Use a College-supported Secure File Transfer method (e.g., L4 SharePoint). On website forms, use HTTPS.<\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td class=\"td1\" style=\"width: 25%;height: 25px;border-style: solid;border-color: #000000\" valign=\"top\">\n<p class=\"p1\"><b>Engaging vendors <\/b><b>to store\/process data<\/b><\/p>\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 25px;background-color: #fcfcac;border-style: solid;border-color: #000000\" valign=\"top\">\n<p class=\"p1\">Written contracts are strongly recommended.<\/p>\n<p class=\"p1\">\n<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 25px;border-style: solid;border-color: #000000;background-color: #f5e2bc\" valign=\"top\">Ensure the written college contract includes appropriate technology addendums or rider(s).<\/td>\n<td class=\"td1\" style=\"width: 25%;height: 25px;border-style: solid;background-color: #f7b2b2;border-color: #000000\" valign=\"top\">\n<p class=\"p1\">Engage LITS for a review and include Trinity&#8217;s Technology addendum in the vendor\/hosting agreement.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 25%;border-style: solid;border-color: #000000\">\n<p class=\"p1\"><b>Deleting electronic files<\/b><\/p>\n<\/td>\n<td style=\"width: 25%;background-color: #fcfcac;border-style: solid;border-color: #000000\">\n<p class=\"p1\">Use standard Delete\/\u201cX\u201d commands and empty trash bin.<\/p>\n<\/td>\n<td style=\"width: 25%;border-style: solid;border-color: #000000;background-color: #f5e2bc\">Use standard Delete\/\u201cX\u201d commands and empty trash bin.<\/td>\n<td style=\"width: 25%;border-style: solid;background-color: #f7b2b2;border-color: #000000\">\n<p class=\"p1\">Use a secure overwrite or removal tool.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 33.3334%;text-align: center;border-style: solid;border-color: #000000\" colspan=\"2\"><b>How to dispose of\/recycle paper:<\/b><b><br \/>\n<\/b><\/td>\n<td style=\"width: 50%;border-style: solid;border-color: #000000\" colspan=\"2\">\n<p class=\"p1\" style=\"text-align: center\"><b>How to dispose of devices:<\/b><b><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.6667%;border-style: solid;border-color: #000000\">\n<p class=\"p1\" style=\"text-align: center\">L1 Data only for single-stream recycling<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8479 size-medium\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457-268x300.jpg\" alt=\"\" width=\"268\" height=\"300\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457-268x300.jpg 268w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457.jpg 757w\" sizes=\"auto, (max-width: 268px) 100vw, 268px\" \/><\/p>\n<\/td>\n<td style=\"width: 16.6667%;border-style: solid;border-color: #000000\">\n<p class=\"p1\" style=\"text-align: center\">L2-L4 Data to be shredded and recycled<\/p>\n<p class=\"p1\" style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8477 size-medium\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647-300x300.jpg 300w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647-150x150.jpg 150w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647-768x768.jpg 768w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647-740x740.jpg 740w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647-400x400.jpg 400w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647-600x600.jpg 600w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/1045331647.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<\/td>\n<td style=\"width: 21.0145%;border-style: solid;border-color: #000000\">\n<p class=\"p1\" style=\"text-align: center\">Shred CD\/DVDs<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8481 \" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/Paper-Shredder-10-Sheet-Strip-Cut-with-3-17-Gallon-P-2-Security-Level-3-Mode-Design-Shred-CD_2e5aa604-c2a9-4fb3-91f6-a6fcb502d3ac.866e9f0584b82b24a87f369cc2222599-copy-300x300.png\" alt=\"\" width=\"221\" height=\"221\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/Paper-Shredder-10-Sheet-Strip-Cut-with-3-17-Gallon-P-2-Security-Level-3-Mode-Design-Shred-CD_2e5aa604-c2a9-4fb3-91f6-a6fcb502d3ac.866e9f0584b82b24a87f369cc2222599-copy-300x300.png 300w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/Paper-Shredder-10-Sheet-Strip-Cut-with-3-17-Gallon-P-2-Security-Level-3-Mode-Design-Shred-CD_2e5aa604-c2a9-4fb3-91f6-a6fcb502d3ac.866e9f0584b82b24a87f369cc2222599-copy-150x150.png 150w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/Paper-Shredder-10-Sheet-Strip-Cut-with-3-17-Gallon-P-2-Security-Level-3-Mode-Design-Shred-CD_2e5aa604-c2a9-4fb3-91f6-a6fcb502d3ac.866e9f0584b82b24a87f369cc2222599-copy-740x740.png 740w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/Paper-Shredder-10-Sheet-Strip-Cut-with-3-17-Gallon-P-2-Security-Level-3-Mode-Design-Shred-CD_2e5aa604-c2a9-4fb3-91f6-a6fcb502d3ac.866e9f0584b82b24a87f369cc2222599-copy-400x400.png 400w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/Paper-Shredder-10-Sheet-Strip-Cut-with-3-17-Gallon-P-2-Security-Level-3-Mode-Design-Shred-CD_2e5aa604-c2a9-4fb3-91f6-a6fcb502d3ac.866e9f0584b82b24a87f369cc2222599-copy-600x600.png 600w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/Paper-Shredder-10-Sheet-Strip-Cut-with-3-17-Gallon-P-2-Security-Level-3-Mode-Design-Shred-CD_2e5aa604-c2a9-4fb3-91f6-a6fcb502d3ac.866e9f0584b82b24a87f369cc2222599-copy.png 768w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/><\/p>\n<p class=\"p1\" style=\"text-align: center\">\n<\/td>\n<td style=\"width: 28.9855%;border-style: solid;border-color: #000000\">\n<p class=\"p1\" style=\"text-align: center\">Contact local IT Support for pick-up or drop-off: they will remove data and recycle<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8485 size-medium\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/PrintRover-Collage-of-devices-e1738182940310-300x147.png\" alt=\"\" width=\"300\" height=\"147\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/PrintRover-Collage-of-devices-e1738182940310-300x147.png 300w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/PrintRover-Collage-of-devices-e1738182940310-768x377.png 768w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/PrintRover-Collage-of-devices-e1738182940310.png 885w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"p1\" style=\"text-align: right\">Revision Date: 01\/29\/2025<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Reference Guide: Data Classifications with Administrative Examples CLASSIFICATION Level 1: Information intended and released for public use. Level 2: Information that may be shared only within the Trinity community. Level 3: Confidential and sensitive information intended only for those with a \u201cbusiness need to know.\u201d Level 4: High-risk information that requires strict controls. The [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":8451,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8465","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Classification &amp; Handling - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Classification &amp; Handling\" \/>\n<meta property=\"og:description\" content=\"Quick Reference Guide: Data Classifications with Administrative Examples CLASSIFICATION Level 1: Information intended and released for public use. Level 2: Information that may be shared only within the Trinity community. Level 3: Confidential and sensitive information intended only for those with a \u201cbusiness need to know.\u201d Level 4: High-risk information that requires strict controls. The [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-08T18:43:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"757\" \/>\n\t<meta property=\"og:image:height\" content=\"847\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/\",\"name\":\"Data Classification &amp; Handling - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457-268x300.jpg\",\"datePublished\":\"2025-01-29T19:17:46+00:00\",\"dateModified\":\"2025-04-08T18:43:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#primaryimage\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457.jpg\",\"contentUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457.jpg\",\"width\":757,\"height\":847},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance Risk and Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Information Security Policy &amp; Standards\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Data Classification &amp; Collaboration\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Data Classification &amp; Handling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Classification &amp; Handling - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/","og_locale":"en_US","og_type":"article","og_title":"Data Classification &amp; Handling","og_description":"Quick Reference Guide: Data Classifications with Administrative Examples CLASSIFICATION Level 1: Information intended and released for public use. Level 2: Information that may be shared only within the Trinity community. Level 3: Confidential and sensitive information intended only for those with a \u201cbusiness need to know.\u201d Level 4: High-risk information that requires strict controls. The [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2025-04-08T18:43:46+00:00","og_image":[{"width":757,"height":847,"url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/","name":"Data Classification &amp; Handling - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#primaryimage"},"image":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457-268x300.jpg","datePublished":"2025-01-29T19:17:46+00:00","dateModified":"2025-04-08T18:43:46+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#primaryimage","url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457.jpg","contentUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/01\/14Q-02ML_01__73766-e1738182823457.jpg","width":757,"height":847},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/data-classification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Governance Risk and Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/"},{"@type":"ListItem","position":5,"name":"Information Security Policy &amp; Standards","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/"},{"@type":"ListItem","position":6,"name":"Data Classification &amp; Collaboration","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/"},{"@type":"ListItem","position":7,"name":"Data Classification &amp; Handling"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=8465"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8465\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8451"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=8465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}