{"id":9107,"date":"2025-06-10T17:46:44","date_gmt":"2025-06-10T21:46:44","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/risk-classification\/"},"modified":"2025-06-10T18:05:16","modified_gmt":"2025-06-10T22:05:16","slug":"risk-classification","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/","title":{"rendered":"Risk Classification"},"content":{"rendered":"<h2 data-start=\"166\" data-end=\"432\"><strong data-start=\"166\" data-end=\"190\">Risk Classifications<\/strong><\/h2>\n<p data-start=\"166\" data-end=\"432\">Trinity College is committed to safeguarding the privacy of its students, alumni, faculty, and staff, and to ensuring the confidentiality, integrity, and availability of the information that supports and advances its educational mission.<\/p>\n<p data-start=\"434\" data-end=\"674\">To uphold these commitments, Trinity classifies institutional information and data according to their risk level, enabling the implementation of appropriate handling, access, and protection measures in accordance with its legal, regulatory, and ethical responsibilities.<\/p>\n<p data-start=\"676\" data-end=\"811\">This framework supports a culture of information security and responsible data stewardship across all members of the College community.<\/p>\n<p>Trinity College has classified its information assets into risk-based categories to determine who is authorized to access the information and what security measures must be taken to protect it against unauthorized access.<\/p>\n<div class=\"section-content col-md-6 col-lg-4 \">\n<div id=\"section_2491\" class=\"paragraph paragraph--card paragraph-id--2491 card--default\">\n<div class=\"card card-red mb-4 box-shadow\">\n<div class=\"card-body\">\n<div class=\"clearfix text-formatted field field--name-field-card-body field--type-text-long field--label-hidden field__item\">\n<h3 data-start=\"180\" data-end=\"196\"><strong data-start=\"184\" data-end=\"196\">Low Risk<\/strong><\/h3>\n<p data-start=\"197\" data-end=\"366\">Data and systems are classified as Low Risk when they do not fall under the Moderate or High Risk categories and meet at least one of the following criteria:<\/p>\n<ul data-start=\"368\" data-end=\"606\">\n<li data-start=\"368\" data-end=\"434\">\n<p data-start=\"370\" data-end=\"434\">The information is intended for public access or distribution.<\/p>\n<\/li>\n<li data-start=\"435\" data-end=\"606\">\n<p data-start=\"437\" data-end=\"606\">A loss of confidentiality, integrity, or availability would result in no measurable impact on Trinity College\u2019s mission, operations, safety, finances, or reputation.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h3 data-start=\"613\" data-end=\"634\"><strong data-start=\"617\" data-end=\"634\">wModerate Risk<\/strong><\/h3>\n<p data-start=\"635\" data-end=\"775\">Data and systems are classified as Moderate Risk when they are not deemed High Risk\u00a0and meet one or more of the following criteria:<\/p>\n<ul data-start=\"777\" data-end=\"1036\">\n<li data-start=\"777\" data-end=\"865\">\n<p data-start=\"779\" data-end=\"865\">The information is not publicly available and is intended for internal use only.<\/p>\n<\/li>\n<li data-start=\"866\" data-end=\"1036\">\n<p data-start=\"868\" data-end=\"1036\">Unauthorized access, alteration, or unavailability could cause limited or short-term impact on the College\u2019s mission, operations, safety, finances, or reputation.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1038\" data-end=\"1172\">Examples may include internal communications, data not subject to regulatory controls, or student work not governed by the Family Educational Rights and Privacy Act (FERPA).<\/p>\n<h3 data-start=\"1179\" data-end=\"1196\"><strong data-start=\"1183\" data-end=\"1196\">High Risk<\/strong><\/h3>\n<p data-start=\"1197\" data-end=\"1291\">Data and systems are classified as High Risk if they meet any of the following conditions:<\/p>\n<ul data-start=\"1293\" data-end=\"1718\">\n<li data-start=\"1293\" data-end=\"1391\">\n<p data-start=\"1295\" data-end=\"1391\">Protection of the information is required by law or regulation (e.g., FERPA, HIPAA, GDPR).<\/p>\n<\/li>\n<li data-start=\"1392\" data-end=\"1530\">\n<p data-start=\"1394\" data-end=\"1530\">Trinity College would be legally obligated to notify individuals or authorities in the event of unauthorized access or disclosure.<\/p>\n<\/li>\n<li data-start=\"1531\" data-end=\"1718\">\n<p data-start=\"1533\" data-end=\"1718\">A breach or failure affecting confidentiality, integrity, or availability could result in significant harm to the College\u2019s mission, safety, finances, legal standing, or reputation.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1720\" data-end=\"1871\">Examples include social security numbers, health records, financial account information, and other sensitive personally identifiable information (PII).<\/p>\n<hr data-start=\"913\" data-end=\"916\" \/>\n<h2 class=\"section-heading\">Data Risk Classification Examples<\/h2>\n<p data-start=\"190\" data-end=\"470\">Use the examples below to help determine the appropriate risk classification for specific types of data or systems. When handling datasets that include multiple types of information, always apply the highest applicable risk classification to ensure appropriate protection.<\/p>\n<p data-start=\"472\" data-end=\"656\">This approach helps safeguard data integrity, supports compliance with legal and institutional requirements, and reinforces Trinity College\u2019s commitment to responsible data management.<\/p>\n<h3 data-start=\"443\" data-end=\"459\"><strong data-start=\"447\" data-end=\"459\">Low Risk<\/strong><\/h3>\n<p data-start=\"460\" data-end=\"600\">Data intended for public use, where unauthorized access would pose no impact on Trinity College\u2019s operations, compliance, or reputation.<\/p>\n<p data-start=\"602\" data-end=\"619\">Examples include:<\/p>\n<ul data-start=\"621\" data-end=\"1074\">\n<li data-start=\"680\" data-end=\"761\">\n<p data-start=\"682\" data-end=\"761\">Trinity IDs or equivalent identifiers (when not linked to sensitive data)<\/p>\n<\/li>\n<li data-start=\"762\" data-end=\"840\">\n<p data-start=\"764\" data-end=\"840\">Information publicly available on Trinity\u2019s website without authentication<\/p>\n<\/li>\n<li data-start=\"841\" data-end=\"914\">\n<p data-start=\"843\" data-end=\"914\">Policy or procedure manuals explicitly marked for public distribution<\/p>\n<\/li>\n<li data-start=\"915\" data-end=\"931\">\n<p data-start=\"917\" data-end=\"931\">Job postings<\/p>\n<\/li>\n<li data-start=\"932\" data-end=\"1003\">\n<p data-start=\"934\" data-end=\"1003\">College contact information not marked as private by the individual<\/p>\n<\/li>\n<li data-start=\"1004\" data-end=\"1036\">\n<p data-start=\"1006\" data-end=\"1036\">Content in the public domain<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1081\" data-end=\"1102\"><strong data-start=\"1085\" data-end=\"1102\">Moderate Risk<\/strong><\/h3>\n<p data-start=\"1103\" data-end=\"1274\">Data not intended for public access, where unauthorized disclosure could cause limited or short-term impact to Trinity\u2019s operations, reputation, or compliance posture.<\/p>\n<p data-start=\"1276\" data-end=\"1293\">Examples include:<\/p>\n<ul data-start=\"1295\" data-end=\"1893\">\n<li data-start=\"1295\" data-end=\"1362\">\n<p data-start=\"1297\" data-end=\"1362\">Unpublished research data (at the discretion of the data owner)<\/p>\n<\/li>\n<li data-start=\"1363\" data-end=\"1418\">\n<p data-start=\"1365\" data-end=\"1418\">Student academic records and admission applications<\/p>\n<\/li>\n<li data-start=\"1419\" data-end=\"1557\">\n<p data-start=\"1421\" data-end=\"1557\">Faculty\/staff employment applications, personnel files, salary data, benefits information, date of birth, and personal contact details<\/p>\n<\/li>\n<li data-start=\"1558\" data-end=\"1621\">\n<p data-start=\"1560\" data-end=\"1621\">Internal (non-public) policies and administrative documents<\/p>\n<\/li>\n<li data-start=\"1622\" data-end=\"1661\">\n<p data-start=\"1624\" data-end=\"1661\">Non-public contracts and agreements<\/p>\n<\/li>\n<li data-start=\"1662\" data-end=\"1731\">\n<p data-start=\"1664\" data-end=\"1731\">Internal communications, reports, budgets, and planning documents<\/p>\n<\/li>\n<li data-start=\"1732\" data-end=\"1772\">\n<p data-start=\"1734\" data-end=\"1772\">Institutional or employee ID numbers<\/p>\n<\/li>\n<li data-start=\"1816\" data-end=\"1893\">\n<p data-start=\"1818\" data-end=\"1893\">Engineering, design, or operational data related to campus infrastructure<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1900\" data-end=\"1917\"><strong data-start=\"1904\" data-end=\"1917\">High Risk<\/strong><\/h3>\n<p data-start=\"1918\" data-end=\"2116\">Sensitive or regulated data, where unauthorized access or disclosure could result in significant harm to individuals or Trinity College, or where protection is required by law or regulation.<\/p>\n<p data-start=\"2118\" data-end=\"2135\">Examples include:<\/p>\n<ul data-start=\"2137\" data-end=\"2575\">\n<li data-start=\"2137\" data-end=\"2221\">\n<p data-start=\"2139\" data-end=\"2221\">Medical or health-related data, including Protected Health Information (PHI)<\/p>\n<\/li>\n<li data-start=\"2222\" data-end=\"2257\">\n<p data-start=\"2224\" data-end=\"2257\">Health insurance policy numbers<\/p>\n<\/li>\n<li data-start=\"2258\" data-end=\"2285\">\n<p data-start=\"2260\" data-end=\"2285\">Social Security numbers<\/p>\n<\/li>\n<li data-start=\"2286\" data-end=\"2323\">\n<p data-start=\"2288\" data-end=\"2323\">Credit card or debit card numbers<\/p>\n<\/li>\n<li data-start=\"2324\" data-end=\"2382\">\n<p data-start=\"2326\" data-end=\"2382\">Bank account numbers and financial routing information<\/p>\n<\/li>\n<li data-start=\"2383\" data-end=\"2421\">\n<p data-start=\"2385\" data-end=\"2421\">Export-controlled research or data<\/p>\n<\/li>\n<li data-start=\"2422\" data-end=\"2507\">\n<p data-start=\"2424\" data-end=\"2507\">Government-issued identification numbers (e.g., driver\u2019s license, passport, visa)<\/p>\n<\/li>\n<li data-start=\"2508\" data-end=\"2575\">\n<p data-start=\"2510\" data-end=\"2575\">Donor contact information and confidential gift-related records<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"913\" data-end=\"916\" \/>\n<h2>Server Risk Classification Examples<\/h2>\n<h3 data-start=\"562\" data-end=\"578\"><strong data-start=\"566\" data-end=\"578\">Low Risk<\/strong><\/h3>\n<p data-start=\"579\" data-end=\"751\">Systems that store or process only public information, and where a compromise would have no impact on Trinity College\u2019s operations, compliance obligations, or reputation.<\/p>\n<p data-start=\"753\" data-end=\"770\">Examples include:<\/p>\n<ul data-start=\"772\" data-end=\"1012\">\n<li data-start=\"772\" data-end=\"860\">\n<p data-start=\"774\" data-end=\"860\">Research computing servers used exclusively with publicly available or low-risk data<\/p>\n<\/li>\n<li data-start=\"861\" data-end=\"925\">\n<p data-start=\"863\" data-end=\"925\">File servers hosting publicly released datasets or documents<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1019\" data-end=\"1040\"><strong data-start=\"1023\" data-end=\"1040\">Moderate Risk<\/strong><\/h3>\n<p data-start=\"1041\" data-end=\"1206\">Systems that store or process Moderate Risk data, where unauthorized access could cause limited or temporary harm to individuals or institutional operations.<\/p>\n<p data-start=\"1208\" data-end=\"1225\">Examples include:<\/p>\n<ul data-start=\"1227\" data-end=\"1564\">\n<li data-start=\"1227\" data-end=\"1296\">\n<p data-start=\"1229\" data-end=\"1296\">Servers managing internal or restricted (non-public) college data<\/p>\n<\/li>\n<li data-start=\"1297\" data-end=\"1390\">\n<p data-start=\"1299\" data-end=\"1390\">Databases containing confidential but non-regulated documents, such as internal contracts<\/p>\n<\/li>\n<li data-start=\"1391\" data-end=\"1481\">\n<p data-start=\"1393\" data-end=\"1481\">File servers storing non-public procedures, planning documents, or operational manuals<\/p>\n<\/li>\n<li data-start=\"1482\" data-end=\"1564\">\n<p data-start=\"1484\" data-end=\"1564\">Application or database servers housing student academic or admissions records<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1571\" data-end=\"1588\"><strong data-start=\"1575\" data-end=\"1588\">High Risk<\/strong><\/h3>\n<p data-start=\"1589\" data-end=\"1810\">Systems that store or provide access to high-risk or regulated data, or are considered critical infrastructure. Compromise could result in significant institutional, legal, financial, or reputational harm.<\/p>\n<p data-start=\"1812\" data-end=\"1829\">Examples include:<\/p>\n<ul data-start=\"1831\" data-end=\"2276\">\n<li data-start=\"1831\" data-end=\"1950\">\n<p data-start=\"1833\" data-end=\"1950\">Servers storing or processing High Risk data such as PHI, Social Security numbers, or financial account information<\/p>\n<\/li>\n<li data-start=\"1951\" data-end=\"2042\">\n<p data-start=\"1953\" data-end=\"2042\">Authentication servers or systems that control access to high-risk applications or data<\/p>\n<\/li>\n<li data-start=\"2043\" data-end=\"2123\">\n<p data-start=\"2045\" data-end=\"2123\">College-wide or departmental email systems handling sensitive communications<\/p>\n<\/li>\n<li data-start=\"2124\" data-end=\"2276\">\n<p data-start=\"2126\" data-end=\"2276\">Core infrastructure systems essential to Trinity\u2019s operations (e.g., identity and access management, network backbone, enterprise resource planning)<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"913\" data-end=\"916\" \/>\n<h2>Application Risk Classification Examples<\/h2>\n<h3 data-start=\"535\" data-end=\"551\"><strong data-start=\"539\" data-end=\"551\">Low Risk<\/strong><\/h3>\n<p data-start=\"552\" data-end=\"719\">Applications that process or display public information, where compromise would have no adverse effect on Trinity College\u2019s mission, operations, or reputation.<\/p>\n<p data-start=\"721\" data-end=\"738\">Examples include:<\/p>\n<ul data-start=\"740\" data-end=\"911\">\n<li data-start=\"740\" data-end=\"784\">\n<p data-start=\"742\" data-end=\"784\">Applications handling only low-risk data<\/p>\n<\/li>\n<li data-start=\"785\" data-end=\"807\">\n<p data-start=\"787\" data-end=\"807\">Online campus maps<\/p>\n<\/li>\n<li data-start=\"808\" data-end=\"866\">\n<p data-start=\"810\" data-end=\"866\">Public academic catalog displaying course descriptions<\/p>\n<\/li>\n<li data-start=\"867\" data-end=\"911\">\n<p data-start=\"869\" data-end=\"911\">Transit or shuttle schedule applications<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"918\" data-end=\"939\"><strong data-start=\"922\" data-end=\"939\">Moderate Risk<\/strong><\/h3>\n<p data-start=\"940\" data-end=\"1110\">Applications that process non-public but unregulated information, where unauthorized access could cause a limited or temporary impact to individuals or the College.<\/p>\n<p data-start=\"1112\" data-end=\"1129\">Examples include:<\/p>\n<ul data-start=\"1131\" data-end=\"1451\">\n<li data-start=\"1131\" data-end=\"1175\">\n<p data-start=\"1133\" data-end=\"1175\">Applications handling Moderate Risk data<\/p>\n<\/li>\n<li data-start=\"1176\" data-end=\"1259\">\n<p data-start=\"1178\" data-end=\"1259\">Human Resources applications storing salary, job titles, or contact information<\/p>\n<\/li>\n<li data-start=\"1260\" data-end=\"1348\">\n<p data-start=\"1262\" data-end=\"1348\">Internal directory tools with employee phone numbers, email addresses, and positions<\/p>\n<\/li>\n<li data-start=\"1349\" data-end=\"1383\">\n<p data-start=\"1351\" data-end=\"1383\">Campus emergency alert systems<\/p>\n<\/li>\n<li data-start=\"1384\" data-end=\"1451\">\n<p data-start=\"1386\" data-end=\"1451\">Online application portals for student admissions or enrollment<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1458\" data-end=\"1475\"><strong data-start=\"1462\" data-end=\"1475\">High Risk<\/strong><\/h3>\n<p data-start=\"1476\" data-end=\"1682\">Applications that store or process High Risk or legally regulated data, or where a breach could cause significant harm to individuals or to Trinity College\u2019s operations, finances, or legal standing.<\/p>\n<p data-start=\"1684\" data-end=\"1701\">Examples include:<\/p>\n<ul data-start=\"1703\" data-end=\"2073\">\n<li data-start=\"1703\" data-end=\"1743\">\n<p data-start=\"1705\" data-end=\"1743\">Applications handling high-risk data<\/p>\n<\/li>\n<li data-start=\"1744\" data-end=\"1835\">\n<p data-start=\"1746\" data-end=\"1835\">Human Resources systems storing Social Security numbers or protected health information<\/p>\n<\/li>\n<li data-start=\"1836\" data-end=\"1913\">\n<p data-start=\"1838\" data-end=\"1913\">Applications storing or managing sensitive network infrastructure details<\/p>\n<\/li>\n<li data-start=\"1914\" data-end=\"2002\">\n<p data-start=\"1916\" data-end=\"2002\">Systems collecting or storing confidential donor, alumni, or constituent information<\/p>\n<\/li>\n<li data-start=\"2003\" data-end=\"2073\">\n<p data-start=\"2005\" data-end=\"2073\">Payment processing systems that handle credit card or banking data<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Risk Classifications Trinity College is committed to safeguarding the privacy of its students, alumni, faculty, and staff, and to ensuring the confidentiality, integrity, and availability of the information that supports and advances its educational mission. To uphold these commitments, Trinity classifies institutional information and data according to their risk level, enabling the implementation of appropriate [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":8451,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-9107","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Risk Classification - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk Classification\" \/>\n<meta property=\"og:description\" content=\"Risk Classifications Trinity College is committed to safeguarding the privacy of its students, alumni, faculty, and staff, and to ensuring the confidentiality, integrity, and availability of the information that supports and advances its educational mission. To uphold these commitments, Trinity classifies institutional information and data according to their risk level, enabling the implementation of appropriate [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T22:05:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/\",\"name\":\"Risk Classification - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2025-06-10T21:46:44+00:00\",\"dateModified\":\"2025-06-10T22:05:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance Risk and Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Information Security Policy &amp; Standards\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Data Classification &amp; Collaboration\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Risk Classification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risk Classification - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/","og_locale":"en_US","og_type":"article","og_title":"Risk Classification","og_description":"Risk Classifications Trinity College is committed to safeguarding the privacy of its students, alumni, faculty, and staff, and to ensuring the confidentiality, integrity, and availability of the information that supports and advances its educational mission. To uphold these commitments, Trinity classifies institutional information and data according to their risk level, enabling the implementation of appropriate [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2025-06-10T22:05:16+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/","name":"Risk Classification - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2025-06-10T21:46:44+00:00","dateModified":"2025-06-10T22:05:16+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/risk-classification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Governance Risk and Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/"},{"@type":"ListItem","position":5,"name":"Information Security Policy &amp; Standards","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/"},{"@type":"ListItem","position":6,"name":"Data Classification &amp; Collaboration","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/"},{"@type":"ListItem","position":7,"name":"Risk Classification"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/9107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=9107"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/9107\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8451"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=9107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}