This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
wiki:policies:data [2022/01/25 17:01] katcow |
wiki:policies:data [2024/01/24 21:27] katcow |
||
---|---|---|---|
Line 10: | Line 10: | ||
===== III. Data Classification Policy ===== | ===== III. Data Classification Policy ===== | ||
- | |||
- | Company data refers to information generated by or for, owned by, or otherwise in Nested Knowledge’s possession. Company data includes, but is not limited to, research data and business data. | ||
=== Public Data: === | === Public Data: === | ||
- | Data classified as public may be disclosed to anyone, regardless of their affiliation with Nested Knowledge. Internal Data Internal data is information that is potentially sensitive and is not intended to be shared with the public. Internal data generally should not be disclosed outside of Nested Knowledge without the permission of the person or group that created the data. | + | Data classified as public may be disclosed to anyone, regardless of their affiliation with Nested Knowledge. |
+ | |||
+ | === Internal Data === | ||
+ | |||
+ | Internal data is information that is potentially sensitive and is not intended to be shared with the public. Internal data generally should not be disclosed outside of Nested Knowledge without the permission of the person or group that created the data. | ||
=== Confidential Data === | === Confidential Data === | ||
Confidential data is information that, if made available to unauthorized parties, may adversely affect individuals, | Confidential data is information that, if made available to unauthorized parties, may adversely affect individuals, | ||
+ | |||
+ | Users are prohibited from sharing confidential information through the following means: | ||
+ | |||
+ | * sending to un-authorized websites, | ||
+ | * sending by phone messaging, WhatsApp, or similar technologies, | ||
+ | * posting on social media, such as Twitter | ||
+ | * uploading to removable media, such as USB devices. | ||
+ | |||
+ | Confidential information should be stored in secure, encrypted environments. Users are discouraged from storing confidential information on their personal device filesystem. | ||
=== Loss of Confidentiality === | === Loss of Confidentiality === | ||
Line 42: | Line 53: | ||
* User location data and online behavior | * User location data and online behavior | ||
- | High-risk personal data fall under the same guidelines as restricted use data. | + | High-risk personal data fall under the same guidelines as restricted use data. |
=== Other Regulations === | === Other Regulations === | ||
Some data may be subject to specific protection requirements under a contract or grant, or according to a law or regulation not described here. In those circumstances, | Some data may be subject to specific protection requirements under a contract or grant, or according to a law or regulation not described here. In those circumstances, | ||
- | |||
=== Compliance === | === Compliance === | ||
Line 62: | Line 72: | ||
|K. Cowie|11/ | |K. Cowie|11/ | ||
|K. Kallmes|11/ | |K. Kallmes|11/ | ||
+ | |P. Olaniran|09/ | ||
+ | |K. Cowie|09/ | ||
[[: | [[: | ||
+ | |||
+ |