- Data Classification
- The process of organizing data into categories based on sensitivity level so that appropriate security controls can be applied to each category.
- Sensitivity Level
- A label assigned to a data asset β such as Public, Internal, Confidential, or Restricted β that determines how it must be handled, stored, and shared.
- Data Owner
- The individual or department accountable for a specific set of data, including determining its classification and approving access requests.
- Data Custodian
- The IT function or system administrator responsible for the technical storage and protection of data on behalf of the data owner.
- PII (Personally Identifiable Information)
- Any information that can be used to identify a specific individual, such as name, email address, social security number, or date of birth.
- Data Handling Rules
- Specific requirements governing how a classified data asset may be stored, transmitted, printed, shared, and disposed of.
- Access Control
- Technical and procedural mechanisms that restrict who can view, edit, copy, or delete a data asset based on their role and the data's classification.
- Need-to-Know Principle
- A security standard that limits access to information to only those individuals whose job functions require it, regardless of their general security clearance.
- Data Labeling
- The practice of marking documents, files, or database records with their classification tier β typically in a document header, footer, or metadata field.
- Declassification
- The formal process of lowering a data asset's sensitivity label β for example, from Confidential to Internal β when its contents are no longer sensitive.
- SOC 2
- A US auditing standard developed by the AICPA that evaluates a service organization's controls over security, availability, processing integrity, confidentiality, and privacy.