Description
Use this request to obtain assistance with identifying and applying the appropriate data classification to information used, created, stored, or shared as part of your job duties. The Information Security team will help you understand classification requirements, interpret policy guidance, and determine the correct classification level for documents, emails, systems, datasets, applications, or research materials.
This service is intended to support compliance with organizational data governance, privacy, and security requirements by ensuring information assets are consistently and correctly classified throughout their lifecycle.
When to Use This Service
- You are unsure how to classify a document, file, dataset, or system
- You are creating new data and need to determine the correct classification
- You are sharing information internally or externally and need confirmation of allowed use
- You are handling sensitive, regulated, or restricted information (e.g., personal, financial, clinical, research, or contractual data)
- You received conflicting guidance or need clarification on policy language
- You are preparing materials for cloud storage, collaboration platforms, or external partners
What We Can Help With
- Interpreting data classification policies and standards
- Mapping information to the appropriate classification level
- Identifying handling, storage, transmission, and retention requirements
- Reviewing sample content or use cases (non-production copies preferred when possible)
- Advising on labeling, access controls, and sharing restrictions
- Directing you to additional compliance or governance resources when needed
What to Include in Your Request
To help us respond efficiently, please provide:
- A brief description of the data or information in question
- How the data is used (business, academic, research, operational, etc.)
- Where the data is stored or will be stored (system, platform, or location)
- Who needs access to the data (roles or groups, internal or external)
Important Notes
- Do not upload highly sensitive data unless specifically requested by the Information Security team.
- This service provides guidance and recommendations; final implementation actions may require coordination with system owners, data stewards, or compliance teams.