Skip to main content

Data Classification

This reference defines the classification levels, handling requirements, and labelling standards for categorising data according to sensitivity and impact. Use this page to determine the correct classification for specific data types and to identify the controls required at each level.

Classification Level Definitions

Data classification assigns a sensitivity label to information based on the potential harm that unauthorised disclosure, modification, or loss would cause. The classification determines minimum handling requirements throughout the data lifecycle.

+------------------------------------------------------------------+
| CLASSIFICATION HIERARCHY |
+------------------------------------------------------------------+
| |
| +------------------------------------------------------------+ |
| | RESTRICTED | |
| | Severe harm to individuals or organisation | |
| | Examples: protection case files, safeguarding allegations | |
| +------------------------------------------------------------+ |
| | |
| +------------------------------------------------------------+ |
| | CONFIDENTIAL | |
| | Significant harm if disclosed | |
| | Examples: staff records, financial accounts, donor data | |
| +------------------------------------------------------------+ |
| | |
| +------------------------------------------------------------+ |
| | INTERNAL | |
| | Minor harm or operational disruption | |
| | Examples: internal policies, meeting notes, project plans | |
| +------------------------------------------------------------+ |
| | |
| +------------------------------------------------------------+ |
| | PUBLIC | |
| | No harm from disclosure; intended for release | |
| | Examples: annual reports, press releases, published data | |
| +------------------------------------------------------------+ |
| |
+------------------------------------------------------------------+

Figure 1: Four-tier classification hierarchy with impact definitions

Public
Information approved for unrestricted distribution. Disclosure causes no harm to individuals, operations, or organisational reputation. This classification applies to content explicitly cleared for external release: published reports, marketing materials, public datasets, and press statements. Data defaults to Internal unless explicitly approved as Public through a defined release process.
Internal
Information intended for use within the organisation and trusted partners. Unauthorised disclosure causes minor operational disruption, limited reputational impact, or competitive disadvantage, but does not harm individuals or violate legal obligations. Internal represents the default classification for business information not meeting criteria for higher levels. Examples include internal policies, operational procedures, staff directories without contact details, and general project documentation.
Confidential
Information whose disclosure causes significant harm to individuals, substantial financial loss, regulatory penalties, or serious reputational damage. Confidential data includes personal data subject to privacy regulations, financial records, contractual information with confidentiality clauses, donor records, and strategic plans. Access requires explicit authorisation and a documented business need.
Restricted
Information whose disclosure causes severe or irreversible harm to individuals, critical operational failure, existential organisational risk, or danger to life. Restricted classification applies to protection and safeguarding case data, whistleblower identities, security vulnerability details, and information about individuals facing persecution, violence, or trafficking. Access requires senior management approval and is limited to named individuals with direct operational responsibility.

Handling Requirements

Each classification level mandates specific controls across storage, transmission, access, retention, and disposal. These requirements represent minimums; higher controls are always permissible.

RequirementPublicInternalConfidentialRestricted
Storage encryptionNot requiredRecommendedRequired (AES-256)Required (AES-256)
Transmission encryptionHTTPSTLS 1.2+TLS 1.3 requiredTLS 1.3, end-to-end where feasible
Access controlNoneAuthentication requiredRole-based, need-to-knowNamed individuals, senior approval
Sharing externalUnrestrictedNDA or partnership agreementWritten authorisation, DPAProhibited without executive approval
Sharing internalUnrestrictedBusiness needDocumented justificationNamed recipient list
Cloud storageAny providerApproved providersApproved providers, EU/UK onlyOn-premises or sovereign cloud
Mobile devicesPermittedMDM requiredMDM + encryptionProhibited except approved devices
PrintingUnrestrictedCollect promptlySecure print releaseProhibited or witnessed collection
Retention periodPer policyPer policyMaximum necessaryMinimum necessary
Disposal methodStandard deletionSecure deletionCryptographic erasurePhysical destruction + certificate
Audit loggingNot requiredAccess logsAccess + modification logsFull audit trail, tamper-evident
Breach notificationNot requiredInternal review72-hour regulatory assessmentImmediate escalation, 24-hour assessment

Labelling Standards

Classification labels appear in document headers, footers, metadata, and system interfaces. Consistent labelling enables automated policy enforcement and user awareness.

Document Labelling

Text documents, spreadsheets, and presentations carry classification labels in the header or footer of every page. The label format follows: [CLASSIFICATION] - [Organisation Name]. For multi-page documents, the label appears on each page. Cover pages display the classification prominently, using minimum 14-point font.

Confidential and Restricted documents include a distribution statement on the cover page or first page:

CONFIDENTIAL - [Organisation Name]
Distribution limited to: [named recipients or role groups]
Handling: Do not forward without authorisation from [data owner role]

Restricted documents add a unique document identifier for tracking:

RESTRICTED - [Organisation Name]
Document ID: REST-2024-00147
Authorised recipients: [named individuals]
This document must not be copied, forwarded, or discussed outside the named recipient list.

Email Labelling

Email subject lines include the classification in square brackets at the start: [CONFIDENTIAL] Q3 Financial Review. Email clients with sensitivity labelling (Microsoft 365, Google Workspace) use native classification features that persist through replies and forwards.

Restricted information is not transmitted via standard email. Where electronic transmission is unavoidable, use encrypted file attachments with passwords communicated through a separate channel, or purpose-built secure messaging platforms.

File Naming

File names incorporate classification abbreviations for Confidential and Restricted documents:

ClassificationAbbreviationExample filename
PublicNone requiredannual-report-2024.pdf
InternalNone requiredstaff-handbook-v3.docx
ConfidentialCONFCONF-donor-database-export-2024-03.xlsx
RestrictedRESTREST-case-file-2024-00892.pdf

System Labelling

Databases, file shares, and applications display classification through consistent visual indicators. Systems storing Confidential data display a yellow banner; systems storing Restricted data display a red banner. The banner remains visible during all user interactions and cannot be dismissed.

+------------------------------------------------------------------+
| [!] CONFIDENTIAL SYSTEM - Authorised users only |
+------------------------------------------------------------------+
| |
| Application Interface |
| |
+------------------------------------------------------------------+

Figure 2: System classification banner placement

Metadata Standards

Digital files carry classification in document metadata where the format supports it. Microsoft Office documents use the Sensitivity property. PDFs use custom metadata fields. The metadata classification must match the visual label; discrepancies trigger review.

File formatMetadata locationField name
Microsoft OfficeDocument Properties > CustomClassification
PDFDocument Properties > CustomClassification
Images (JPEG, PNG)EXIF/XMPClassification
Email (MSG, EML)X-HeaderX-Classification

Classification Decision Criteria

Classification follows a risk-based assessment considering confidentiality, integrity, and availability impacts. The highest impact across any dimension determines the classification level.

Confidentiality Impact Assessment

Confidentiality impact measures harm from unauthorised disclosure. Assess against this scale:

Impact levelHarm descriptionClassification
NoneInformation intended for public releasePublic
LowMinor embarrassment, limited operational insight to competitorsInternal
ModerateRegulatory penalty under £100,000, significant reputational damage, individual distressConfidential
HighRegulatory penalty over £100,000, danger to individuals, organisational viability threatRestricted

Integrity Impact Assessment

Integrity impact measures harm from unauthorised modification. Data requiring high integrity assurance elevates classification regardless of confidentiality:

Impact levelHarm descriptionMinimum classification
LowCorrection causes minor inconvenienceInternal
ModerateIncorrect data causes financial loss under £50,000 or operational disruptionConfidential
HighIncorrect data endangers individuals, causes loss over £50,000, or violates legal obligationsRestricted

Availability Impact Assessment

Availability impact measures harm from data loss or inaccessibility. While availability primarily drives backup and recovery requirements, extreme availability needs can influence classification:

Impact levelHarm descriptionClassification influence
LowDisruption under 24 hours tolerableNo elevation
ModerateDisruption over 24 hours causes significant operational impactConsider Confidential
HighAny loss or inaccessibility endangers individuals or violates legal obligationsConsider Restricted

Combined Assessment

Apply the highest classification indicated by any single dimension:

+------------------------------------------------------------------+
| CLASSIFICATION DECISION FLOW |
+------------------------------------------------------------------+
| |
| Assess confidentiality impact -----> Classification A |
| |
| Assess integrity impact ----------> Classification B |
| |
| Assess availability impact -------> Classification C |
| |
| Final classification = MAX(A, B, C) |
| |
| Example: |
| Confidentiality: Low (Internal) |
| Integrity: Moderate (Confidential) |
| Availability: Low (no elevation) |
| Result: Confidential |
| |
+------------------------------------------------------------------+

Figure 3: Classification determined by maximum impact across dimensions

Aggregation Effect

Individual data elements at a lower classification can aggregate to a higher classification when combined. A staff directory containing names (Internal) combined with home addresses (Confidential) and salary information (Confidential) creates a dataset classified as Confidential overall. When aggregated data additionally reveals organisational vulnerabilities or patterns enabling harm, Restricted classification applies.

Assess aggregation at the dataset level, not individual records. A database containing 10,000 Internal records remains Internal. A database containing 9,999 Internal records and 1 Restricted record becomes Restricted for access control purposes, though individual Internal records may be extracted and handled at their native classification.

Reclassification

Classification is not permanent. Data requires reclassification when circumstances change, time passes, or initial classification proves incorrect.

Downgrade Triggers

TriggerActionExample
Public releaseReclassify to PublicFinancial results after publication
Time expiryReclassify per scheduleStrategic plans after implementation
Relationship endAssess continued sensitivityPartner data after partnership concludes
Individual consentReclassify per consent scopeCase study approved for publication
Legal obligation expiresReclassify to lower levelInvestigation data after retention period

Downgrade requires approval from the data owner. Restricted-to-Confidential downgrade requires senior management approval. Bulk downgrades require documented justification and spot-check verification.

Upgrade Triggers

TriggerActionExample
AggregationElevate combined datasetCombining datasets reveals sensitive patterns
Context changeReassess impactStaff location data during security incident
New informationReassess harm potentialSubject identified as at-risk individual
Regulatory changeApply new requirementsData brought under new privacy regulation
Threat changeReassess adversary interestData targeted by threat actor

Upgrade takes effect immediately upon identification. Users discovering data requiring upgrade must report to the data owner within 24 hours. Pending upgrade decision, treat data at the higher classification.

Reclassification Records

Maintain reclassification records for Confidential and Restricted data:

Record fieldContent
Data identifierDocument ID, database name, or file path
Previous classificationClassification before change
New classificationClassification after change
TriggerReason for reclassification
ApproverName and role of approving authority
DateEffective date of reclassification
Review dateNext scheduled review (upgrades: immediate; downgrades: 12 months)

Classification by Data Type

This section provides classification guidance for common data categories. Apply the decision criteria above when data does not fit listed categories or when specific circumstances warrant different treatment.

Personnel Data

Data typeDefault classificationNotes
Staff names and job titlesInternalPublic if in published materials
Staff contact details (work)Internal
Staff contact details (personal)Confidential
Salary and compensationConfidential
Performance reviewsConfidential
Disciplinary recordsConfidentialRestricted if safeguarding-related
Medical informationConfidentialRestricted if affects safety decisions
Background check resultsConfidential
Next-of-kin and emergency contactsConfidential
Whistleblower identityRestricted
Staff under threatRestricted

Financial Data

Data typeDefault classificationNotes
Published financial statementsPublicAfter publication
Draft financial statementsConfidentialUntil publication
Bank account detailsConfidential
Donor payment informationConfidential
Individual transaction recordsConfidential
Budget documentsInternalConfidential if strategic
Audit reportsConfidential
Fraud investigation recordsRestricted

Programme Data

Data typeDefault classificationNotes
Published programme reportsPublicAfter publication
Beneficiary aggregate statisticsInternalIf non-identifiable
Beneficiary contact detailsConfidential
Beneficiary assessment dataConfidential
Beneficiary biometric dataRestricted
Protection case filesRestrictedSee Protection Data Classification
Needs assessment raw dataConfidential
Distribution records with namesConfidential
Location data of vulnerable populationsRestricted

Organisational Data

Data typeDefault classificationNotes
Published policiesPublicIf externally shared
Internal policiesInternal
Strategic plans (current)ConfidentialInternal after implementation
Board minutesConfidential
Legal adviceConfidential
ContractsConfidential
Insurance policiesConfidential
Security assessmentsRestricted
Incident reportsConfidentialRestricted if protection-related

Technical Data

Data typeDefault classificationNotes
System documentationInternal
Network diagramsConfidential
Vulnerability scan resultsRestrictedUntil remediated
Penetration test reportsRestricted
Security configurationsConfidential
Encryption keysRestricted
Access credentialsRestricted
Audit logsConfidentialRestricted if containing sensitive actions
Backup mediaSame as source data

Ownership and Responsibilities

Each data asset has a designated data owner accountable for classification decisions. Data owners are typically the senior manager of the function generating or primarily using the data.

RoleClassification responsibilities
Data ownerAssign initial classification, approve reclassification, define access requirements, conduct periodic review
Data custodianImplement technical controls matching classification, maintain labelling, report classification anomalies
Data userHandle data per classification requirements, report misclassification, request reclassification when warranted
Information securityDefine classification framework, audit compliance, provide guidance on edge cases

Data owners review classification of Confidential and Restricted data annually. Internal data review occurs every three years or upon significant change to data use.

See also