{"id":258,"date":"2025-11-27T13:59:52","date_gmt":"2025-11-27T18:59:52","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/?post_type=chapter&#038;p=258"},"modified":"2026-03-01T23:01:24","modified_gmt":"2026-03-02T04:01:24","slug":"classification-of-data","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/classification-of-data\/","title":{"raw":"Classification of Data","rendered":"Classification of Data"},"content":{"raw":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/administrative-safeguards\/\">Previous Lesson<\/a><\/h4>\r\n<h4>Lesson 5 of 18<\/h4>\r\n<h3>Some institutions have a classification scheme you can apply to your data based on its sensitivity.<\/h3>\r\nSuch a classification scheme and associated guidance is an example of an administrative safeguard for the security of data because it establishes an organization's rules and practices and may prescribe technical and physical safeguards. Recommendations for appropriate data storage practices can then be made based on that institutional classification.\r\n\r\n&nbsp;\r\n\r\nFor example, the table below is based on the classification scheme used at the University of Edinburgh to provide guidance on data management.\r\n<h3><strong>Example Data Classification Scheme<sup>1<\/sup>:<\/strong><\/h3>\r\n<img class=\"wp-image-633 aligncenter\" src=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-300x188.png\" alt=\"\" width=\"1045\" height=\"655\" \/><sub>1. Adapted from \"Keeping research data safe,\" slide 3, in Research Data Service MANTRA [online course] at <a href=\"https:\/\/mantra.ed.ac.uk\/\" target=\"_blank\" rel=\"noopener\">https:\/\/mantra.ed.ac.uk\/<\/a>. Licensed\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\" target=\"_blank\" rel=\"noopener\">CC-BY 4.0<\/a>.<\/sub>\r\n\r\n&nbsp;\r\n<div class=\"textbox shaded\">\r\n<p style=\"text-align: center\">If your institution does not have a classification and associated guidance, or if you would like some additional insight, the Sensitive Data Expert Group of the Portage Network has created a risk matrix.<\/p>\r\n<p style=\"text-align: center\"><a href=\"https:\/\/doi.org\/10.5281\/zenodo.4088954\" target=\"_blank\" rel=\"noopener\"><strong>DOWNLOAD A COPY<\/strong><\/a><\/p>\r\n\r\n<\/div>\r\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/establish-protocols\/\">Next Lesson<\/a><\/h4>","rendered":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/administrative-safeguards\/\">Previous Lesson<\/a><\/h4>\n<h4>Lesson 5 of 18<\/h4>\n<h3>Some institutions have a classification scheme you can apply to your data based on its sensitivity.<\/h3>\n<p>Such a classification scheme and associated guidance is an example of an administrative safeguard for the security of data because it establishes an organization&#8217;s rules and practices and may prescribe technical and physical safeguards. Recommendations for appropriate data storage practices can then be made based on that institutional classification.<\/p>\n<p>&nbsp;<\/p>\n<p>For example, the table below is based on the classification scheme used at the University of Edinburgh to provide guidance on data management.<\/p>\n<h3><strong>Example Data Classification Scheme<sup>1<\/sup>:<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-633 aligncenter\" src=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-300x188.png\" alt=\"\" width=\"1045\" height=\"655\" srcset=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-300x188.png 300w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-768x480.png 768w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-1536x961.png 1536w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-65x41.png 65w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-225x141.png 225w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM-350x219.png 350w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/Screenshot-2026-02-04-at-1.46.08-AM.png 1554w\" sizes=\"auto, (max-width: 1045px) 100vw, 1045px\" \/><sub>1. Adapted from &#8220;Keeping research data safe,&#8221; slide 3, in Research Data Service MANTRA [online course] at <a href=\"https:\/\/mantra.ed.ac.uk\/\" target=\"_blank\" rel=\"noopener\">https:\/\/mantra.ed.ac.uk\/<\/a>. Licensed\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\" target=\"_blank\" rel=\"noopener\">CC-BY 4.0<\/a>.<\/sub><\/p>\n<p>&nbsp;<\/p>\n<div class=\"textbox shaded\">\n<p style=\"text-align: center\">If your institution does not have a classification and associated guidance, or if you would like some additional insight, the Sensitive Data Expert Group of the Portage Network has created a risk matrix.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/doi.org\/10.5281\/zenodo.4088954\" target=\"_blank\" rel=\"noopener\"><strong>DOWNLOAD A COPY<\/strong><\/a><\/p>\n<\/div>\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/establish-protocols\/\">Next Lesson<\/a><\/h4>\n","protected":false},"author":2543,"menu_order":5,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-258","chapter","type-chapter","status-publish","hentry"],"part":248,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/users\/2543"}],"version-history":[{"count":9,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/258\/revisions"}],"predecessor-version":[{"id":774,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/258\/revisions\/774"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/parts\/248"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/258\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/media?parent=258"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapter-type?post=258"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/contributor?post=258"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/license?post=258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}