Data Classification

Unrestricted/Public Information

Information that may be disclosed to the general public without harm.

Examples: public phone directory, course catalogs, public research findings, enrollment figures, public websites, general benefits information, press releases, newsletters, etc.

Sensitive Information

Sensitive information is information that should be kept confidential. Access to this information shall require authorization and legitimate need-to-know. Privacy may be required by law or contract.

Sensitive information includes, but is not limited to non-directory information covered by the Family Educational Rights and Privacy Act (FERPA), budgetary plans, proprietary business plans, patent pending information, any other information whose privacy is protected by law, etc.

Restricted Information

Restricted information includes, but is not limited to: social security numbers, medical information, biometric, financial information, government-issued identification information, and access information including user name or email address in combination with a password or security question and answer, or security code, access code, expiration information or PIN that would permit access to an online account that is reasonably likely to contain or is used to obtain restricted information.

Need help finding restricted information on your machine or in your mailbox? Spirion is a software package that searches data stored on your machine. With Spirion, UA faculty and staff can proactively find restricted data on their University-owned machines.

Laws and Policies

Laws and regulations include, but are not limited to:

  • Alabama Data Breach Notification Act of 2018 and other applicable breach notification laws
  • Family Educational Rights and Privacy Act (FERPA)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Health Information Technology for Economic and Clinical Health (HITECH)
  • Gramm-Leach-Bliley Act (GLB Act or GLBA)
  • Payment Card Industry Data Security Standards (PCI DSS)
  • Federal Information Security Management Act (FISMA)
  • General Data Protection Regulation (GDPR) and other international privacy laws and regulations

University Policy

Visit the UA Policy website to view the Information Classification Policy in its entirety. OIT Security maintains an Information Protection Procedure to support the policy. If you access sensitive or restricted information for your job duties at UA, you should only use University equipment. Personal computers should not be used to access sensitive or restricted information.


Looking for a secure storage solution?

Consider OneDrive or Box to store information in a secure cloud environment! View our document management matrix below to see secure storage options.

Document Management Matrix

Available ServicesUnrestricted/Public InformationSensitive InformationRestricted Information
Blackboard LearnYesYesYes
UA BoxYesYesYes
UA EmailYesCautionCaution
Microsoft FormsYesCautionCaution
OnBaseYesCautionCaution
UA OneDriveYesYesYes
UA QualtricsYesYesCaution
Removable Media (USB, CD, etc.)YesYesYes
UA Shared Network DriveYesYesNo
UA SharePointYesCautionNo
TeamsYesYesCaution

Data Examples

Unrestricted/Public Information

  • Public directory
  • Course catalogs
  • Public research findings
  • Public websites
  • Policies

Sensitive Information

  • FERPA data
  • Budgetary plans
  • Business plans
  • Patent-pending information
  • Information protected by law

Restricted Information

  • Social Security Numbers
  • Medical information (PHI)
  • Financial information
  • Biometric data
  • Government identification

For guidance on using Microsoft Forms with sensitive data, click here.

Passwords should always be stored in Keeper.