GROUP INFORMATION TECHNOLOGY DEPARTMENT

 

 

ASSET CLASSIFICATION AND MANAGEMENT
 POLICY & PROCEDURES

 

 

 

 

 

 

 

Policy Reference [GITD_IT013]


Table of Contents

DOCUMENT VERSION & CHANGE CONTROL. 4

1.     Policy Purpose and Scope. 5

2      Policy Statement. 5

3      Accountability for Assets. 6

3.1       Inventory of Assets. 6

4      Information Classification. 7

4.1       Information Classification Guidelines. 7

Definition of Information: 7

4.2       Information Classification Scheme. 9

4.3       “Need-to-Know” Principle. 12

4.4       Information Labelling.. 13

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

THIS PAGE IS INTENTIONALLY LEFT BLANK

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

DOCUMENT VERSION & CHANGE CONTROL

 

Version History

Issue Date

Version

Description

Prepared  By

Approved By

Jun 12, 2019

1.0

Asset Classification and Management

Mrs. Sudha Jacob

“ITIL Administrator”

Mr. Winston Ellison
“Group CIO”

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Change History

Issue Date

Version

Description

Prepared By

Approved By

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1.   Policy Purpose and Scope

1.1      This policy defines the requirements for asset classification and controls.

1.2     To establish a process for classifying and handling IT assets based on its level of sensitivity, value and criticality to Al Babtain Group.

1.3      An asset is defined as any item of value owned or controlled by Al Babtain Group. This includes both logical assets; such as intellectual property and data, or physical assets; such as hardware and equipment.

1.4      This policy applies to all employees and non-employees associated with Al Babtain Group.

 

2       Policy Statement

2.1      All Al Babtain Group IT assets must be accounted for and controlled in a proper manner.

2.2      These assets are crucial to Al Babtain Business success, and must be protected by the proper controls to minimize any risk to data integrity, disruption of services, or disclosure of proprietary information.

2.3      All information, both electronic and hard copy must be classified according to the definitions described with the standards in this policy. The classification of information provides a level of criticality, sensitivity, and protection standards. It also provides the basis for the level of control needed to protect the information and/or system.

 

 

 

 

3       Accountability for Assets

3.1      Inventory of Assets

·                              Owners must be identified for all major assets, including physical assets, information assets, and software. Examples of these types of asset groups are:

a)    Physical assets, e.g., computer equipment and peripherals, communication equipment, storage media;

b)    Software, e.g., operating systems, application software, development tools and utilities;

c)    Information assets, e.g., database and data files, test data, backup data, operational procedures, user manuals, system documentation, system configuration, contracts.

 

·                              A data repository catalogue of all physical assets owned by Al Babtain Group must be created and maintained. This catalogue must be reviewed and updated annually. The catalogue must contain information such as asset type, physical location (if applicable), owner/responsible party, and criticality. All business users must assist in maintaining this catalogue, and communicate any changes or additions.

·                              A data repository catalogue of all software owned by Al Babtain Group must be created and maintained. This catalogue must be reviewed and updated annually. The catalogue must contain information such as software type, vendor/developer, logical locations/associated applications or systems, physical location (if applicable), owner/responsible party, custodial responsibilities, and information classification. Business Unit Managers must assist in maintaining this catalogue, and communicate any changes or additions.

 

·                              A data repository catalogue of all information assets must be created and maintained. This catalogue must be reviewed and updated annually. The catalogue must contain information such as high-level description, data type, logical locations/associated applications or systems, physical location (if applicable), data owner, custodial responsibilities, and information classification. Information Users and Information Owners must assist in maintaining this catalogue and communicate any changes or additions.

·                              During user station/workspace location changes or facility changes, all applicable asset inventory control documentation must be updated to reflect the changes made.

·                              In case of loss or destruction of any assets due to negligence or willful misconduct the reimbursement will be made in accordance to the company law.

 

4       Information Classification

4.1      Information Classification Guidelines

Definition of Information:

Any collection of data that is processed, analyzed, interpreted, organized, classified or communicated in order to serve a useful purpose, present facts or represent knowledge in any medium or form.  This includes presentation in electronic (digital), print, audio, video, image, graphical, textual of numerical form.

 

·                              In order to properly protect information assets, all Al Babtain Group information must be classified into one of the four categories as defined in Classification Scheme section.

·                              By classifying data, business units can determine the appropriate resources needed to protect information as well as the level of protection needed. The objective is to dedicate greater resources to the information that needs the greatest amount of protection and minimize the impact on the business process.

·                              Holders of information must ensure intended recipients of that information have the “need-to-know” before granting access rights to the information. The “need-to-know” principle must be equated to a justifiable business case. If the user needs access to the information to fulfill a business need, then that user can be given access.

·                              Al Babtain Group information in any format must be protected by all employees, contractors, and vendors at the level adequate with its value as determined by its information classification. These standards mitigate the risk that information of different classification levels is inadvertently combined or released. With all information classified correctly, proper controls can be established to manage the distribution of the information.

·                              Information must not be downgraded to a lower classification without undergoing a formal de-classification study performed by the Information Owner. The Information Owner must determine if any information can be moved to a lower classification based upon the definitions of the classifications. Otherwise, Information Owners must determine if an information asset’s classification should be raised based upon the definitions. It is the Information Owner’s responsibility to monitor information assets, and therefore, continuously review the information’s classification.

 

 

 

 

 

4.2      Information Classification Scheme

The purpose of classification is to protect information.  Higher classification accords different levels of protection based on the expected damage the information might cause in the wrong hands.

4.2.1     Information Class “PUBLIC

·                              “PUBLIC” information is considered to have value, but there is no risk of unauthorized disclosure.  Some level of control is required to prevent unauthorized modification or destruction of the information.

·                              “PUBLIC” information could be made public without any implications for Al Babtain Group (i.e., the data is not confidential). It would not provide a business or competitive advantage and is routinely made available to interested members of the general public. This type of information is available to the public with no special restrictions.

·                              Data integrity is of higher concern than confidentiality and availability. The appropriate Information System Owner must authorize replication or copying of the information in order to ensure it remains accurate and updated. It would include information such as marketing brochures, advertising media, annual reports, certain public information services, and the public Internet websites.

 

4.2.2     Information Class “INTERNAL

·                              “INTERNAL” data is important but not crucial to business operations. This type of data is mainly used internally within Al Babtain Group.

·                              External access and distribution of this data is to be controlled. If this data is inadvertently disclosed to the public, the consequences are not critical. Data confidentiality is not important internally; however, data integrity and availability are important but not vital. Internally used data that needs only minimal protection could be categorized in this class. Often internal information is used in making decisions and therefore it is important that this information remain timely and accurate.

·                              By default all information assets that are not explicitly classified as confidential or public information should be treated as Internal information

 

 

Examples of this type of data are telephone books, policy and procedure documents, certain blank forms, project plans and timelines, and information published through the intranet services.

 

 

 

4.2.3     Information Class “CONFIDENTIAL

·                              “CONFIDENTIAL” data is sensitive to internal and external exposure. Data in this class is confidential within Al Babtain Group, and internal access is allowed selectively. restricted to authorized personnel only.

·                              External access and distribution of this data is to be tightly controlled. Data meeting this classification level should be secured at all times. Access to this data must be explicitly and expressly authorized by appropriate personnel, only after a valid business need requiring access is proven.

·                              This type of data is primarily production data used in the day-to-day operations, and stored centrally in a secure environment. Data integrity and availability are vital. The owners of this type of data are responsible for maintaining and ensuring the accuracy and timeliness of the information.

Examples of this type of data include, but are not limited to, general ledger data, accounts payable data and staff payroll details.

 

4.2.4     Information Class “SECRET

·                              “SECRET” data is the most highly sensitive data and of great value to  Al Babtain Group.

·                              This type of data is crucial to the business continuity of Al Babtain Group, and Executive Management would typically be the owner of this information. Internal access to this data is restricted to a limited number of personnel in their appropriate area of responsibility, External access and distribution of this data is to be strictly controlled.

·                              Data meeting this classification level should be secured at all times. Access to this data must be explicitly and expressly authorized by appropriate personnel. After a valid business need requiring access is proven, very strict rules must be adhered to in the usage of this data. If such data were to be accessed by unauthorized persons, it could have the highest impact in terms of financial loss, and competitive position in the marketplace.

·                              The availability of this type of data is important; however, confidentiality and integrity are of higher concern than availability. Examples of this type of data include financial data, business continuity information, merger & acquisition data, Executive Information data, certain legal and contractual data, and information on strategic direction and initiatives.

 

4.3      “Need-to-Know” Principle

·                              Access to information must be on a “need-to-know” basis, i.e., access is restricted to authorized individuals whose duties require such access and justifiable by a business case. Individuals are not entitled to access information merely because of status, rank, or office. If a person or a group “need-to-know” the information due to a justifiable business reason (therefore becoming an Information User), then the information access can be granted by the Information Owner, and the Information User must treat the information according to its Information Classification as defined by the Information Owner.

 

 

 

 

4.4      Information Labelling

·                              All media containing Al Babtain Group information must be labelled with its information classification. Media of different classifications should be stored in separate containers or drawers to insure that accidental mixing of information from different classifications is prevented.

·                              All “SECRET” and “CONFIDENTIAL” documents must have a cover page identifying the classification of the information.

·                              All “SECRET” documents must be marked at the top or bottom of every page with the classification of the information contained in the document.

·                              Hard-copy documents must be stamped with the classification on every page.

 

P.S. The mentioned procedures are built on standard practice and can be changed upon business and technology environment. And/or IT new frameworks, new roles & responsibilities across IT resources and business owners demand. 

 

 

 

 

END OF DOCUMENT