Skip to content
U of T logo

Information Security

  • About
    • Meet the team
    • Strategy
  • Governance
    • Policies
    • Standards
    • Guidelines
    • Procedures
  • Resources
    • For students
    • For staff
    • For faculty
  • News & updates
  • Services
  • Programs

Experiencing phishing, fraud, or another security incident?

Report an incident
U of T logo

Information Security

  • About
    • Meet the team
    • Strategy
  • Governance
    • Policies
    • Standards
    • Guidelines
    • Procedures
  • Resources
    • For students
    • For staff
    • For faculty
  • News & updates
  • Services
  • Programs
Experiencing phishing, fraud, or another security incident?

Report an incident

U of T logo

Information Security

  • About
    • Meet the team
    • Strategy
  • Governance
    • Policies
    • Standards
    • Guidelines
    • Procedures
  • Resources
    • For students
    • For staff
    • For faculty
  • News & updates
  • Services
  • Programs

Experiencing phishing, fraud, or another security incident? Report an incident

Test page for gravity form

Home > Test page for gravity form

Test page for gravity form

Home > Test page for gravity form

Test page for gravity form

Home > Test page for gravity form

Data Classification Tool

Step 1 of 11

9%
Is your data regulated under an existing law or framework?(Required)
If you're not sure if your data is regulated by any of these laws, just select "No." This calculator will guide you to the correct classification based on the content of your data.
Select the choice below to learn what Texas A&M University classification level applies.
Do you have student data?(Required)
Student data is regulated under FERPA. Examples of student data include rosters, grades, any student-generated work and even a student's schedule.
Do you have health data?(Required)
Do you use, access, or collect health information for any individuals other than yourself?
Examples of protected health data are clinical data, personal health records, or any data regulated under HIPAA or HITECH.
Do you have research data?(Required)
Research data is defined as “the recorded factual material commonly accepted in the scientific community as necessary to validate research findings.” Research data does not include preliminary analyses, drafts of scientific papers, plans for future research, peer reviews or communications with colleagues.
My research data contains:
Do you have financial records?(Required)
Examples of data in this category are financial aid data; federal tax information, credit card numbers, or banking information (other than your own); financial and budget data for the university or a university its unit; or any other data that falls under GLBA.
Do you have data with sensitive personal information?(Required)
Sensitive personal information is defined by Texas Government Code §521.002; it can be government-issued ID numbers or documents (SSNs, passport or licenses numbers); electronic signatures or personal biometric information; financial account numbers; or any data that falls under GDPR.
Do you have controlled unclassified information?(Required)
This type of data requires special handling and processes. Examples include: export-controlled information (under EAR or ITAR); or data from a federal agency that is controlled unclassified information (CUI).
Do you have government classified or other similarly restricted data?(Required)
This type of data requires special handling and processes. Examples include: highly classified research; classified information relating to defense services; or information covered by an invention secrecy act.
Do you have data related to other university business?(Required)
Other types of university data are related to the administrative and business functions of the institution. This includes a wide variety of data with different levels of sensitivity.
I have data that contains:
Do you have data that doesn't fit in the categories above? Is it Public?(Required)
Public data is the category of data with the lowest sensitivity, and is openly available to the public, or available upon request without screening.
Examples include:
  • Data intended for distribution on a publically-accessible website
  • Public directory information for employees or departments
  • Directory information for students who have not requested a FERPA block
  • Intercollegiate sports information (team rosters, schedules, etc)
  • Research publications not under embargo
  • Official university communications and public announcements
I have data that falls into one of these categories.
These results are only a guide. If you have questions, please contact Technology Services at it-security@tamu.edu.

University-Internal

University-Internal data is information that may be accessed by eligible employees in the course of university business. This data may be releasable to the public upon request, but requires protection and evaluation to ensure lawful release. See security control DC-4.

Critical

Critical data can likely result in criminal or civil penalties if inappropriately handled. This is the highest level of classification for data, and use is limited to explicitly designated individuals with a stringent business requirement. See security control DC-6.
Defy Gravity campaign logo
  • Accessibility
  • Privacy
  • Site map
  • Website feedback form
  • Directory
  • Enterprise Service Centre (ESC)
  • Information Security resource hub
  • Information Security handbook

Statement of Land Acknowledgement

We wish to acknowledge this land on which the University of Toronto operates. For thousands of years it has been the traditional land of the Huron-Wendat, the Seneca, and the Mississaugas of the Credit. Today, this meeting place is still the home to many Indigenous people from across Turtle Island and we are grateful to have the opportunity to work on this land. Read about U of T’s Statement of Land Acknowledgement.

Page load link
Go to Top