• Trust Center
  • English
    • Deutsch
  • Trust Center
  • English
    • Deutsch
Expand All Collapse All
  • Trust Center
    • Supported Clients
    • Authentication & Single Sign On
    • Communication & Network Security
      • Network Diagram
      • Traffic Encryption
      • DDoS Prevention
      • Domains Whitelisting
    • Infrastructure Services
      • Microsoft Teams
      • Microsoft Azure
      • Microsoft Azure Data
      • Microsoft Azure DevOps
      • Google analytics tracing pixel
    • Microsoft Graph Permissions
      • Admin-Restricted Permissions
      • Required Permissions
    • Data Management Practices
      • Application Data
      • Metadata Collection
      • Usage Data
      • Support Data
      • Error Reporting Data
      • Data Residency
    • Secure Development
      • Secure Development Principles
      • Microsoft Azure Best Practices
      • Standard JavaScript Style
      • ESLint Security
      • NPM Audit
      • Code Review
      • Deployment Process
      • Product Development Cycle
    • Privacy & Compliance
    • Security Policy
    • Classification Labels
  • Architecture & Security
    • Teams Manager
    • External User Manager
    • MindMap
    • File Manager
    • Intranet
    • Hyperlinks
    • PnP Package

Classification Labels

269 views 1

To get their work done, Solutions2Share employees collaborate with others both inside and outside the organization. That means content travels everywhere, and when it does, we want it to do so in a safe, secure way that meets our company’s business and compliance policies.

Here is the list of classification labels we’re using, from the least to the most sensitive:

LevelLabelDescription & Examples
5PUBLICaccessible for all
4EXTERNALnot in-house but collaborating
3INTERNALin-house
2CLIENT CONFIDENTIALnot disclose confidential information about a client to a third party.
1COMPANY CONFIDENTIALnot disclose confidential information about a company to a third party.

Public

  1. Information that is not confidential and can be disclosed without material consequences.
  2. Loss of availability due to system failures is an acceptable risk.
  3. Integrity is important but not vital.
  4. Material that can be publicly accessed by any anonymous user (without authentication).

External

  1. Information that is not confidential and can be shared externally without any material implications.
  2. Loss of availability due to system downtime is an acceptable risk.
  3. Integrity is important but not vital.
  4. Material that can be accessed by external non-employee users, such as partners or subcontractors (with authentication), to the exclusion of customers.

Internal

  1. Information is restricted to approved internal access and protected from external access.
  2. Unauthorized access could influence our operational effectiveness, cause a significant financial loss, provide a significant advantage to a competitor or cause a significant reduction in customer confidence.
  3. Information integrity is vital.
  4. Material that can be accessed by any employee (authenticated).

Client Confidential

  1. Information received from clients in any form for holding or processing by ourselves.
  2. The original copy of such information must not be changed in any way without written permission from the client.
  3. The highest possible levels of integrity, confidentiality and availability are vital.
  4. Material accessible only to specific employees (authenticated).

Company Confidential

  1. Information we collect and use in the course of our business to hire employees, enter and fulfill customer orders, and manage all aspects of corporate finance.
  2. Access to this information is highly restricted within our organization.
  3. The highest possible level of integrity, confidentiality and availability is essential.
  4. Material accessible only to specific employees (authenticated).

Was this helpful?

1 Yes  No

Didn't find your answer? Contact Us

Previously
Security Policy
Up Next
Architecture & Security
  • Privacy Policy
  • Imprint
  • Copyright 2023 Solutions2Share GmbH. All Rights Reserved.

Popular Search:Teams Manager, External User Manager