You have successfully completed Step 3 !
What you have accomplished so far:
Your completed Step 1 defines your Security Perimeter.
Your completed step 2 establishes the Business Impact.
Your completed step 3 establishes the Threat Assessment
Our Security Team continues to analyze the data.
What's Next?
Step 3A is Information Asset Identification and Classification. In this step (takes 1-2 minutes) you will be asked if you handle certain types of data (Yes or No Questions).
You will be using the following criteria:
Classifying the information you store and transmit
HIGHLY CONFIDENTIAL - Health information, SSN, Payment card numbers, Financial Account numbers, Driver's license
RESTRICTED - Personnel records, benefits, salaries, non-public policies, cash records, budgetary plans, employee ID numbers, HR documents, client/customer address and phone numbers
PUBLIC - Information freely available to anyone - product brochures and information, public policies, marketing materials, info sheets.
Your completed Step 1 defines your Security Perimeter.
Your completed step 2 establishes the Business Impact.
Your completed step 3 establishes the Threat Assessment
Our Security Team continues to analyze the data.
What's Next?
Step 3A is Information Asset Identification and Classification. In this step (takes 1-2 minutes) you will be asked if you handle certain types of data (Yes or No Questions).
You will be using the following criteria:
Classifying the information you store and transmit
HIGHLY CONFIDENTIAL - Health information, SSN, Payment card numbers, Financial Account numbers, Driver's license
RESTRICTED - Personnel records, benefits, salaries, non-public policies, cash records, budgetary plans, employee ID numbers, HR documents, client/customer address and phone numbers
PUBLIC - Information freely available to anyone - product brochures and information, public policies, marketing materials, info sheets.