{"id":11745,"date":"2023-02-09T13:18:11","date_gmt":"2023-02-09T13:18:11","guid":{"rendered":"https:\/\/www.dionach.com\/?p=11745"},"modified":"2025-01-14T13:27:57","modified_gmt":"2025-01-14T13:27:57","slug":"how-to-classify-sensitive-data-within-your-organisation-part-1","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/","title":{"rendered":"How to Classify Sensitive Data within Your Organisation (1\/2)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11745\" class=\"elementor elementor-11745\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e1fbb84 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e1fbb84\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10832379\" data-id=\"10832379\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3005586a elementor-widget elementor-widget-text-editor\" data-id=\"3005586a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A crucial first step towards ensuring your data is secure is to identify and classify your information assets. Without considering these tasks you will neither know where your assets are nor how to keep them secure. Information<\/p>\n<p>\u00b7 which assets are more valuable than others<\/p>\n<p>\u00b7 which assets require additional security controls<\/p>\n<p>Failure to classify data can result in inefficient and costly effort by attempting to secure all assets by assuming that sensitive data is spread across the organisation in both local and cloud or shared storage. This results in some assets being protected excessively and others protected insufficiently.<\/p>\n<p>A mature asset identification and classification process allows an organisation to:<\/p>\n<p>\u00b7 locate and categorise its assets<\/p>\n<p>\u00b7 select appropriate security controls for each asset<\/p>\n<p>An inventory of assets including location and ownership are essential steps in your information security asset management program. Locating data has become difficult due to proliferation throughout the organisation on local and cloud-based storage and also the requirement to work from anywhere. Mapping where your data resides is a challenging but necessary task.<\/p>\n<p>The key drivers for asset identification and classifications are often legislation and regulations. Below are some common regulations and guidelines that formalise the classification and categorisation of information assets.<\/p>\n<p>\u00b7 Canada: Security of Information Act<\/p>\n<p>\u00b7 European Union (EU): General Data Protection Regulation (GDPR)<\/p>\n<p>\u00b7 United Kingdom: Official Secrets Acts (OSA)<\/p>\n<p>\u00b7 United States: NIST Federal Information Processing Standard 199, \u201cStandards for Security Categorisation of Federal Information and Information Systems\u201d<\/p>\n<p>\u00b7 United States: NIST Special Publication (SP) 800-60, \u201cGuide for Mapping Types of Information and Information Systems to Security Categories\u201d (this is considered the \u201chow-to\u201d manual for FIPS 199)<\/p>\n<p>In this, the first part of a two-part blog, we will look at the different types of data classification and discuss some examples of data classification schemes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a90c7 elementor-widget elementor-widget-heading\" data-id=\"d5a90c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Classification<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8721eb8 elementor-widget elementor-widget-text-editor\" data-id=\"8721eb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data classification is the process of organising data into categories or groups according to the sensitivity, criticality, or value of the data. It helps determine the security controls required to protect and manage the confidentiality, integrity, and availability (CIA) of your data and is a cornerstone of data security and risk management. Data classification is often required to maintain compliance with legal and\/or regulatory requirements.<\/p><p>There are three main types of data classification:<\/p><p>\u00b7 <strong>Context-based:<\/strong> Metadata such as ownership or location is used to derive values that can indicate the criticality or sensitivity of the data.<\/p><p>\u00b7 <strong>Content-based:<\/strong> Contents of files are inspected to identify sensitive data rather than inferring it from the metadata. Compliance regimes such as PCI involve content-based classification as the classification is derived from the information itself.<\/p><p>\u00b7 <strong>User-based:<\/strong> The manual assignment of data classification based on users\u2019 knowledge of the data and the classification scheme your organisation uses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-955bcea elementor-widget elementor-widget-heading\" data-id=\"955bcea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Classification Scheme Examples<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-490f29c elementor-widget elementor-widget-text-editor\" data-id=\"490f29c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00b7 <strong>Confidential:<\/strong> Usually considered the highest level of classification outside of government or military organisations. The loss or theft of this data can cause serious risk to the organisation. This category of data is usually subject to regulation or controlled by contractual agreement.<\/p><p>\u00b7 <strong>Sensitive:<\/strong> A level of value less than confidential but still important to protect. Losing the data will raise the risk to the organisation, even if it is just reputational damage. Strategy documents or interorganisational correspondence can be considered sensitive.<\/p><p>\u00b7 <strong>Private:<\/strong> Data that might not do the organisation damage but must be kept private for other reasons. Employee retention statistics or salary ranges are often classified as private.<\/p><p>\u00b7 <strong>Proprietary:<\/strong> Data that is released outside the organisation on a restricted basis or contains information that could reduce the organisation&#8217;s competitive advantage, e.g. new product specifications.<\/p><p>\u00b7 <strong>Public:<\/strong> Data that if lost would have little or no impact to the organisation. A briefing on proper anti-phishing techniques that does not disclose specific results may be considered public information and is suitable for sharing outside the organisation.<\/p><p>A data classification policy should be in place to allow your organisation to start designing the required security controls for the most effective &amp; efficient protection of the information. Without properly classifying your data you are at risk of insufficiently protecting your critical data or conversely over-protecting your non-critical data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9443bec elementor-widget elementor-widget-heading\" data-id=\"9443bec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data Categorisation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-962d5b0 elementor-widget elementor-widget-text-editor\" data-id=\"962d5b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data categorisation is often confused with data classification which is a closely related but different technique. Data categorisation is the process of grouping together types of data with comparable sensitivity labels. NIST SP 800-60 states, \u201cInformation is categorized according to its information type. An information type is a specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, security management) defined by an organisation or, in some instances, by a specific law, Executive Order, directive, policy, or regulation.\u201d<\/p><p>Categorising data into similar groups of will help your organisation to apply similar security controls to information assets with similar levels of sensitivity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9dbb7d elementor-widget elementor-widget-heading\" data-id=\"b9dbb7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Summary<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9864a62 elementor-widget elementor-widget-text-editor\" data-id=\"9864a62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data classification helps organisations prioritise their data protection efforts to improve data security and achieve regulatory compliance. Data classification also helps to reduce costs and boost productivity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A crucial first step towards ensuring your data is secure is to identify and classify your information assets. Without considering these tasks you will neither know where your assets are nor how to keep them secure. Information \u00b7 which assets are more valuable than others \u00b7 which assets require additional security controls Failure to classify [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":11754,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Classify Sensitive Data within Your Organisation (1\/2)<\/title>\n<meta name=\"description\" content=\"A crucial first step towards ensuring your data is secure is to identify and classify your information assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Classify Sensitive Data within Your Organisation (1\/2)\" \/>\n<meta property=\"og:description\" content=\"A crucial first step towards ensuring your data is secure is to identify and classify your information assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-09T13:18:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-14T13:27:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"634\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach by Nomios\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach by Nomios\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/\"},\"author\":{\"name\":\"Dionach by Nomios\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9\"},\"headline\":\"How to Classify Sensitive Data within Your Organisation (1\/2)\",\"datePublished\":\"2023-02-09T13:18:11+00:00\",\"dateModified\":\"2025-01-14T13:27:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/\"},\"wordCount\":816,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1\",\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/\",\"url\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/\",\"name\":\"How to Classify Sensitive Data within Your Organisation (1\/2)\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1\",\"datePublished\":\"2023-02-09T13:18:11+00:00\",\"dateModified\":\"2025-01-14T13:27:57+00:00\",\"description\":\"A crucial first step towards ensuring your data is secure is to identify and classify your information assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1\",\"width\":1100,\"height\":634},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Classify Sensitive Data within Your Organisation (1\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/nl\/#website\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/nl\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9\",\"name\":\"Dionach by Nomios\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"caption\":\"Dionach by Nomios\"},\"sameAs\":[\"http:\/\/Dionach\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Classify Sensitive Data within Your Organisation (1\/2)","description":"A crucial first step towards ensuring your data is secure is to identify and classify your information assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/","og_locale":"nl_NL","og_type":"article","og_title":"How to Classify Sensitive Data within Your Organisation (1\/2)","og_description":"A crucial first step towards ensuring your data is secure is to identify and classify your information assets.","og_url":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2023-02-09T13:18:11+00:00","article_modified_time":"2025-01-14T13:27:57+00:00","og_image":[{"width":1100,"height":634,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1","type":"image\/jpeg"}],"author":"Dionach by Nomios","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach by Nomios","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/"},"author":{"name":"Dionach by Nomios","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9"},"headline":"How to Classify Sensitive Data within Your Organisation (1\/2)","datePublished":"2023-02-09T13:18:11+00:00","dateModified":"2025-01-14T13:27:57+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/"},"wordCount":816,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1","articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/","url":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/","name":"How to Classify Sensitive Data within Your Organisation (1\/2)","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1","datePublished":"2023-02-09T13:18:11+00:00","dateModified":"2025-01-14T13:27:57+00:00","description":"A crucial first step towards ensuring your data is secure is to identify and classify your information assets.","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1","width":1100,"height":634},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/how-to-classify-sensitive-data-within-your-organisation-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"How to Classify Sensitive Data within Your Organisation (1\/2)"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9","name":"Dionach by Nomios","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","caption":"Dionach by Nomios"},"sameAs":["http:\/\/Dionach"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/sensitive-data-GDPR.jpg?fit=1100%2C634&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-33r","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/11745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=11745"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/11745\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/11754"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=11745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=11745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=11745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}