Your organization has data scattered across shared drives, cloud buckets, email inboxes, Slack channels, personal devices, and that one spreadsheet someone emailed to themselves two years ago. Some of it is public marketing material. Some of it contains every customer’s Social Security number. Right now, both piles are sitting behind the same controls — which means you’re either spending too much protecting press releases or too little protecting the crown jewels. Probably both.

Classification fixes this. Not by adding bureaucracy, but by forcing the question: what actually matters, and what happens if it walks out the door?

DO / DON’T

DO:

DON’T:

Building Your Classification Scheme

Step 1: Define Your Levels

Keep it simple. Four levels work for most organizations. Three is fine for smaller ones. Every level you add reduces the chance people will actually use them correctly.

A standard four-tier scheme:

Write a one-sentence description of each level that anyone in your organization can understand. If the description requires a legal dictionary, rewrite it.

Step 2: Assign Data Owners

Every data category needs a named owner. Not “the engineering team” — a specific person who is accountable for classification decisions about that data.

Data owners don’t implement controls. They decide the classification and are answerable when their data ends up somewhere it shouldn’t be. The IT team (data custodians) implements the technical controls. Make this distinction clear in your policy, or nobody will know who’s responsible for what — which means nobody is responsible for anything.

Step 3: Create Labeling Standards

Labels should be visible and consistent. Every document, file, database, and system should carry its classification.

For documents: Header and footer on every page. “CONFIDENTIAL” or “RESTRICTED” in red. Use document templates that include the label by default — don’t rely on people remembering to add it.

For emails: Subject line prefix or classification banner. Microsoft 365 and Google Workspace both support sensitivity labels that can be applied automatically or by the sender. CISA recommends marking sensitive communications clearly to prevent accidental disclosure.

For files and folders: Naming conventions that include classification. Metadata tags. Folder structures that separate classification levels. A “Restricted” file should not live in the same share as “Public” files.

For databases and systems: System-level classification. If a database contains any Restricted data, the entire system inherits the Restricted classification and its handling requirements.

Step 4: Define Handling Requirements

Each classification level needs a clear set of rules covering storage, transmission, access, and disposal.

Public:

Internal:

Confidential:

Restricted:

Step 5: Implement DLP Controls

Classification without enforcement is a suggestion. Deploy Data Loss Prevention tools that enforce your handling requirements automatically.

Start with the highest-risk scenarios:

Microsoft Purview, Google DLP, Symantec DLP, and open-source options like OpenDLP can scan for sensitive data patterns and enforce policies. The tool matters less than having one. Any DLP is better than no DLP.

Step 6: Train Your People

The most elegant classification scheme fails if the people creating and handling data don’t understand it. Training should cover:

Run this training annually. Make it part of onboarding. Keep it under 30 minutes. If it takes longer, your scheme is too complicated.

If It Already Happened

If you’ve discovered unclassified sensitive data in an unprotected location:

Making It Stick

Classification programs fail for three reasons: too many levels, no enforcement, and no executive support. Keep the levels simple. Deploy DLP. Get a C-suite sponsor who will hold data owners accountable. Review and update annually.

The goal isn’t perfection. It’s knowing the difference between your press releases and your crown jewels — and treating them accordingly. Start with your most sensitive data. Get that classified and protected. Then work outward. One category at a time, one data owner at a time.

Here’s your first step: identify the three most sensitive data types in your organization. Assign an owner to each. Define their classification and handling requirements. Do it this week. Everything else builds from there.