Data Classification Protection Levels:
Impact of loss of confidentiality or integrity
UC and campus policies establishe that Institutional Information and IT Resources must be protected according to their Protection Level and Availability Level classifications. Summary definitions and key examples of each Protection Level are included below. Full definitions and additional examples are available in the Protection Level Classification Table within the Data Classification Standard. Additionally, a printable copy of the chart below is available for download.
Protection Level: |
Summary Definition: |
Key Examples: |
|---|---|---|
![]() |
Information and IT Resources requiring the highest level of confidentiality or integrity, including Notice-Triggering data and "Shared-Fate" data and systems. |
|
![]() |
Information and IT Resources whose unauthorized use, access, disclosure, modification, loss or deletion could result in moderate harm or damage. |
|
![]() |
Institutional Information and IT Resources that are generally not intended for public use or access and may only be accessed on a need-to-know basis. |
|
![]() |
Information intended for public access, but whose integrity is important. |
|



