KEMBAR78
Data Protection and Retention Policy | PDF | Information Security | Regulatory Compliance
0% found this document useful (0 votes)
49 views23 pages

Data Protection and Retention Policy

The Data Classification, Protection & Retention Policy establishes a framework for the classification, protection, and retention of information assets at [ORG NAME], ensuring compliance with regulatory obligations and promoting accountability among data handlers. It applies to all employees and data types, outlining roles, responsibilities, and specific data protection requirements based on classification levels. The policy aims to minimize risks associated with data mismanagement and enhance operational efficiency through structured data lifecycle management practices.

Uploaded by

rod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views23 pages

Data Protection and Retention Policy

The Data Classification, Protection & Retention Policy establishes a framework for the classification, protection, and retention of information assets at [ORG NAME], ensuring compliance with regulatory obligations and promoting accountability among data handlers. It applies to all employees and data types, outlining roles, responsibilities, and specific data protection requirements based on classification levels. The policy aims to minimize risks associated with data mismanagement and enhance operational efficiency through structured data lifecycle management practices.

Uploaded by

rod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Document Name Data Classification, Protection & Retention Policy

Classification Internal Use Only

Document Management Information

Document Title: Data Classification, Protection & Retention Policy

Document Number: ORGANISATION-DAT-CPR-POL

Document Internal Use Only


Classification:

Document Status: Approved

Issue Details
Release Date DD-MM-YYYY

Revision Details
Version
Revision Date Particulars Approved by
No.

<Provide details of
<Provide name of
1.0 DD-MM-YYYY changes made on policy
Approver here>
here>

Document Contact Details


Role Name Designation

<Provide name of author <Provide designation of author


Author
here> here>

Reviewer/ <Provide name of reviewer <Provide designation of reviewer


Custodian here> here>

<Provide name of owner <Provide designation of owner


Owner
here> here>

Distribution List
Name

Need Based Circulation Only


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

CONTENTS

1. PURPOSE ............................................................................................................................................................... 4
2. SCOPE ...................................................................................................................................................................... 4
3. TERMS AND DEFINITIONS .......................................................................................................................... 5
4. ROLES AND RESPONSIBILITIES ..............................................................................................................6
5. DATA CLASSIFICATION GUIDELINES .................................................................................................. 7
6. DATA PROTECTION REQUIREMENTS................................................................................................ 10
7. DATA HANDLING AND LABELING STANDARDS........................................................................ 12
8. DATA RETENTION AND DISPOSAL ..................................................................................................... 14
9. DATA OWNERSHIP AND REVIEW ....................................................................................................... 16
10. ENFORCEMENT ............................................................................................................................................... 18
11. POLICY EXCEPTIONS .................................................................................................................................... 19
12. ESCALATION MATRIX .................................................................................................................................. 21
13. POLICY REVIEW AND MAINTENANCE ............................................................................................ 22
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

1. PURPOSE
The purpose of this policy is to establish a consistent framework for the classification,
protection, and retention of information assets across [ORG NAME] in order to:

• Ensure that data is appropriately secured based on its sensitivity, regulatory


obligations, and business value

• Prevent unauthorized access, disclosure, alteration, or destruction of information

• Comply with requirements under ISO/IEC 27001:2022, SOC 2 Type 2, and


applicable data protection regulations (e.g., GDPR, DPDP Act)

• Support operational efficiency and reduce risks associated with data


mismanagement, over-retention, or non-compliance

• Promote accountability among data owners, custodians, and users by defining


clear data handling responsibilities

This policy also aims to align data lifecycle management practices—including


classification, labelling, protection, and disposal—with the organization’s overall
information security management system (ISMS) and privacy frameworks.

2. SCOPE
This policy applies to all data and information assets created, received, processed,
stored, transmitted, or managed by [ORG NAME], irrespective of format or location.

2.1 Covered Entities


This policy applies to:

• All employees, contractors, interns, and third-party service providers

• All departments and business units within [ORG NAME]

• All users of [ORG NAME]’s systems and services who handle or access
organizational data

2.2 Covered Data Types


The policy covers, but is not limited to:

• Structured data (e.g., databases, spreadsheets, CRM records)

• Unstructured data (e.g., emails, documents, presentations, PDFs)

• Multimedia data (e.g., recordings, images, videos, CCTV footage)

• Machine-generated data (e.g., logs, telemetry, audit trails)

• Personal and sensitive personal data (as per applicable privacy laws)

• Intellectual property, trade secrets, and proprietary business information


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

2.3 Covered Environments


This policy applies across all platforms and data environments used by [ORG NAME],
including:

• On-premises servers and infrastructure

• Cloud-based storage, applications, and SaaS platforms

• Mobile devices, portable storage, laptops, and desktops

• Third-party or outsourced systems where data is processed on behalf of [ORG


NAME]

• Backup systems and disaster recovery environments

3. TERMS AND DEFINITIONS


Term Definition

Any data, document, or digital object that has value to [ORG


Information Asset NAME], including systems, databases, and files that store or
transmit information.

Data The process of categorizing data based on its sensitivity, criticality,


Classification and regulatory or contractual obligations.

The individual or role responsible for determining the


Data Owner classification, access rights, retention period, and protection
requirements of data.

The individual responsible for implementing and maintaining


Data Steward data classification and protection practices in collaboration with
the data owner.

Ensuring that data is accessible only to those authorized to have


Confidentiality
access.

Ensuring the accuracy and completeness of data and preventing


Integrity
unauthorized modification.

Ensuring data is accessible and usable upon demand by


Availability
authorized users.

The length of time that data is kept in an accessible and usable


Retention
form before it is archived or deleted.
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

Term Definition

Technical and organizational safeguards to secure data


Data Protection throughout its lifecycle, including access control, encryption, and
monitoring.

The process of tagging data with its classification level, either


Labelling manually or automatically, for appropriate handling and access
control.

The permanent destruction or anonymization of data at the end


Disposal
of its retention period using secure methods.

Any information that can directly or indirectly identify an


Personal Data
individual (e.g., name, email, ID number, IP address).

Sensitive Personal Special categories of personal data requiring enhanced


Data protection (e.g., financial data, health records, biometrics).

Data whose compromise could severely impact operations,


Critical Data
reputation, legal compliance, or customer trust.

4. ROLES AND RESPONSIBILITIES


Role Responsibilities

- Approve classification and retention policies


- Provide strategic oversight and risk
Board of Directors / Executive
governance
Management
- Ensure resource allocation and compliance
posture

- Advise on privacy-related classification and


retention
Data Protection Officer (DPO) /
- Oversee personal and sensitive data handling
CPO
- Respond to regulatory and data subject
requests

- Define and enforce security controls per


classification level
Chief Information Security Officer
- Conduct risk assessments and incident
(CISO)
response
- Support ISMS and SOC 2 controls

Data Owners - Assign classification labels


- Define access controls and retention periods
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

Role Responsibilities

- Approve sharing and disposal


- Review classification periodically

- Implement classification and protection


controls
Data Stewards / System Owners
- Maintain data inventories
- Support audits and compliance reviews

- Apply encryption, backups, and secure


storage
IT / Infrastructure Teams
- Configure access control and logging
- Automate retention and disposal processes

- Build systems to support tagging and access


control
Application Developers / DevOps
- Implement secure development practices
- Automate protection based on classification

- Handle data per classification and retention


rules
Employees / End Users - Use only approved channels for data storage
and sharing
- Report incidents or misclassification

- Advise on legal/regulatory retention needs


- Validate classification against statutory or
Legal and Compliance Team
contractual terms
- Manage legal holds and audits

5. DATA CLASSIFICATION GUIDELINES


Proper classification of data ensures that information is protected according to its
sensitivity, business criticality, and regulatory obligations. All data assets at [ORG NAME]
must be classified, labelled, and protected accordingly throughout their lifecycle —
from creation or receipt to archival and disposal.

5.1 Classification Objectives


The objectives of data classification are to:

• Ensure appropriate security controls are applied based on data sensitivity

• Minimize risk of unauthorized access, leakage, or misuse

• Support compliance with standards like ISO 27001, SOC 2, GDPR, DPDP, etc.
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

• Guide staff in handling, sharing, storing, and disposing of information

• Enable automated enforcement of security policies (e.g., via DLP, CASB, access
controls)

5.2 Classification Methodology


Data must be classified based on the impact of its unauthorized disclosure,
alteration, or unavailability, along with any legal, contractual, or operational risks.
Factors include:

Criteria Evaluation Questions

Would unauthorized disclosure cause legal, financial, or


Confidentiality Impact
reputational harm?

Would incorrect or tampered data affect decisions,


Integrity Impact
operations, or compliance?

Would unavailability disrupt operations or impact critical


Availability Impact
services?

Legal/Regulatory Does the data fall under GDPR, HIPAA, PCI-DSS, DPDP, SOC
Exposure 2, or other requirements?

Is the data a trade secret, intellectual property, financial


Business Sensitivity
report, or competitive information?

5.3 Classification Levels and Examples

Access & Handling


Level Description Example Data Types
Requirements

- Personally Identifiable
Data that, if exposed or
Information (PII)
modified, would cause Access restricted to
- Health/financial data
severe legal, financial, specifically authorized
Restricted - Encryption keys
operational, or reputational roles; strong encryption,
- M&A plans
harm to the organization or audit logs, strict DLP rules
- Source code
individuals.
- Legal case files

Data that could cause - Employee evaluations


Access limited to internal
moderate business or legal - Strategy decks
staff with role-based
Confidential risk if compromised. - Audit reports
controls; encrypted at rest
Intended strictly for internal - Financial forecasts
and in transit
business use. - Internal emails
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

Access & Handling


Level Description Example Data Types
Requirements

- Standard operating
Access granted to all
Non-sensitive operational procedures
Internal Use employees; protected
information. Not public, but - Training material
Only through basic access
low impact if leaked. - System manuals
control mechanisms
- Internal memos

- Published reports May be shared externally;


Approved for open and
- Marketing content no access restrictions but
Public unrestricted disclosure. No
- Website blogs must still be approved for
confidentiality risk.
- Press releases release

5.4 Classification Responsibilities

Role Responsibility

Data Assign classification level based on business impact and compliance


Owners obligations

Data
Implement classification through system tags, metadata, or labels
Stewards

Apply access controls, DLP, and encryption policies per classification


IT / Security
level

Handle, store, and share information according to its classification and


End Users
organizational procedures

Ensure classification considers applicable legal and regulatory


Legal / DPO
obligations

5.5 Labelling and Metadata


All classified data must be labelled or tagged using manual or automated tools:

• Email & documents: Header/footer tags (e.g., “CONFIDENTIAL”)

• Files & folders: Metadata applied by DLP or document management systems

• Systems & databases: Classification fields in asset inventories or CMDBs

• Automated enforcement: DLP, CASB, IRM, or cloud labelling policies enforce


usage restrictions
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

6. DATA PROTECTION REQUIREMENTS


Each classification level mandates specific protection controls to safeguard the
confidentiality, integrity, and availability of information. [ORG NAME] ensures that all
information assets are protected with security controls proportionate to their
classification level and associated risk.

6.1 General Protection Principles


• Risk-Based Protection: Higher sensitivity → stronger controls

• Least Privilege: Access is restricted to only those with a legitimate business need

• Defence in Depth: Multiple layers of technical and administrative safeguards are


implemented

• Secure by Design: Systems processing sensitive data must embed protection


controls from the outset

• Continuous Monitoring: Classified data must be monitored for access,


anomalies, and leakage attempts

6.2 Protection Controls Matrix

Control Internal Use


Public Confidential Restricted
Category Only

Role-based Explicit approval,


Role-based
Access Control No restrictions access + strict role
access
approval segregation

MFA, device
Authentication Optional SSO MFA + SSO binding, step-up
auth

Mandatory (AES-
Encryption at Mandatory
Not required Recommended 256 with key
Rest (AES-256)
rotation)

Encryption in TLS TLS 1.2+ TLS 1.2+ + IP


TLS required
Transit recommended mandatory restrictions

Data Loss Strict


Active
Prevention Not required Monitor only enforcement,
enforcement
(DLP) real-time alerts

Email/Data Controlled via Restricted to


Allowed freely Internal only
Sharing DLP named
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

Control Internal Use


Public Confidential Restricted
Category Only

recipients,
monitored

Encrypted &
Encrypted
Storage Approved access-
Public cloud approved
Location cloud/internal controlled zones
storage
only

Full audit trail,


Logging and Basic access Access logs Access +
alerting, forensic
Auditing logs retained usage logs
readiness

Strict retention
Retention Per retention
As needed Per function limits; legal hold
Control schedule
if required

Encrypted +
Standard Encrypted
Backup Optional access-restricted
backup backup
backups

Locked server
Physical Standard office
NA Secure zones rooms, access
Protection control
logs, surveillance

VPN + approval +
VPN +
VPN endpoint
Remote Access Allowed restricted
recommended compliance
access
check

6.3 Data Protection in Third-Party Environments


When classified data is handled by third parties (e.g., vendors, cloud providers), the
following must be ensured:

• Data Processing Agreements (DPAs) are in place

• SOC 2 Type II, ISO 27001, or equivalent certification of provider is reviewed

• Data is stored and processed only in approved jurisdictions

• Audit rights and breach notification clauses are included in contracts

• Data minimization and pseudonymization are applied where feasible


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

6.4 Additional Security Requirements for Restricted Data


Restricted-level data must also comply with:

• Periodic risk assessments

• Annual penetration testing of systems that process such data

• Zero Trust Architecture enforcement

• Continuous monitoring via SIEM, EDR, or CASB platforms

• Strict physical and logical separation from lower-classified environments

7. DATA HANDLING AND LABELING STANDARDS


To maintain consistent protection and regulatory compliance, all classified information
at [ORG NAME] must be properly labelled, stored, accessed, transmitted, and
disposed of according to its classification level. These standards apply throughout the
data lifecycle — from creation to deletion.

7.1 Data Handling Rules by Classification

Internal Use
Activity Public Confidential Restricted
Only

Authorized users, Only by designated


By internal
Creation No restriction classification roles, DLP triggers
staff only
required enforced

Mandatory Mandatory, clearly


Optional
Labelling Optional (document tags labelled:
digital tags
or metadata) header/footer/tags

Public Encrypted Secure, access-


Internal
Storage platforms storage (on-prem controlled, encrypted
servers/cloud
allowed or cloud) zones

Controlled Limited to Strict change control


Editing Unrestricted
within teams specific roles and audit trails

Access Freely Limited to need- Named recipients only,


Internal only
Sharing shareable to-know, logged with approval

Monitored or Discouraged; physical


Printing Allowed Internal only
watermarked protection mandatory

Secure digital
Delete when Cryptographic erasure
Disposal As required wipe or
obsolete / secure destruction
shredding
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

Internal Use
Activity Public Confidential Restricted
Only

Encrypted, geo-
Standard Encrypted and
Backup Optional restricted, retention
internal access controlled
reviewed

7.2 Labelling Standards


Labelling of data helps ensure proper handling and visibility across systems and users.
Labels may be manual (e.g., document headers) or automated (via
metadata/DLP/classification engines).

Types of Labels:

Label Field Description

Classification Marked as “Public”, “Internal”, “Confidential”, or “Restricted”

Owner Identifies the department or individual accountable for the data

Retention
Defines how long the data should be kept
Period

Any specific instructions (e.g., “Do not forward”, “Encrypt before


Handling Notes
sending”)

Examples:

• Email Subject: [RESTRICTED] – Payroll Data for April

• Document Footer: CONFIDENTIAL – Internal Use Only – Owned by HR


Department

• File Metadata: Classification tags embedded in SharePoint, DMS, or cloud


storage

7.3 Data Transmission Guidelines

Channel Confidential / Restricted Data

Email Encrypted (TLS + S/MIME or DLP control); no personal emails

File Transfer Secure file transfer protocols (SFTP, HTTPS, MFT)

Cloud Sharing Approved platforms with access logging and expiration controls
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

Channel Confidential / Restricted Data

Removable Media Strongly discouraged; must be encrypted and logged if used

Verbal Sharing Only in private, secure settings with authorized individuals

7.4 Visual Labelling Tools and Automation


• Document templates (Word, PDF, Excel) auto-tag classification in
headers/footers

• DLP solutions enforce tagging and classification suggestions during content


creation

• Cloud platforms (e.g., Microsoft Purview, Google Labels) used for auto-labelling
at scale

• Email clients (e.g., Outlook, Gmail) integrated with sensitivity labels and
encryption prompts

8. DATA RETENTION AND DISPOSAL


Proper data retention and disposal practices are critical to reducing storage risks,
ensuring compliance, and minimizing legal and operational liabilities. [ORG NAME]
defines structured rules for how long information should be retained and how it should
be securely disposed of once no longer needed.

8.1 Retention Policy Principles

• Purpose-driven retention: Data is retained only as long as necessary to fulfil its


original purpose or comply with legal, regulatory, or contractual obligations

• Minimization: Excess, outdated, or redundant information must be regularly


purged

• Documentation: All retention periods are documented in a central Data


Retention Schedule

• Exception handling: Legal holds and audits override scheduled deletion until
closure
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

8.2 Typical Retention Periods

Data Category Retention Period Reason

Employee records 7 years after separation Labor law, HR compliance

Tax compliance, audit


Financial and tax records 8 years
requirements

7 years post- Limitation of liability, contractual


Customer contracts
termination obligations

Security logs and access Forensic and incident


1 year
logs investigation

Business continuity, audit


Emails 3–5 years
traceability

Marketing consent Until withdrawal or 2 Consent audit, legal proof of


records years permission

As per BCP/DR cycle Business continuity only, not for


Backup archives
(30–90 days) active access

Applicant/resume data Future opportunity


1 year
(unhired) consideration (with consent)

Note: These periods may be adjusted per jurisdiction or client contract.

8.3 Data Disposal and Destruction


When data has reached the end of its retention period — and is not subject to legal
hold — it must be disposed of securely, using the following methods:

Digital Data Disposal

• Permanent deletion using secure erase tools (e.g., DoD 5220.22-M,


cryptographic wiping)

• Cloud-based deletion must follow provider’s secure purge protocols

• Deletion logs retained for audit validation

Physical Data Disposal

• Shredding of paper documents using industrial shredders

• Disposal via certified vendors with certificate of destruction

• Locked bins and chain-of-custody for sensitive physical files


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

8.4 Backup and Archival Considerations


• Backups must be encrypted, access-controlled, and isolated from production

• Retention of backup data must not exceed primary data retention policies,
unless required for BCP/DR

• Archived data may only be accessed with justified, documented approval and
is not exempt from disposal policies

8.5 Retention Responsibilities

Role Responsibility

Data Owners Define and approve retention period for each data type

Implement retention settings in systems, backups, and cloud


IT / Infrastructure
platforms

Legal / Define legal hold triggers and exceptions, conduct audits of


Compliance retention adherence

Maintain up-to-date data inventories with retention labels and


Data Stewards
schedules

9. DATA OWNERSHIP AND REVIEW


To ensure that data is appropriately classified, protected, and retained, [ORG NAME]
assigns clear ownership for all information assets. Ownership is critical for
accountability, continuous risk management, and policy enforcement.

9.1 Data Ownership Model


Each information asset must have a designated Data Owner responsible for:

• Initial classification of the data based on sensitivity and business impact

• Defining access rights, protection controls, and retention periods

• Authorizing data sharing and processing by third parties

• Approving secure disposal after the retention period ends

• Ensuring labelling, tagging, and handling requirements are met

• Coordinating with IT and Compliance to enforce applicable regulatory controls


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

9.2 Supporting Roles

Role Responsibilities

Implements classification, retention, and labelling on behalf of the


Data Steward
Data Owner; maintains inventories

IT / System Enforces technical controls (e.g., encryption, access restrictions,


Admin retention settings)

Legal / Guides retention based on laws and contracts; handles exceptions,


Compliance audits, and legal holds

Monitors systems for access violations and protection failures


Security Team
related to classification or retention

9.3 Periodic Review of Classification and Retention


To ensure ongoing relevance and compliance, [ORG NAME] requires that data
classification and retention assignments be reviewed periodically, at minimum:

• Annually, or

• Upon a significant business, legal, or system change, such as:

o Regulatory update or new law (e.g., DPDP, GDPR)

o System migration or cloud adoption

o Organizational restructuring or project closure

Each review must confirm or revise:

• The correctness of classification

• The validity of assigned retention period

• Any need for reclassification, relabelling, or legal hold

• The deprecation or secure deletion of obsolete data

These reviews are logged and coordinated by the respective data owner in
collaboration with compliance and IT.

9.4 Reclassification and Deprecation Events

Reclassification or retirement of data may be triggered by:

• Policy changes or revised risk assessments

• Downgrade of business sensitivity over time


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

• End of contractual obligation

• Data anonymization or transformation

• Decommissioning of systems or repositories

Such changes must be documented and approved by the Data Owner and reviewed
by Compliance.

10. ENFORCEMENT
1. Policy Exception Conditions

Valid exception scenarios may include:

o Use of unclassified or legacy systems for urgent business needs

o Inability to implement prescribed controls due to technical constraints

o Retention beyond normal periods due to litigation hold or audit


requirements

o Delayed labelling or classification automation for new systems or


integrations

2. Policy Compliance

o All users, contractors, and third parties with access to [ORG NAME]'s
systems and data are required to adhere strictly to this Data Classification,
Protection & Retention Policy.

o Any deviation, negligence, or unauthorized behaviour related to access


controls shall be treated as a policy violation.

3. Violation Categories and Examples

o Violations include, but are not limited to:

▪ Sharing or disclosing user credentials

▪ Unauthorized access to systems or data

▪ Failure to remove access during offboarding

▪ Use of shared accounts without approval

▪ Misuse of privileged access

4. Disciplinary Actions

o Depending on the severity, intent, and impact of the violation, disciplinary


actions may include:

▪ Verbal or written warning

▪ Suspension of access rights


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

▪ Formal HR disciplinary procedures

▪ Termination of employment or contract

▪ Legal action under applicable laws and regulations

5. Incident Management and Reporting

o All suspected or actual access violations must be reported immediately to


the Information Security Team or Security & Compliance Office.

o The incident must be documented and managed as per the


organization's Incident Management Policy.

6. Corrective and Preventive Actions (CAPA)

o Upon conclusion of an investigation, appropriate CAPA measures shall be


taken to mitigate recurrence.

o These may include additional training, technical controls, updates to


workflows, or enhanced monitoring.

7. Appeals and Review Process

o Individuals subject to disciplinary actions may appeal in writing to the


CISO or the designated Appeals Review Committee within 5 working days
of notice.

o The outcome of the appeal process shall be final and documented.

8. Retention of Records

o All enforcement records including investigation reports, logs, evidence,


and communication must be retained securely for a minimum of 24
months, or longer if mandated by regulatory or legal requirements.

11. POLICY EXCEPTIONS


1. Request for Exception

o Any deviation from the defined standards in this Data Classification,


Protection & Retention Policy must be requested formally using the IT
Policy Exception Request Form.

o Requests must contain:

▪ Business justification and scope of the exception

▪ Duration for which the exception is needed

▪ Risk assessment and impact analysis

▪ Any proposed compensating controls

2. Approval Workflow
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

o All exception requests must follow a structured multi-level approval


process:

Level Approver

Level 1 Department Head / Business Unit Owner

Level 2 Application/System Owner

Level 3 Information Security Officer (ISO)

Level 4 Chief Information Security Officer (CISO)

o The CISO holds final authority to approve, deny, or revoke an exception.

3. Documentation and Register Maintenance

o Approved exceptions must be recorded in the Exception Register


maintained by the Security & Compliance Office.

o Each entry must include requester details, approval chain, expiry date,
and applicable controls.

4. Time Bound Validity and Review

o Exceptions must be time-bound and reviewed periodically.

o Default maximum validity shall not exceed 90 days unless formally


extended and reapproved.

o Active exceptions shall be reviewed monthly to ensure continued


relevance and risk containment.

5. Compensating Controls

o If an exception introduces additional risk, mitigating or compensating


controls must be enforced. Examples include:

▪ Enhanced logging and monitoring

▪ Restricting access scope or duration

▪ Additional user validation or supervision

6. Revocation and Audit

o The CISO reserves the right to revoke an exception if:

▪ The associated risk becomes unacceptable

▪ The business justification no longer applies

▪ Evidence of misuse or policy breach is found


Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

o All exceptions shall be subject to review during internal and external


audits.

o Non-compliance with the approved terms of the exception may lead to


enforcement actions as defined in Section 11.

12. ESCALATION MATRIX


In case of access management-related issues, violations, or delays in provisioning/de-
provisioning, the following escalation structure shall be followed to ensure timely
resolution and appropriate accountability:

Escalation
Role/Designation Responsibility Contact Mode
Level

Reporting Manager / First-level resolution and Email / Ticketing


Level 1
Team Lead access validation Tool

Review of access
System/Application
Level 2 alignment with business Email / Phone
Owner
roles

Resolution of system-level Internal escalation


Level 3 IT Operations Manager
or technical delays call

Information Security Security assurance and Email / Escalation


Level 4
Officer (ISO) compliance validation Tool

Final authority on policy Direct escalation


Chief Information
Level 5 enforcement and risk via email / formal
Security Officer
mitigation report

• Escalations must be documented through the ITSM tool or equivalent service


desk system.

• Each escalation must include clear description of the issue, impacted


users/systems, time of initial request, and business impact.

• SLAs for resolution based on priority level shall be defined and tracked by the IT
Service Management function.
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

13. POLICY REVIEW AND MAINTENANCE


To ensure continued relevance, accuracy, and compliance with evolving legal,
regulatory, and operational requirements, this policy will be reviewed and updated on
a defined schedule or as required by significant changes in the business environment.

13.1 Review Frequency


• This policy shall be formally reviewed at least once every 12 months

• Additional reviews may be initiated based on:

o New regulatory or contractual requirements (e.g., updates to ISO 27001,


DPDP Act, GDPR)

o Major changes to IT systems, data flows, or organizational structure

o Results of internal or external audits

o Security incidents or classification breaches

13.2 Review and Update Responsibilities

Role Responsibility

Policy Owner Owns the policy, coordinates the review process, and initiates
(CISO) updates

Privacy Officer / Ensures the policy aligns with data protection laws and retention
DPO obligations

Legal & Validates alignment with legal holds, retention rules, and
Compliance regulatory changes

IT / Data Provide input on system capabilities, automation feasibility, and


Stewards enforcement mechanisms

13.3 Version Control and Documentation


• Every change to this policy will be assigned a version number, approval date,
and summary of changes

• The most recent version will be published on [ORG NAME]’s internal policy portal
or document repository

• Archived versions will be retained for a minimum of 3 years for audit purposes
Document Name Data Classification, Protection & Retention Policy
Classification Internal Use Only

You might also like