Examples of Information Classification Scheme in a sentence
All copies, including security copies, preservation copies and where possible backup copies, held in any format must be destroyed at the same time.Destruction must be carried out in a way that takes full account of the confidentiality of the record using the Information Classification Scheme.
Appendix A: Information Classification Scheme A.1 Information Classification Scheme The information classification scheme is in two parts.
The Contractor shall provide support in designing system interfaces, designing Voice Over Internet Protocol (VOIP) and Voice Over Secure Internet Protocol (VOSIP) services; Telephone switchingequipment includes, Editors Information Classification Scheme (EDICS ™) ACU-1000 radio interface module, SI Tech bit driver media converter, all telephone instruments, JWICS, and Defense Red Switch Network (DRSN) red phone system.
UA92’s Information Classification Scheme describes the following four categories of confidentiality which should be used to classify information and records held by UA92.
The Contractor shall provide support in designing system interfaces, designing Voice Over Internet Protocol (VOIP) and Voice Over Secure Internet Protocol (VOSIP) services; Telephone switching equipment includes, Editors Information Classification Scheme (EDICS ™) ACU-1000 radio interface module, SI Tech bit driver media converter, all telephone instruments, JWICS, andDefense Red Switch Network (DRSN) red phone system.
The Contractor shall provide support in designing system interfaces, designing Voice Over Internet Protocol (VOIP) and Voice Over Secure Internet Protocol (VOSIP) services; Telephone switching equipment includes, Editors Information Classification Scheme (EDICStm) ACU-1000 radio interface module, SI Tech bit driver media converter, all telephone instruments, JWICS, and Defense Red Switch Network (DRSN) red phone system.
Destruction must be carried out in a way that takes full account of the confidentiality of the record, using the University’s Information Classification Scheme and other relevant policies as a guide.
G2.45 The DCC shall ensure that any and all Cryptographic Processing undertaken under or pursuant to this Code which does not fall within the scope of Section G2.44 is carried out within Cryptographic Modules established in accordance with its Information Classification Scheme.
Use of email must be undertaken in conjunction with the Council’s Information Classification Scheme which outlines the correct handling of information by email.
Top Secret Appendix A provides more details on the particular types of documents and information assets which are likely to attract a particular classification.The Information Classification Scheme is underpinned by the principle that information is Not Protectively Marked, unless there is a legitimate reason for an increased (more restrictive) classification.