Data Security Levels: A Definition

Security Info

A PDF version of Data Security Levels is available for download.

With an ever increasing quantity of data and people wanting access to that data, it is necessary to define Data Security Levels and to determine what is and is not possible at each of those levels.

This Business White Paper, defines what the Data Security Levels mean and from there, the impact on the business.

The majority of data within a business will be at Level 8 or higher.

These concepts are covered practically in our Professional Course - Master of Business Technology.

Level 1

This the most secure level, to be classified as Level 1, the data must never have existed. This includes written on any medium, or spoken about by an individual. It may only be thought about and never communicated.

Transmission Not possible
Network Not applicable
Storage Prohibited
Availability Nobody
Accessibility Not applicable

This is the most secure any information can be.

Level 2

At Level 2 the data must never have been communicated to anybody. The person or entity that created the data must be the sole user of that data.

The implication, is that the data is never stored in any kind of physical or electronic media. While this does not preclude electronic storage it certainly is not encouraged.

Transmission Prohibited
Network Not applicable
Storage Prohibited
Availability Creator
Accessibility None

Level 3

The data may be stored and processed in an encrypted system. This maybe electronic or a physical medium such as paper. The systems may not be connected to an external network. The data may not be transported from this location.

Transmission Prohibited
Network Not applicable
Storage Maximum encryption
Availability Authorized individuals
Accessibility Severely restricted

Level 4

The data must be stored and processed in an encrypted system. The data may be transferred in an encrypted form. The data must always remain under the control of a person. Very strong encryption must be used. The data may not be transmitted in any form over a public network.

Transmission Very high encryption
Network Private and secure
Storage Very high encryption
Availability Authorized individuals
Accessibility Very restricted

Level 5

At all times the data must be encrypted. It may be transmitted in an encrypted form over a public network. The strong encryption must be used at all times.

Transmission Strong encryption
Network Public
Storage Strong encryption
Availability Authorized individuals
Accessibility Restricted

Level 6

The data is always encrypted during transmission and transportation. The information is encrypted while stored and only those who need to access the data have access.

Transmission Encryption
Network Public
Storage Encryption
Availability Authorized individuals
Accessibility Restricted

Level 7

Some data is encrypted, but generally weak encryption is used, encryption is used while transmitting the data and reasonable efforts are made to keep the information confidential.

Transmission Weak encryption
Network Public
Storage Partial encryption
Availability Most individuals
Accessibility Broad access

Level 8

No encryption is used to store the data and weak encryption is used during its transmission.

Transmission Weak encryption
Network Public
Storage Plain text
Availability All individuals
Accessibility Broad access

Level 9

No encryption is used at all, any security is by obscurity.

Transmission Plain text
Network Public
Storage Plain text
Availability All individuals
Accessibility Broad access

Level 10

Widely published on the internet, available via or on social media and is generally available via a simple search.

Transmission Plain text
Network Public
Storage Plain text
Availability All individuals
Accessibility Universal access

This is the least secure any information can be.

It is important, that at all times care is taken to ensure that data remains within its predetermine Level. It is all too easy for Data Security to become lax and data begins to drift to less secure Levels.


Help

Data Security and the process, procedures and support documentation and training as all specialist areas for DVANA. Our DUMP-STOP-BAR system is a specially designed system to improve data security of an organization. We’re more than happy to help you with any concerns you might have with:

  • securing communications
  • access to data
  • securing data
  • integrating security into the business culture