Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Penn Data Risk Classification

Penn Data Risk Classification

The University of Pennsylvania data is classified into three categories based on the level of data sensitivity, government regulations, and the University policies. 

  1. Low
  2. Moderate
  3. High
HIGH
  • HIGH
  • MODERATE
  • LOW

Classification

  1. Protection of the data is required by law/regulation and Penn is required to report to the government and/or provide notice to the individual if the data is inappropriately accessed; or
  2. The loss of confidentiality, integrity, or availability of the data or system could have a significant adverse impact on the University's mission, safety, finances, or reputation or the loss would have a significant adverse impact on any individual. 

Examples

  • Health Information, including Protected Health Information (PHI)
  • Mental health records
  • Biometric data (e.g. DNA, fingerprint)
  • Criminal record or background check
  • PennKey password and other system credentials
  • Health Insurance policy ID numbers
  • Social Security Numbers
  • Credit card numbers
  • Financial account numbers
  • Location data that actively tracks an individual 
  • Export controlled information under U.S. laws
  • Driver's license numbers or other government-issued ID numbers
  • Passport or visa numbers
  • Student, faculty, or staff disciplinary records
  • Certain HR records (salary, performance)
  • Donor contact information and non-public gift information
  • K-12 student records and any data related to minors
  • Information concerning the types, locations, and security of potentially hazardous materials and equipment

 

 

Classification

  1. The data is not generally available to the public; or
  2. The loss of confidentiality, integrity, or availability of the data or system could have a mildly adverse impact on the University's mission, safety, finances, or reputation or the loss would have a mildly adverse impact on any individual. 

Examples

  • Student education records and admission applications (excluding K-12 student records)
  • Non-public Penn policies and policy manuals
  • Non-public contracts that do not relate to a sensitive matter
  • Penn internal memos and email, non-public reports, budgets, plans, financial information that do not contain High-Risk data
  • Engineering, design, and operational information regarding Penn infrastructure
  • University directory information that has been designated for Penn view or otherwise restricted
  • Unpublished research data (at data owner's discretion), subject to any IRB restrictions

 

Classification

  1. The data is intended for public disclosure; or 
  2. The loss of confidentiality, integrity, or availability of the data or system would have no adverse impact on the University's mission, safety, finances, or reputation and the loss would have no adverse impact on any individual. 

Examples

  • PennKey username 
  • PennID
  • Information authorized to be available on or through Penn's website without PennKey authentication
  • Policy and procedure manuals designated by the owner as public 
  • Job postings
  • University directory information that has been designated for public view
  • Publicly available campus maps 
  • Research data (at data owner's discretion), subject to any IRB restrictions

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • Penn Data Classification (PDF)
  • Information Security and Privacy Program Charter
  • Penn Privacy
  • SPIA Assessment
  • VSTAR Assessment
  • Secure Share
  • Penn+Box
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff