{"id":870,"date":"2025-10-29T09:28:02","date_gmt":"2025-10-29T14:28:02","guid":{"rendered":"https:\/\/www.nicholls.edu\/information-tech\/?page_id=870"},"modified":"2025-10-29T09:35:00","modified_gmt":"2025-10-29T14:35:00","slug":"data-classification-policy","status":"publish","type":"page","link":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/","title":{"rendered":"Data Classification Policy"},"content":{"rendered":"<h2 data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\"><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">Information Technology Policy and Procedures\u200b<\/a><\/h2>\n<ul>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-use-policy\/\">Acceptable Use Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\">Acceptable Encryption Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\">Data Center Access Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\">Data Classification Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/email-policy\/\">Email Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\">IT Audit Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-lab-policies\/\">Lab Policies<\/a><\/li>\n<li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/leaving-the-university\/\">Leaving the University<\/a><\/li>\n<\/ul>\n<h2><font color=\"#000000\">DATA CLASSIFICATION POLICY<\/font><\/h2>\n<p>                        <iframe title=\"Nicholls State University &#8211; Data Classification Policy &#8211; July 2024\" allowfullscreen=\"true\" mozallowfullscreen=\"true\" webkitallowfullscreen=\"true\" style=\"width: 600px; height: 600px; max-width:100%;\" data-src=\"https:\/\/www.nicholls.edu\/information-tech\/wp-content\/uploads\/sites\/30\/2025\/10\/Nicholls-State-University-Data-Classification-Policy-July-2024.pdf\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe><\/p>\n<p>Powered By EmbedPress<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University DATA CLASSIFICATION POLICY Powered By EmbedPress<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":460,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-870","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Classification Policy - Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Classification Policy - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University DATA CLASSIFICATION POLICY Powered By EmbedPress\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T14:35:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\",\"url\":\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\",\"name\":\"Data Classification Policy - Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.nicholls.edu\/information-tech\/#website\"},\"datePublished\":\"2025-10-29T14:28:02+00:00\",\"dateModified\":\"2025-10-29T14:35:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nicholls.edu\/information-tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policy and Procedure\",\"item\":\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Classification Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nicholls.edu\/information-tech\/#website\",\"url\":\"https:\/\/www.nicholls.edu\/information-tech\/\",\"name\":\"Information Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nicholls.edu\/information-tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Classification Policy - Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/","og_locale":"en_US","og_type":"article","og_title":"Data Classification Policy - Information Technology","og_description":"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University DATA CLASSIFICATION POLICY Powered By EmbedPress","og_url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/","og_site_name":"Information Technology","article_modified_time":"2025-10-29T14:35:00+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/","url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/","name":"Data Classification Policy - Information Technology","isPartOf":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/#website"},"datePublished":"2025-10-29T14:28:02+00:00","dateModified":"2025-10-29T14:35:00+00:00","breadcrumb":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nicholls.edu\/information-tech\/"},{"@type":"ListItem","position":2,"name":"IT Policy and Procedure","item":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/"},{"@type":"ListItem","position":3,"name":"Data Classification Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.nicholls.edu\/information-tech\/#website","url":"https:\/\/www.nicholls.edu\/information-tech\/","name":"Information Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nicholls.edu\/information-tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/comments?post=870"}],"version-history":[{"count":0,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/870\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/460"}],"wp:attachment":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/media?parent=870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}