Watch videos with subtitles in your language, upload your videos, create your own subtitles! Click here to learn more on "how to Dotsub"


0 (0 Likes / 0 Dislikes)
Introduction to Information Security Policy 40, Information Classification, Handling, and Protection ISPOL 40 outlines the high-level responsibilities, practices, and compliance requirements for individuals who have access to Intel systems and information assets regardless of the information format or how you access the information. Policy 40 helps us safeguard information assets throughout the information lifecycle. This includes information assets shared with Intel by others, and information we may share externally. This aids in ensuring the confidentiality, integrity, and availability of systems and information assets, including the protection of corporate intellectual property and individual privacy rights, in compliance with applicable law. Responsibilities in this policy focus on proper information classification. At every stage of the information lifecycle, you must use these classifications to identify the level of information security that the information requires. Let’s take a look at the Information Classification Categories: Intel Top Secret, also known as ITS or Red Cover, is the highest sensitivity of Intel data classifications. ITS is non-public information that requires high-level security controls. The next classification, much more common, is Intel Confidential, or IC. Although it’s not public, and may not require high-level controls, it’s important to restrict access only to those with a business need-to-know. IC includes most business, financial, and legal information. It also includes technical information required by a customer to complete a design based on an Intel product, or information that would be revealed upon reverse engineering a released Intel product. Then there’s Intel Public information. This is information specifically approved or intended for public disclosure or distribution. You may also come across Intel Restricted Secret, or IRS, information. This former classification category, which had a sensitivity level close to ITS, is not used for materials created or updated after 2017, but may still appear on older material. Information you work with must be classified using one of these classification categories. You can learn more by visiting goto/classifications Let’s examine additional classification requirements and your responsibilities outlined in this policy. For the purpose of securing information, any information classified at Intel Confidential or Intel Top Secret must have a designated “Information Owner”. These owners are responsible for creation, maintenance, protection, and access to the information. ISPOL 40 describes controlled access responsibilities, framed by principles of a business need-to-know and the least-privilege necessary. Information handling requirements and responsibilities are also covered. These handling requirements and responsibilities address a wide range of topics from information registration to handling third-party information. Let’s explore some examples of these handling requirements. Personal Information. Depending on the sensitivity level of the specific personal information, it is classified as Intel Confidential (IC) or higher and must be handled in accordance with that classification. Note: Never disclose or use the confidential information of others without the explicit and documented permission of those affected. This includes information like birthdays and phone numbers. Visit to learn more about the handling and use of personal information. Another example is the handling of Intel job-related information. Each Intel worker is responsible for protecting information associated with their Intel-based working relationship, and must comply with Intel confidentiality agreements and workforce requirements. Of course Intel follows the law closely, and to do so, ISPOL 40 addresses legal and regulatory handling requirements, especially when handling certain information types. Some of these information types include: Personal information subject to Privacy policies Controlled technology subject to export compliance Financial information subject to Sarbanes-Oxley (SOX) or Intel’s Insider Trading Policy Any information subject to Legal hold or requirements Payment card information There are additional information handling responsibilities regarding aggregation of information, third-parties and the disclosure of Intel information, Archiving, Storage, Backup, and keeping your work area clear of exposed information assets. ISPOL 40 contains two helpful tables for quick reference. The first table lists security requirements for each classification category. It describes the how these handling requirements are expected to be implemented on classified information. These security requirements range from access control, to labeling, to retention and disposal. The second table is a list of ways Intel information may need to be handled in order to conduct Intel business. This table specifies handling restrictions and requirements based on the information’s classification. Some handling methods covered are virtual environments, remote access, transmission and collaboration, printing, and storage. Cryptographic controls are also outlined in ISPOL 40, covering management of public key infrastructure, key access and lifecycle, and minimum requirements for encryption. Information Security Policy 40, Information Classification, Handling, and Protection, ensures information security is embedded into the information lifecycle. This helps us understand the sensitivity level of information we work with, handle it appropriately, and protect it to the level of its risk. This and other updated Information Security Policies, supporting documents, and our improved policy portal should make it easier for you to locate and understand our corporate information security requirements. They can be found on our corporate policy repository, Policy Central. Visit goto/infosecpolicies to learn more or ask questions. Thank you for your help to keep Intel secure!

Video Details

Duration: 7 minutes and 4 seconds
Language: English
License: Dotsub - Standard License
Genre: None
Views: 2
Posted by: mikediamond on Jan 9, 2018

Caption and Translate

    Sign In/Register for Dotsub above to caption this video.