Classification of information
Article sections
Where can I store information?
The data is stored in the data systems that have been defined as storage locations for the data in question. Information is processed on paper only when it is necessary.
Data classification table describes how data is classified and processed in HAMK.
Classification
The data is classified so that it can be processed in an appropriate manner. Different information must be processed in different ways. HAMK uses the following classification:
- Public information
- There are no restrictions on viewing information
- For example, publications, public documents and public websites
- Internal or restricted information
- The information can be viewed by HAMK staff and students
- For example, internal announcements, teaching material produced and acquired for internal use, instructions, memos and materials licensed to the organization.
- Confidential Information
- The data can be viewed and processed by every member of the relevant group (including students in e.g. research projects)
- For example, unfinished studies and personal identification number
- Classified information
- Only specially authorized persons can view and process the information
- For example, sensitive personal data (e.g. data related to health status), certain data on security arrangements, material encrypted by contracts. Verbal assessments of the student’s personal characteristics. The student’s and the applicant’s test performance (however, the grade and scores are public information), restricted contact information
HAMK is subject to the Publicity Act, which Section 24 lists 32 different reasons for defining a document as secret . These include, for example, certain information related to research, individuals, health information, employment relationships, personnel management, finances, security, entrance exams, and legal, judicial and criminal matters.
However, only those documents or their parts where there are special grounds for the request for processing must be treated as secret or confidential. The danger is overclassification, in which case processing processes become more complicated and costs rise unnecessarily. On the other hand, underclassification can endanger HAMK’s operations, data security, or the information of people in our systems. Properly done classification brings manageability and information is also easier to find and can be shared better. With the correct classification, the data protection of staff and students and, where necessary, the confidentiality and legality of HAMK’s operations are secured.
In cooperation agreements and business cooperation, it is necessary to go through the procedures by which confidential and confidential information is handled.