Data Classification Policy

Data Classification Policy

1.0 Purpose

The purpose of the Data Classification Policy (the “Policy”) is to ascertain information and data of Voyages Encore Travel Inc.’s (“Encore”) systems are maintained in a secure, accurate, and reliable manner and be readily available for authorized use. It is to help classify, protect, and manage the data of Encore’s information assets.

Another purpose of this policy is to assist employees with the determination of what information can be disclosed externally, given proper authorization.

2.0 Scope

This policy applies to the owners, custodians and all Encore employees (also referred to as “users”) of such information assets. All of Encore’s information and all information entrusted to Encore from third parties will pertain to this policy including (but not limited to):

  • Information (electronic and non-electronic).

  • Associated IT infrastructures such as software, networks, desktops, laptops, and servers.

2.1 Reference

Intangible and physical assets shall inherit the classifications based on the information they process, store, and/or transmit. Handling of information assets will align to the classification category, Inventory Asset Listing, and Acceptable Use Policy.

3.0 Roles and Responsibilities

3.0.1 Information Users

All Encore employees and third parties who handle Encore information on behalf of Encore. All Information Users shall:

  • Read, Understand, and Comply with this policy.

  • Notify the Service Desk (servicedesk.encore.ca) immediately if secret, confidential or internal information is (or is suspected of being) lost or disclosed to unauthorized parties.

  • Any questions related to this policy can be directed to the Service Desk.

3.0.2 Information Owners

The designated owner of Encore information assets (information assets, physical IT assets and IT services). All Information Owners shall:

  • Classify and protect the information as per Section 4.0 of this Policy.

  • Comply with and action the annual review of information classification.

3.0.3 Director of IT

  • Approve and enforce compliance with this policy.

  • Manage and review this policy at least annually.

  • Conduct annual review of information classification.

  • Collect evidence as required.

  • Answer all questions or comments related to this policy.

4.0 Policy

Classification is defined as determining the level of impact and value of information.

  • All information held by Encore must be classified and protected based on its classification.

  • Information Owners are responsible for the classification of information on behalf of Encore.

  • Information classification of assets should be documented and reviewed annually within an Inventory Asset Listing.

  • Any information which is not explicitly classified will be classified as “Confidential” by default and where applicable, implement controls to prevent data leakages.

Information classification consists of 4 levels, as described in Table 1.

Table 1 - Confidentiality Scale

Level

Description

Examples

Secret

Information whose disclosure without prior authorization is likely to cause a significant amount of harm to Encore.

The effects of the disclosure of this information are critical, particularly regarding business operations, significant financial losses, or of serious impacts to the reputation of Encore. Accordingly, the number of people that can access this information must be very small and the rules for managing the access to this information must be very strict.

  • Key / very sensitive information related to projects (e.g. prospective clients, acquisitions / mergers, risk registers)

  • Encryption keys

  • VIP Pre-Check Report

Confidential

Information whose disclosure without prior authorization is likely to cause a significant amount of harm to Encore, its clients, or its vendors.

The effects of the disclosure of this information are severe, it could affect Encore operations, cause moderate financial loss, provide information to competitors, or cause a violation of confidentiality with respect to a client’s information (e.g. security risk, prosecution risk, financial loss, fraud risk, etc.).

In some circumstances, confidential information may have to be disclosed externally to statutory auditors, external consultants, regulatory and/or legislative bodies, etc. The asset owner shall use their discretion to make the confidential information available after the external party has signed a Non-Disclosure Agreement (“NDA”). Even after such disclosure, the classification still remains ‘confidential’.

  • Personal information related to clients (e.g. SIN, Date of Birth, passport number, traveler location, etc.)

  • Financial information related to clients or prospects (e.g. travel analytics, transactions, invoices, itineraries, non-public financial statements, credit card numbers, etc.)

  • Some reports, depending on their content (e.g. reports that contain traveler data, etc.)

Internal

Information whose disclosure without prior authorization is likely to cause a moderate level of harm to Encore, but without impact on its activities (no critical consequences). This information is made available to Encore employees as a part of their work, internal access to this information, however, is selective.

  • Internal directory

  • Documentation of non-strategic projects

  • Internal policies and standards

  • Training materials

  • Internal service requests

  • Some reports, depending on their content

Public

Information whose public disclosure has been authorized by its owner and is not likely to cause any harm to Encore (no impact on its reputation or financial impact).

  • Published marketing campaigns

  • Informational bulletins for the public

  • Services description

  • Travel advisories

  • Press reviews

5.0 Enforcement

The Information Security Office will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits.  All those found in policy violation may be subject to disciplinary action, up to and including termination.

6.0 Definitions

“Confidential Information” – means information that is not publicly available, may or may not have commercial value, is communicated in confidence, and is reasonably protected.

“Employee” – means all salaried and hourly paid Employees including the Steering Committee, Contractors, Consultants, Temporaries, Interns, Agents and other workers at Voyages Encore Travel Inc., including all personnel affiliated with third parties. Can be referred to by the pronoun ‘their’, ‘they’ or ‘them’.

"Encore" – for the purpose of this policy, refers to Voyages Encore Travel Inc. and Encore Travel Americas.

“Information Owners” – for the purpose of this policy, refers to the designated owner of Encore information assets (information assets, physical IT assets and IT services).

“Information Users” – for the purpose of this policy, refers to all Encore employees and third parties who handle Encore information on behalf of Encore.

“Internal Information” – means information that comes directly from Encore’s systems.

“Public Information” – means information that is publicly available.

“Steering Committee” – means the Chief Executive Officer; Chief Technology Officer; Head of Strategy, Growth & Corporate Development; Head of Product; Head of Commercial Strategy; and Head of Travel Technology & Operations.

“Their”, “They” or “Them” – means the person or entity previously referred to.

    • Related Articles

    • Information Security Policy

      1.0 Introduction Voyages Encore Travel Inc. (“Encore”) is committed to safeguarding the confidentiality, integrity and availability of all physical and electronic information assets of the organization to ensure that regulatory, operational and ...
    • Access Management Policy

      1.0 Purpose The purpose of the Access Control and User Access Management Policy (the "Policy") is to establish and maintain access rights management procedures to prevent unauthorized access to data under Voyages Encore Travel Inc.’s (“Encore”) ...
    • Ransomware Policy

      1.0 Purpose The purpose of the Ransomware Policy (the "Policy") is to establish the goals and vision for the ransomware response process in compliance with SOC 2 and the Personal Information Protection and Electronic Documents Act ("PIPEDA"). This ...
    • Email Policy

      1.0 Overview Electronic email is extensively used across various industry verticals and serves as the primary method of communication and awareness within an organization. However, improper use of email can introduce legal, privacy, and security ...
    • Security Awareness Training Policy

      1.0 Overview Security awareness training is the process of educating employees on the risks and best practices of cybersecurity. It aims to equip them with the knowledge and skills to protect themselves and the organization from cyber threats. ...