Data Privacy

Data Classification Policy Template: How to Tier Data Without 200 Categories

May 4, 2026 Rebecca Leung
Table of Contents

TL;DR

  • Four tiers — Public, Internal, Confidential, Restricted — is the right answer for most financial services organizations. More tiers create classification paralysis; fewer create control gaps.
  • NPI, PII, PHI, and CHD are four different regulatory definitions of “sensitive data.” A single customer record can trigger all four simultaneously. Your classification system needs to account for that overlap.
  • NIST SP 800-60’s high watermark principle applies: if any piece of data in a system is Restricted, the whole system gets Restricted controls until you segregate.
  • Data classification is the upstream decision that drives access controls, encryption requirements, retention schedules, and vendor obligations. Get the classification wrong and everything downstream is wrong too.

The compliance team that has a CCPA notice, a GLBA Safeguards program, and a PCI DSS compliance letter — but no data classification policy — has built a house on sand. Each regulation protects a different slice of the same data. Without a classification framework, you can’t demonstrate to a regulator, sponsor bank, or auditor that the right controls are applied to the right data. You just have assertions.

A data classification policy is the upstream decision that makes everything else defensible: which access controls are required, what gets encrypted, how long it’s kept, when it gets disposed, and what your vendor contracts need to require. This is the walkthrough for building one that works.

Why Most Data Classification Policies Fail

Three failure modes show up constantly.

Too many tiers. Organizations that try to build classification systems with five, six, or eight categories find that employees stop classifying accurately after about six months. The distinctions between “Sensitive” and “Highly Sensitive” and “Restricted” blur, training doesn’t stick, and the system collapses into inconsistency. The goal of classification is actionable differentiation, not taxonomy for its own sake.

Too few tiers. A binary “public / confidential” system creates a different problem: everything non-public gets the same controls, which means either you’re over-protecting routine internal data (operationally painful) or under-protecting customer financial information (regulatory exposure). Two tiers don’t create enough leverage to drive meaningful control differentiation.

No regulatory crosswalk. A policy that defines four tiers but doesn’t map those tiers to GLBA NPI, CCPA personal information, HIPAA PHI, and PCI DSS CHD is a policy employees can’t apply to real decisions. When someone asks “does this customer record need to be encrypted?”, the classification system should answer that question automatically.

The Four-Tier Model

The industry-standard starting point — supported by NIST NCCoE’s data classification project and adopted across financial services — is four tiers:

TierDefinitionExamplesDefault Controls
PublicApproved for external release; disclosure causes no harmMarketing materials, published product terms, press releasesNone beyond standard web security
InternalNot public but contains no sensitive information; routine operational contentInternal memos, process documentation, org charts, non-customer meeting notesRole-based access; no external sharing without approval
ConfidentialBusiness-sensitive information where unauthorized disclosure causes competitive, reputational, or limited regulatory harmFinancial projections, strategy documents, personnel records, vendor contracts, aggregated (de-identified) analyticsEncryption in transit; access restricted to need-to-know; contractor NDA required
RestrictedRegulated information where unauthorized disclosure causes legal, regulatory, or material financial harm to individuals or the organizationCustomer NPI (GLBA), PII under CCPA, CHD (PCI DSS), PHI (HIPAA), authentication credentials, legal hold dataEncryption at rest and in transit; MFA required for system access; vendor agreements with security addenda; breach notification obligations apply

The Regulatory Crosswalk

The four tiers map to regulatory data categories as follows. This crosswalk is the part most policies skip — and the part that makes the system defensible to a regulator.

Regulatory CategoryRegulationTierKey obligations triggered
Nonpublic Personal Information (NPI)GLBA / FTC Safeguards RuleRestrictedEncryption, access controls, vendor management, breach notification (500+ customers: FTC within 30 days)
Personal Information (PI)CCPA/CPRA; state privacy lawsRestrictedRight to delete, opt-out of sale, data subject request response within 45 days
Protected Health Information (PHI)HIPAARestrictedBAA with business associates, 60-day breach notification to HHS and affected individuals
Cardholder Data (CHD)PCI DSSRestrictedTokenization or encryption; no CHD in logs; annual assessment or SAQ
Sensitive Personal Data (special category)GDPRRestrictedExplicit consent or specific legal basis; cross-border transfer restrictions; DPA notification within 72 hours
Employee RecordsFLSA, state labor laws, HIPAA (for benefits data)ConfidentialHR access only; specific retention requirements; state-specific rules vary
Internal FinancialsSEC (public companies), SOXConfidentialMNPI protocols for public companies; insider trading policy linkage

For financial institutions operating across GLBA and CCPA simultaneously — which is now most fintechs with any California customers — see our FTC Safeguards Rule compliance guide for how these obligations interact.

The High Watermark Principle

NIST SP 800-60 establishes the “high watermark” rule: when assessing the security category of an information system, the overall classification is determined by the highest impact level across confidentiality, integrity, and availability.

Applied to data classification: if a database contains internal operational records alongside customer NPI, the entire database is Restricted until the data can be segregated. You don’t get to average the classifications.

This has practical consequences. A reporting database that pulls customer account data into the same schema as internal analytics inherits Restricted classification — which means MFA, encryption at rest, vendor security requirements, and breach notification obligations apply to the whole thing. Most organizations discover this when a pen test flags an unencrypted analytics database that “only” contained de-identified customer data. Whether the data was actually de-identified, and whether re-identification was possible, is exactly the question a regulator will ask.

Handling Requirements by Tier

The policy isn’t just classification — it’s the rules that follow from classification. Each tier should have defined handling requirements across five dimensions:

Storage

  • Public: No special requirements.
  • Internal: Company-managed systems only; no personal cloud storage without IT approval.
  • Confidential: Approved systems only; no local unencrypted storage.
  • Restricted: Encrypted storage required; systems pre-approved by security team; cloud storage only in approved, contracted environments with security addendum.

Transmission

  • Public / Internal: Standard email acceptable.
  • Confidential: Encrypted email or secure file transfer for external transmission; no unencrypted external sharing.
  • Restricted: Encrypted transmission required for all transfers; no transmission via personal email; secure file transfer platform required for external sharing.

Access

  • Public: No restrictions.
  • Internal: Employee access based on role; contractor access with signed NDA.
  • Confidential: Need-to-know access; access logged; annual access review.
  • Restricted: Role-based access with MFA; access approved by data owner; quarterly access review; all access logged and monitored.

Disposal

  • Public / Internal: Standard deletion acceptable.
  • Confidential: Overwrite or degauss for digital media; cross-cut shredding for paper.
  • Restricted: Certified destruction required; certificate of destruction retained; vendor disposal requires contractual verification.

Labeling

  • Public / Internal: No marking required.
  • Confidential: Documents marked “CONFIDENTIAL” in header or footer; email subject line prefixed with [CONFIDENTIAL].
  • Restricted: Documents marked “RESTRICTED” with applicable regulatory category (e.g., “RESTRICTED — Contains NPI”); email prefixed with [RESTRICTED].

Your data classification policy must address how classification intersects with legal hold obligations, because classification-driven disposal schedules don’t override litigation holds.

Triggers that suspend normal retention and disposal schedules:

  • Receipt of litigation hold notice from legal counsel
  • Receipt of regulatory subpoena, civil investigative demand, or government inquiry
  • Reasonable anticipation of litigation (this is the hard one — your policy needs to define who makes that determination)
  • Regulatory examination request covering specific data sets

When a legal hold is issued, the classification of the data doesn’t change — but disposal is suspended regardless of where the data falls on the retention schedule. A Restricted customer record scheduled for disposal after seven years stays in place until the hold is released. Your policy should name who has authority to issue a hold notice, how custodians are notified, and how hold status is tracked and released.

For financial institutions handling BSA/AML records, customer identification program data, and transaction monitoring outputs, see our CIP documentation guide — those records have independent retention obligations that run parallel to your classification-driven schedule.

Third-Party and Vendor Obligations

You can’t apply your data classification policy directly to a vendor — you apply it to yourself, and then use contracts to drive equivalent outcomes at the vendor level.

What your vendor agreements should require for vendors handling Confidential or Restricted data:

  • Implementation of controls equivalent to your classification requirements (encryption, access controls, MFA)
  • Notification within a defined window (typically 24–72 hours) of any actual or suspected security incident involving your data
  • Prohibition on sub-processing or sharing your data with fourth parties without written consent
  • Right to audit or review vendor’s security controls (or require annual attestation via SOC 2 report or equivalent)
  • Return or certified destruction of data at contract termination

Your classification policy should explicitly state that Restricted data cannot be shared with a vendor absent a signed agreement with security provisions. The Netwrix data classification compliance guide provides a useful framework for mapping vendor data flows to classification tiers, which is the starting point for scoping those contract requirements.

The GDPR dimension adds a wrinkle: if any of your Restricted data is personal data of EU residents, data transfers to US-based vendors require appropriate safeguards (Standard Contractual Clauses, adequacy decision, or approved BCRs). The GDPR enforcement trends from 2025 show regulators treating inadequate data transfer mechanisms as a primary enforcement target — not a secondary finding.

Implementation: From Policy to Practice

A data classification policy that lives in a SharePoint folder and gets reviewed once at hiring is not a data classification program. The policy works when it’s embedded into daily operations.

Step 1 — Data inventory first. You can’t classify what you haven’t found. Build a data inventory (or validate an existing one) that maps data types, systems, locations, and data flows before rolling out classification. This is the input your classification decisions depend on.

Step 2 — Assign data owners. Each data category needs a business owner accountable for classification decisions on that data type. Security sets the framework; business data owners apply it.

Step 3 — Train on examples, not abstractions. Employees don’t internalize “Restricted: regulated information where unauthorized disclosure causes regulatory harm.” They internalize: “Customer email addresses are Restricted. The weekly operations report is Internal. The press release is Public. When in doubt, go one tier higher and ask.” Concrete examples by department beat policy text.

Step 4 — Build classification into systems. Access controls, DLP tools, and data tagging should enforce classification requirements automatically wherever possible. The goal is a system where correct handling is the path of least resistance.

Step 5 — Review annually and after incidents. Classification tiers need to evolve as regulations change (new state privacy laws, HIPAA updates, PCI DSS version changes) and as your data environment changes (new products, new vendors, new jurisdictions).

So What?

Data classification isn’t a privacy-team concern that lives in a policy document — it’s the upstream decision that determines what your access controls protect, what your encryption covers, how long you keep records, and what your vendor contracts require. Get the classification wrong and all of those programs are misaligned with the actual risk.

Four tiers, a regulatory crosswalk, clear handling rules, legal hold provisions, and vendor obligations. That’s the complete policy. It doesn’t need 200 categories. It needs to be specific enough that an employee can make the right decision without calling compliance, and defensible enough that a regulator can follow the logic from classification to control to outcome.

Frequently Asked Questions

How many data classification tiers do I actually need?
Four is the practical answer for most financial services companies: Public, Internal, Confidential, and Restricted. Two tiers are too coarse to drive meaningful control differentiation. Six or more tiers create classification paralysis — employees stop classifying correctly because the distinctions blur. The goal is a system employees can apply without a decision tree flowchart. Four tiers, well-defined, with clear examples for each, outperforms any more complex system in practice.
Does my fintech need a data classification policy if we already comply with GLBA?
Yes. GLBA's Safeguards Rule requires you to protect nonpublic personal information (NPI) — but it doesn't tell you how to classify your data inventory. A data classification policy is the mechanism that identifies which data is NPI, which is PII under state laws, which is subject to PCI DSS or HIPAA, and what controls apply to each. Without it, you can't demonstrate to a regulator, auditor, or sponsor bank that your access controls, encryption, and retention practices are applied to the right data.
What's the difference between NPI, PII, PHI, and PCI data?
NPI (nonpublic personal information) is the GLBA term for customer financial information — loan applications, account data, transaction history. PII (personally identifiable information) is the broader term used by state privacy laws like CCPA — it includes name, address, email, device identifiers, and more. PHI (protected health information) is the HIPAA term for health data linked to an individual. CHD (cardholder data) is the PCI DSS term for payment card numbers, CVVs, and expiration dates. A single record can contain all four — a credit card transaction from a healthcare provider's patient portal hits NPI, PII, PHI, and CHD simultaneously.
What happens when data falls into multiple regulatory categories?
Apply the most restrictive classification and the highest applicable control set. This is NIST SP 800-60's 'high watermark principle' — if any one dimension (confidentiality, integrity, availability) rates as High, the overall system or data set is classified as High. Practically: if a database contains both internal-use operational data and customer account records, the entire database inherits the Restricted classification until you can segment the data.
When does data classification trigger a legal hold?
When litigation is reasonably anticipated, government investigation is underway, or a regulatory subpoena or civil investigative demand is received. Your data classification policy should identify who has authority to issue a legal hold notice, which data custodians must be notified, and that normal retention/disposal schedules are suspended for the identified data sets. Legal holds override classification-driven disposal — a document scheduled for destruction under your retention policy cannot be destroyed once a legal hold is in place.
Do third-party vendors need to follow our data classification policy?
Yes, but through contract, not direct policy application. Your vendor agreements should require vendors who handle your Confidential or Restricted data to maintain controls equivalent to your requirements — encryption standards, access controls, retention, and disposal. You can't enforce your policy on a vendor directly, but you can contractually require the same outcomes and verify compliance through due diligence and security questionnaires.
Rebecca Leung

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

Related Framework

Data Privacy Compliance Kit

Multi-state privacy compliance templates covering 19 state laws plus GLBA and CCPA.

Immaterial Findings ✉️

Weekly newsletter

Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

Join practitioners from banks, fintechs, and asset managers. Delivered weekly.