Skip to content

Data & Information Classification Policy

Official platform documentation and governance guidance.

High-fidelity data governance framework ensuring structural classification, persistent encryption, and secure lifecycle orchestration of all Nexly information assets.
Information Integrity
Global Compliance
v3.1.0

Enterprise Data & Information Classification Policy

1. Classification Mission Statement

At Nexly.biz (the “Company”), we view data as our most valuable structural asset. Our mission is to ensure that every information node within our ecosystem is correctly identified, classified, and protected according to its inherent sensitivity, preventing unauthorized disclosure and maintaining the sanctity of user privacy.

2. Structural Scope

This policy applies to all data generated, processed, or stored by Nexly, regardless of its source, format (digital or physical), or the hardware node on which it resides.

3. Classification Taxonomy

Nexly utilizes a four-tier classification system to categorize information based on the potential impact of its unauthorized disclosure:

Level Description Examples
PUBLIC Intended for public consumption with no restriction. Marketing assets, help documentation, public API specs.
INTERNAL Standard business data for internal use within the Company. Internal memos, organizational charts, training materials.
CONFIDENTIAL Sensitive information requiring restricted "Need-to-Know" access. Financial projections, partner contracts, IP blueprints.
RESTRICTED Vital assets requiring maximal security and encryption. User PII, password hashes, encryption keys, trade secrets.

4. Data Handling Matrix

Each classification level triggers specific handling mandates. "Restricted" data must never be stored on local drives, must utilize end-to-end encryption, and can only be accessed through hardware-verified secure tunnels.

5. Labeling Standards

Where possible, data must be electronically or physically labeled with its classification. Digital assets should include metadata tags that indicate their tier, enabling automated security agents to prevent unauthorized egress.

6. Storage & Persistent Encryption

Classification determines the storage node. "Confidential" and "Restricted" data must reside in encrypted database clusters that utilize AES-256 at-rest encryption and are isolated from the public internet subnets.

7. Distribution Logic

Information may only be distributed to individuals with a legitimate "Need-to-Know." External distribution of "Confidential" data requires an active Non-Disclosure Agreement (NDA) and the use of cryptographically secured transmission channels.

8. Secure Data Disposal

When data reaches its "End-of-Life," it must be securely purged. Digital assets are overwritten using forensic erasure protocols, and physical media are subjected to cross-cut shredding or degaussing to ensure no retrievable trace remains.

9. Periodic Re-Classification Review

The value and sensitivity of data change over time. Data owners are required to review the classification of their assets annually, downgrading or upgrading the tier to reflect current institutional risk.

10. Governance Roles & Accountability

  • Data Owners: Executive leads responsible for classifying specific datasets and approving access rights.
  • Data Custodians: Cloud engineers implementing the technical controls (encryption, backups) for stored data.
  • Data Users: All employees and contractors, responsible for adhering to handling standards for any data they access.

11. Forensic Audit Triage

Access to "Confidential" and "Restricted" data is logged in a tamper-proof ledger. Nexly performs monthly "Access Audits" to verify that permissions are still appropriate and that no unauthorized interaction has occurred.

13. Data Governance Desk

For assistance in classifying a new information stream, to request an access audit, or to report a classification breach, please connect with the Governance Intelligence Bureau.

Data Governance Bureau

Response SLA: 24h Classification Review • Protocol v3.1

Direct Governance
Cart