What is Sensitive Data? | UpGuard (2024)

Sensitive data is confidential information that must be kept safe and out of reach from all outsiders unless they have permission to access it.

Access to sensitive data should be limited through sufficient data security and information security practices designed to prevent data leaks and data breaches.

The rise of regulatory scrutiny over sensitive data protection has culminated into a desperate need for improved data management, third-party risk management, and enhanced cybersecurity. Forsaking these now essential requirements could cost your business up to $4 million.

Examples of Sensitive Data

Sensitive information includes all data, whether original or copied, which contains:

Sensitive Personal Data

As defined by the North Carolina Identity Theft Protection Act of 2005, a series of broad laws to prevent or discourage identity theft and to guard and protect individual privacy.

Protected Health Information (PHI)

As defined by the Health Insurance Portability and Accountability Act of 1996 (HIPAA). PHI under the US law is any information about health status, provision of health care, or payment for health care that is created or collected by a Covered Entity (or a third-party associate) that can be linked to a specific individual.

Education Records

As defined by the Family Educational Rights and Privacy Act of 1974 (FERPA). FERPA governs access to educational information and records by potential employers, publicly funded educational institutions, and foreign governments.

Customer Information

As defined by the Gramm-Leach-Bliley Act (GLB Act, GLBA or the Financial Modernization Act of 1999), requiring financial institutions to explain how they share and protect their customers' private information.

Card Holder Data

As defined by the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS is an information security standard that tells organization's how to handle branded credit cards from the major card schemes.

Confidential Personnel Information

As defined by the State Personnel Act.

Confidential Information

In accordance with the North Carolina Public Records Act. Includes trade secrets and similar related data.

Personal Data

As defined by The EU General Data Protection Regulation (GDPR).

In general, sensitive data is any data that reveals:

  • Racial or ethnic origin
  • Political opinion
  • Religious or philosophical beliefs
  • Trade union membership
  • Genetic data
  • Biometric data
  • Health data
  • Sex life or sexual orientation
  • Financial information (bank account numbers and credit card numbers)
  • Classified information

What is Personal Data?

Personal data (or personal information) is information that can identify an individual.

GDPR defines personal data as anything that directly identifies an individual such as a person's name, surname, phone number, social security number, driver's license number or any other personally identifiable information (PII).

Versus pseudonymous data or non-directly identifying information that does not allow direct identification but allows singling out of individual behaviour (such as serving a targeted at to a user at the right moment).

GDPR was established to set a clear distinction between directly identifying information and pseudonymous data.

GDPR encourages the use of pseudonymous information over directly identifying information as it reduces the risk of data breaches having adverse effects on individuals.

How to Measure Data Sensitivity

To determine how sensitive specific is and how it should be classified, think about the confidentiality, integrity and availability (CIA triad) of that information and how it would impact your organization or its customers if it was exposed.

This is a common way to measure data sensitivity and is a framework provided in the Federal Information Processing Standards (FIPS) by the National Institute of Standards and Technology (NIST).

What is Confidentiality?

Confidentiality is roughly equivalent to privacy.

Countermeasures that prevent unauthorized access to sensitive information, while ensuring the right people can still access it, are concerned with confidentiality.

These countermeasures range from simple awareness training to understanding the security risks associated with handling the information and how to guard against them, to sophisticated cybersecurity software.

Examples of confidentiality countermeasures:

  1. Data encryption
  2. Passwords
  3. Two-factor authentication
  4. Biometric verification
  5. Security tokens
  6. Key fobs
  7. Soft tokens
  8. Limiting where information appears
  9. Limiting the number of times information can be transmitted
  10. Storing on air gapped computers
  11. Storing on disconnected storage devices
  12. Storing in hard copy only

What is Integrity?

Integrity is about maintaining the consistency, accuracy and trustworthiness of data over its lifecycle.

Sensitive data, or sensitive information, should not be changed in transit and should not be able to be altered by unauthorized people (for example when a data breach happens).

Examples of integrity countermeasures:

  1. File permissions
  2. User access controls
  3. Audit logs
  4. Version control
  5. Cryptographic checksums
  6. Backups
  7. Redundancies

What is Availability?

Availability is concerned with ensuring all information systems and sensitive data is available when needed.

Examples of availability countermeasures:

  1. Maintaining hardware and making repairs immediately
  2. Patching software as soon as possible
  3. Providing adequate communication bandwidth
  4. Fast and adaptive disaster recovery with a comprehensive disaster recovery plan
  5. Safeguards against data loss or interruption during natural disasters and fire
  6. Extra security equipment and software such as firewalls and additional servers that guard against downtime and prevent denial-of-service (DoS) attacks

What is the Impact of Unauthorized Disclosure of Sensitive Data?

Data privacy is becoming more and more important. In over 80 countries, personally identifiable information (PII) is protected by information privacy laws that outline limits to collecting and using PII by public and private organizations.

These laws require organizations to give clear notice to individuals about what data is being collected, the reason for collecting and the planned uses of the data. In consent-based legal frameworks, like GDPR, explicit consent from the individual is required.

GDPR extends the scope of EU data protection laws to all foreign companies who process the data of EU residents. Requiring that all companies:

  • Provide data breach notifications
  • Appoint a data-protection officer
  • Require user consent for data processing
  • Anonymize data for privacy

The United States has similar laws dictating data breach disclosure, with all 50 US states having data breach laws in some form requiring:

  • Notification of those affect as soon as possible
  • Let the government know as soon as possible
  • Pay some sort of fine

Additionally, many other countries have enacted their own legislature regarding data privacy protection, and more are still in the process of doing so.

How to Protect Sensitive Data

The first step in protecting sensitive data is data classification.

Depending on data sensitivity, there are different levels of protection required. The key thing to understand is that not all data is equal and it is best to focus your data protection efforts on protecting sensitive data as defined above.

Examples of non-sensitive information:

  • Public information: Information that is already a matter of public record or knowledge
  • Routine business information: Business information that is routinely shared with anyone from inside or outside your organization

Effective information security starts with assessing what information you have and identifying who has access. Understanding how sensitive data moves into, through and out of your organization is essential to assessing potential vulnerabilities and cybersecurity risks.

This means taking inventory of everywhere your organization uses sensitive data and where you hand of sensitive data to third-party and fourth-party vendors.

This will allow you to understand how information flows through your organization and give you a complete picture of who sends personal information in your organization, who receives sensitive data, what information is collected, who keeps the information collected and who has access to the information.

How UpGuard Can Help You Protect Your Most Sensitive Data

At UpGuard, we can protect your business from data breaches, identify all of your data leaks, and help you continuously monitor the security posture of all your vendors. UpGuard also supports compliance across a myriad of security frameworks, including NIST, HIPAA, HECVAT, ISO 27001, and more!

What is Sensitive Data? | UpGuard (2024)

FAQs

What is Sensitive Data? | UpGuard? ›

Contents. Sensitive data is confidential information that must be kept safe and out of reach from all outsiders unless they have permission to access it. Access to sensitive data should be limited through sufficient data security and information security practices designed to prevent data leaks and data breaches.

What is considered as sensitive data? ›

Sensitive data examples:

Political beliefs. Religious beliefs. Genetic or biometric data. Mental health or sexual health.

What does sensitivity mean data? ›

Sensitive personal data, also known as special category data, is a specific set of “special categories” that must be treated with extra security.

How do you know if data is sensitive? ›

(14) Data is generally considered either Sensitive or Highly Sensitive if it contains Identifiable 'personal information' or identifiable health information. This includes: '[Information or an opinion] about an individual whose identity is apparent or can reasonably be ascertained from the information or opinion.

What is considered highly sensitive data? ›

Highly Sensitive data (HSD) currently include personal information that can lead to identity theft. HSD also includes health information that reveals an individual's health condition and/or medical history.

Which types of data are sensitive? ›

What is Classed as Sensitive Personal Data?
  • racial or ethnic origin.
  • political beliefs.
  • religious or philosophical beliefs.
  • trade union membership.
  • genetic or biometric data.
  • physical or mental health.
  • sex life or sexual orientation.

What is an example of sensitive information? ›

Sensitive private information also includes names, home addresses, driver's license numbers, phone numbers and dates of birth. Other information, such as race, ethnic origin and sexual orientation, is considered sensitive personal information.

What are the three types of sensitivity? ›

The 3 Different Types of Sensitivity
  • You're a “super sensor” (low sensory threshold). ...
  • You're a “super feeler” (ease of excitation). ...
  • You're an aesthete (aesthetic sensitivity).
May 8, 2023

How do you pass sensitive data? ›

Table of Contents
  1. Encrypt A File.
  2. Use a Password Manager & Enable 2FA.
  3. Adopt an Integrated File-Sharing Software.
  4. Opt for a Robust and Simple File-Sharing System.
  5. Adopt Secure Cloud Services.
  6. Use End-to-End Encryption.
Jan 20, 2023

What are the risks of sensitive data? ›

Sensitive data is vulnerable because it can have severe consequences if it falls into the wrong hands. Exposure can lead to reputational damage and financial losses. It can also breach user trust, ultimately compromising the organization's integrity. Sensitive data is critical.

What is the least sensitive data? ›

An organization may classify data as Restricted, Private or Public. In this instance, public data represents the least-sensitive data with the lowest security requirements, while restricted data is in the highest security classification and represents the most sensitive data.

What is sensitive data protected by? ›

Any organization operating with highly sensitive data should consider encryption to prevent unauthorized parties from accessing the data. Cryptographers code the data using complex algorithms and ciphers that protect data from being stolen or exposed.

What are the 4 types of sensitive information? ›

Sensitive data can be classified into four main types:
  • Public – Low data sensitivity or public classification.
  • Internal – Moderate data sensitivity or internal classification.
  • Confidential – High data sensitivity or confidential classification.
  • Restricted – Extremely sensitive data or restricted classification.
Aug 6, 2020

What are three types of sensitive information? ›

What Are Some Types of Sensitive Information? Sensitive information typically falls into three categories: sensitive PII, business information, and classified information.

What is the difference between confidential and sensitive data? ›

In business, sensitive information includes anything that could damage the organization. Not only customer data but also trade secrets, financial data and any plans that it possesses, etc., are all regarded as confidential.

What is the difference between confidential data and sensitive data? ›

Some examples of confidential data include employment contracts or student loan records. Restricted: This is highly sensitive data that if leaked could pose serious financial, legal or regulatory consequences towards an organization.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 5728

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.