Information Classification and Handling Policy
Information Classification and Handling Policy
1.2 APPLICABILITY
This policy represents WSP’s global position and takes precedence over all other relevant policies which are
developed at a local level. The policy applies to all:
— WSP information including information WSP is managing on behalf of WSP clients;
— Regions, business units and services;
— WSP employees and independent consultants;
— WSP contractors and sub-contractors or anyone else working on behalf of WSP;
— Third party commercial service providers.
1.3 POLICY
All information (regardless of its format) owned, created, received, stored and processed by WSP must be
classified as defined in this Policy, according to the sensitivity of its contents, unless a client has specified, or
we are accountable for, supplemental classification and handling requirements within a particular contract.
Classification controls should take account of the organizational needs for sharing or restricting the
information and the associated impacts and risks (e.g. consequences if information is handled
inappropriately). All information must be classified into one of following categories:
— Public – information that is available to the general public and is intended for distribution outside WSP.
There would be no impact on WSP, its employees, or clients if this type of information was mishandled
or accidentally released.
— Internal – information that is only intended for internal distribution among WSP employees,
independent consultants, contractors, sub-contractors, clients and authorized third parties. In the
majority of instances there would be no significant impact on WSP, its employees or clients if this type
of information was mishandled or accidentally released.
— Confidential – information which is protected by WSP policies and/or legal contracts or by any
legislation or regulations. The unauthorized or accidental disclosure of this information could adversely
impact WSP, its clients, its employees and its business partners.
— Restricted – highly sensitive confidential information. The unauthorized or accidental disclosure of this
information would seriously and adversely impact WSP, its clients, its employees and its business
partners.
The information classification matrix on page 4 provides examples of the different categories.
July 2017
Uncontrolled if printed
wsp.com Page 3
1.4 WSP INFORMATION CLASSIFICATION MATRIX
Examples • Marketing brochures • Internal telephone and email • Client or employee personal
directory information (except that which is • Employee sensitive information (i.e.
• Employee brochures
The examples are only • Internal policies and procedures restricted) ethnic origin, political opinions,
• News or media releases
provided for guidance (excluding those published on the • Client and project information that is religious or philosophical beliefs,
purposes and should • Pamphlets
web) designated as or required to be treated trade union membership, data about
not be seen as • Advertisements
• Training manuals and as confidential under the terms of the health or sex life and criminal record
exhaustive lists • Web content contract
documentation data)
• Job postings • Employee performance records
• Employee newsletters and intranet • Childcare/adoption information
announcements • Financial information/budgetary reports
• Addiction services information
• Inter-office memorandums • Audit reports
(which are neither • Draft project reports • Disability services information
confidential nor restricted) • Vendor contracts/commercially • Unpublished financial reports
sensitive information • Strategic corporate plans
• Information covered by non-disclosure/ • Passwords / cryptographic private
confidentiality agreements keys
• Business continuity plans • Information designated by a Client as
• Incident reports Highly Sensitive/Restricted/Highly
Confidential or other
• Information collected as part of
internal/criminal/HR investigations
Possible consequences None In the majority of instances the Unauthorized disclosure could adversely Unauthorized disclosure would
if information is unauthorized disclosure would not impact WSP, its employees, its clients and its seriously and adversely impact WSP, its
mishandled significantly impact WSP, its business partners. employees, its clients and its business
employees, or its clients. partners.
July 2017
Uncontrolled if printed
wsp.com Page 4
1.5 RESPONSIBILITIES
This document is owned by the WSP Chief Information Security Officer, however the application of the
policy, both in terms of information classification and handling, is the responsibility of all WSP
employees and all managers.
1.8 EMPLOYEES
All employees or agents acting on behalf of WSP are responsible for the implementation of this policy and
for ensuring information is classified and handled to the appropriate level as defined within this policy,
and that it remains accurate, complete and available.
1.10 ENFORCEMENT
WSP reserves the right to take such action as it deems appropriate against individuals who breach the
conditions of this policy. WSP employees, independent consultants, contractors, or sub-contractors who
breach this policy may be subject to disciplinary action, including suspension and dismissal.
Breaches of this policy by a third party commercial service provider may lead to the withdrawal of WSP
information technology resources to that third party commercial service provider and/or the
cancellation of any contract(s) between WSP and the third party commercial service provider.
July 2017
Uncontrolled if printed
wsp.com Page 5
1.12 INFORMATION CLASSIFICATION - COMMUNICATIONS
Email Communications No special handling required No special handling required Ensure that the name and email address of the Ensure that the name and email address of the
(both internal and intended recipient are correct. intended recipient are correct.
external)
The email message should be clearly marked as The email message is clearly marked as
“Confidential” and classified within Outlook as “Restricted” and classified within Outlook as
Private. Confidential.
Only the minimum amount of confidential Any email attachment, either internal or external
information as is necessary for a given function(s) is encrypted or password protected with the
to be carried out is to be sent. password communicated via a separate medium
Any email being sent externally has its attachment e.g. SMS, and the email body contains no restricted
encrypted or is password protected with the information.
password communicated via a separate medium e.g. Only the minimum amount of restricted
SMS. The email body contains no restricted information as is necessary for a given function(s)
information. to be carried out is to be sent.
If the email contains employee or client personal If the email contains employee or client personal
information, the information must only be information, the information must only be
contained within an attachment which is contained within an attachment which is
encrypted. Transfer must be in accordance with all encrypted. Transfer must be in accordance with all
applicable data protection and privacy legislation applicable data protection and privacy legislation
and any applicable corporate Privacy Policy. and any applicable corporate Privacy Policy.
July 2017
Uncontrolled if printed
wsp.com Page 6
INFORMATION CLASSIFICATION - COMMUNICATIONS
July 2017
Uncontrolled if printed
wsp.com Page 7
1.13 INFORMATION CLASSIFICATION - STORAGE
July 2017
Uncontrolled if printed
wsp.com Page 8
1.14 INFORMATION CLASSIFICATION - HANDLING
Electronic information No special requirements. No special requirements. When creating, utilizing and replicating When creating, utilizing and replicating restricted
handling Note: Where the information, confidential information, documents, or records, information, documents, or records, access to any
(Document creation, image or logo is to be access to any such information must remain such information must remain limited.
replication etc.) replicated/published and is the limited. All documents containing personal information
property of a client, written client All documents containing personal information must be encrypted or password protected at all
consent is required prior to must be encrypted or password protected at all times.
publication. times.
July 2017
Uncontrolled if printed
wsp.com Page 9
INFORMATION CLASSIFICATION - HANDLING
Voice Recordings Any recording of calls, video Any recording of calls, video that Any recording of calls, video that captures sound or Any recording of calls, video that captures sound or in-
that captures sound or in- captures sound or in-person in-person conversations must have the necessary person conversations must have the necessary level of
person conversations must have conversations must have the level of consent, from one or all parties involved. If in consent, from one or all parties involved. If in doubt
the necessary level of consent, necessary level of consent, from one doubt ensure all parties know the conversation is ensure all parties know the conversation is being
from one or all parties involved. or all parties involved. If in doubt being recorded. recorded.
If in doubt ensure all parties ensure all parties know the
know the conversation is being conversation is being recorded. Note that restricted information should not be
recorded. discussed in open telephone or video communication
and recording of calls and conversations is prohibited.
Disposal All laptop computers, desktop All laptop computers, desktop All laptop computers, desktop computers, mobile All laptop computers, desktop computers, mobile
computers, mobile computer computers, mobile computer computer devices, external/portable hard drives, computer devices, external/portable hard drives, USB
devices, external/portable hard devices, external/portable hard USB memory keys and photocopier, scanner or memory keys and photocopier, scanner or printer
drives, USB memory keys and drives, USB memory keys and printer drives must be disposed of in accordance with drives must be disposed of in accordance with local
photocopier, scanner or printer photocopier, scanner or printer local legal, financial and environmental regulations, legal, financial and environmental regulations to a
drives must be disposed of in drives must be disposed of in except where specified by contract. minimum global standard, except where specified by
accordance with local, financial accordance with local, financial and contract.
and environmental regulations. environmental regulations. If leased, the supplier needs to evidence a level of
control in destruction of any potential data stored on If leased, the supplier needs to evidence a level of
the device drives which would meet our standards. control in destruction of any potential data stored on
the device drives which would meet our standards.
Old CD/DVDs, diskettes or magnetic tape that contain
confidential information must be physically Old CD/DVDs, diskettes or magnetic tape that contain
destroyed in such a way that it is impossible to restricted information must be physically destroyed in
recover any of the confidential information stored on such a way that it is impossible to recover any of the
the device. restricted information stored on the device.
July 2017
Uncontrolled if printed
wsp.com Page 10
1.15 INFORMATION CLASSIFICATION - SECURITY
July 2017
Uncontrolled if printed
wsp.com Page 11
1.16 QUALITY MANAGEMENT
Status Approved
Mark Riley
Global Head Information Security Governance & Compliance
62-64 Hills Road, Cambridge. CB2 1LA. United Kingdom
Mobile: +44 (0)7481 166859
Email: [email protected]
This policy may be updated at any time (without notice) to ensure changes to WSP’s organization structure
and/or business practices are properly reflected in the policy. Please ensure you check the WSP global
intranet for the most up to date version of this policy.
July 2017
Uncontrolled if printed
wsp.com Page 12