A PDF version of Data Security Levels is available for download.
With an ever increasing quantity of data and people wanting access to that data, it is necessary to define Data Security Levels and to determine what is and is not possible at each of those levels.
This Business White Paper, defines what the Data Security Levels mean and from there, the impact on the business.
The majority of data within a business will be at Level 8 or higher.
These concepts are covered practically in our Professional Course - Master of Business Technology.
This the most secure level, to be classified as Level 1, the data must never have existed. This includes written on any medium, or spoken about by an individual. It may only be thought about and never communicated.
Transmission | Not possible |
Network | Not applicable |
Storage | Prohibited |
Availability | Nobody |
Accessibility | Not applicable |
This is the most secure any information can be.
At Level 2 the data must never have been communicated to anybody. The person or entity that created the data must be the sole user of that data.
The implication, is that the data is never stored in any kind of physical or electronic media. While this does not preclude electronic storage it certainly is not encouraged.
Transmission | Prohibited |
Network | Not applicable |
Storage | Prohibited |
Availability | Creator |
Accessibility | None |
The data may be stored and processed in an encrypted system. This maybe electronic or a physical medium such as paper. The systems may not be connected to an external network. The data may not be transported from this location.
Transmission | Prohibited |
Network | Not applicable |
Storage | Maximum encryption |
Availability | Authorized individuals |
Accessibility | Severely restricted |
The data must be stored and processed in an encrypted system. The data may be transferred in an encrypted form. The data must always remain under the control of a person. Very strong encryption must be used. The data may not be transmitted in any form over a public network.
Transmission | Very high encryption |
Network | Private and secure |
Storage | Very high encryption |
Availability | Authorized individuals |
Accessibility | Very restricted |
At all times the data must be encrypted. It may be transmitted in an encrypted form over a public network. The strong encryption must be used at all times.
Transmission | Strong encryption |
Network | Public |
Storage | Strong encryption |
Availability | Authorized individuals |
Accessibility | Restricted |
The data is always encrypted during transmission and transportation. The information is encrypted while stored and only those who need to access the data have access.
Transmission | Encryption |
Network | Public |
Storage | Encryption |
Availability | Authorized individuals |
Accessibility | Restricted |
Some data is encrypted, but generally weak encryption is used, encryption is used while transmitting the data and reasonable efforts are made to keep the information confidential.
Transmission | Weak encryption |
Network | Public |
Storage | Partial encryption |
Availability | Most individuals |
Accessibility | Broad access |
No encryption is used to store the data and weak encryption is used during its transmission.
Transmission | Weak encryption |
Network | Public |
Storage | Plain text |
Availability | All individuals |
Accessibility | Broad access |
No encryption is used at all, any security is by obscurity.
Transmission | Plain text |
Network | Public |
Storage | Plain text |
Availability | All individuals |
Accessibility | Broad access |
Widely published on the internet, available via or on social media and is generally available via a simple search.
Transmission | Plain text |
Network | Public |
Storage | Plain text |
Availability | All individuals |
Accessibility | Universal access |
This is the least secure any information can be.
It is important, that at all times care is taken to ensure that data remains within its predetermine Level. It is all too easy for Data Security to become lax and data begins to drift to less secure Levels.
Data Security and the process, procedures and support documentation and training as all specialist areas for DVANA. Our DUMP-STOP-BAR system is a specially designed system to improve data security of an organization. We’re more than happy to help you with any concerns you might have with: