Identifying Information Sensitivity |
1. Mission Information |
If the information, software applications, or computer systems in this category are altered, destroyed, or made unavailable, the impact on NASA could be catastrophic. The result could be a loss of assets, a threat to life, or prevention of NASA from preparing or training for a critical mission. Examples are information on:
|
2. Business and Restricted Technology Information |
Information, software applications, or computer systems that support NASA's business and technological needs fall within this category. Disclosure of this type of information could result in: lawsuits and civil or criminal prosecution against NASA employees or its contractors; contract protests; or the illegal export of technology. Examples include:
|
3. Scientific, Engineering, and Research Information |
This category contains information that supports basic research, engineering, and technology development but is less restricted against public disclosure. Alteration, destruction, unauthorized disclosure, or unavailability of the systems, application, or information would have an adverse or severe impact on individual projects, scientists, or engineers. The impact is primarily on an individual project rather than on the Agency. |
4. Administrative Information |
Administrative information consists of system, applications, and information that supports NASA's daily activities, such as electronic mail, forms processing, and management reporting. This type of information is considered sensitive in that if released to the public, it could possibly compromise an employee or job-related information. Administrative information includes, but is not limited to:
|
5. Public Access Information |
Information in this category is intended for public use or disclosure. The loss, alteration, or unavailability of the information would have little direct impact on NASA's missions, but might expose the Agency to embarrassment, loss of credibility, or public ridicule. |
![]() |
Be cautious when dealing with information! Determine the classification and sensitivity level of the information before you send it over a LAN, telephone, e-mail message, or include it on a web site. Classified information should never be sent over an unclassified LAN, discussed over a telephone, left as a voice message, or included in a web site intended for the public. Consider the following points when handling sensitive information:
|
![]() |
|
|