cybersecurity.yale.edu/dataclassification
Preview meta tags from the cybersecurity.yale.edu website.
Linked Hostnames
3Search Engine Appearance
Data Classification Guideline (1604 GD.01)
Knowing how to work securely starts with knowing the risk of the data you work with. This page explains how to classify Yale data as high, moderate, or low risk. Data classification depends on the data's importance, sensitivity, and potential for misuse.
Bing
Data Classification Guideline (1604 GD.01)
Knowing how to work securely starts with knowing the risk of the data you work with. This page explains how to classify Yale data as high, moderate, or low risk. Data classification depends on the data's importance, sensitivity, and potential for misuse.
DuckDuckGo
Data Classification Guideline (1604 GD.01)
Knowing how to work securely starts with knowing the risk of the data you work with. This page explains how to classify Yale data as high, moderate, or low risk. Data classification depends on the data's importance, sensitivity, and potential for misuse.
General Meta Tags
8- titleData Classification Guideline (1604 GD.01)
- charsetutf-8
- descriptionKnowing how to work securely starts with knowing the risk of the data you work with. This page explains how to classify Yale data as high, moderate, or low risk. Data classification depends on the data's importance, sensitivity, and potential for misuse.
- robotsmax-image-preview:standard
- GeneratorDrupal 10 (https://www.drupal.org)
Open Graph Meta Tags
5- og:site_nameYale Cybersecurity
- og:typeGuide
- og:titleData Classification Guideline (1604 GD.01)
- og:descriptionKnowing how to work securely starts with knowing the risk of the data you work with. This page explains how to classify Yale data as high, moderate, or low risk. Data classification depends on the data's importance, sensitivity, and potential for misuse.
- og:updated_time2022-06-10T15:05:52+0000
Twitter Meta Tags
1- twitter:cardsummary
Link Tags
4- canonicalhttps://cybersecurity.yale.edu/data-classification
- icon/themes/custom/yale_infosec/favicon.ico
- stylesheet/sites/default/files/css/css_XbrLHTPNgxdglimGaGt347HahVtZ7IJzyPhIKglFLKw.css?delta=0&language=en&theme=yale_infosec&include=eJxFieEKwyAMBl8omEcqcWY27KuKqdvs0xfGSv8c3F2EHJNRJVnJpN8dVl6c-miC8Fdq0iV3aatf5y5hlDYizFdN5NN33TiKK71NP84_hq2mAaUp0MXKs7o-OKNGwQmsPDI2
- stylesheet/sites/default/files/css/css_s_hJspS6wmEg7cvHubIWvxRrZIurlqYjgY2EXtg4LlI.css?delta=1&language=en&theme=yale_infosec&include=eJxFieEKwyAMBl8omEcqcWY27KuKqdvs0xfGSv8c3F2EHJNRJVnJpN8dVl6c-miC8Fdq0iV3aatf5y5hlDYizFdN5NN33TiKK71NP84_hq2mAaUp0MXKs7o-OKNGwQmsPDI2
Emails
1Links
60- https://cybersecurity.yale.edu
- https://cybersecurity.yale.edu/about
- https://cybersecurity.yale.edu/about/contact-us
- https://cybersecurity.yale.edu/apply-updates
- https://cybersecurity.yale.edu/availability-requirement