FAQ

  • What the meeting deals with

    The digital meeting discusses general and open information that can be shared with others.

    K-value: 0 — negligible

    Information Classification Support for Digital Meetings

    • Interception does not matter
    • Participation can take place from open environments, e.g. trains, airports, etc.
    • Chat and recording can be used

    The following technology solutions can be used

    All technical solutions can be used

  • What the meeting deals with

    The digital meeting discusses general and open information that can be shared with others.

    K-value: 1 — Low (moderate)

    Information Classification Support for Digital Meetings

    • Interception does not matter
    • Participation can take place from open environments, such as trains, airports, etc. (if you participate from an open environment, think about what you are saying and if someone else can hear what is being said)
    • Chat and recording can be used

    The following technology solutions can be used

    Teams, Zoom

     


     

  • What the meeting deals with


    The digital meeting discusses ongoing procurements, some research data, some financial information and other information that can be classified as medium sensitive.

    K-value: 2 — means (significant)

    Information Classification Support for Digital Meetings

    • The meeting should not be possible to intercept
    • The meeting should not be recorded
    • The chat function should not be used (closed in connection with the appointment)
    • Participation shall not take place from an open environment

    The following technology solutions can be used

    Teams, Zoom


     


     

     

  • What the meeting deals with

    The digital meeting discusses sensitive personal data or data related to people with protected identity, passwords, crypto keys, firewall rules, especially sensitive research data

    K-value: 3 — High (serious)

    Information Classification Support for Digital Meetings

    • The meeting cannot be intercepted
    • The meeting cannot be recorded
    • The chat function must not be used
    • Lobby function to be used
    • The identity of the users shall be checked:
    • Participation must not take place from an open environment
    • No other person should be able to share what is said.

    The following technology solutions can be used

    Zoom with encryption — instruction for activation

  • Information covered by security protection (espionage, secrecy according to national security, terrorism).

    Mid Sweden University has no technical solution where information covered by security protection can be discussed.

The page was updated 1/3/2023