Security Officers can classify data within security classes. Data is classified
within one or more security classes, ensuring multiple access rules apply. This section
defines the methods in which data is classified within a given security
class.
The owner of the security class declassifies an item or items from the
class. Declassification must conform to all legal requirements and methods. Physical copies
of authorizations, when routes are not used, should be included with the security class
detailing the items declassified, the date of declassification, and authorization
documentation.