Identify information protection requirements based on business risk related to unauthorized disclosure or data/system corruption.
Identify data value in accordance with organization policy.
Ensure sensitive and/or critical information is provided appropriate protection/controls.
Lower costs by only protecting sensitive information.
Standardize classification labeling throughout the organization.
Alert employees and other authorized personnel to protection requirements.
Comply with privacy law, regulations, etc.