Building a sensitivity labeling strategy with Microsoft Purview: Protecting data in the age of Copilot

by | Feb 15, 2025 | Data Security, Microsoft Copilot | 0 comments

Data security is no longer an afterthought—it’s a fundamental requirement in a world where AI-driven tools like Microsoft 365 Copilot are integrated into daily business processes. Sensitivity labels play a crucial role in governing access, ensuring compliance, preventing data leaks, and visually marking confidential content.

Microsoft Purview Information Protection allows organizations to classify and protect their data with sensitivity labels that define how information can be shared, accessed, and secured. Labels can automatically encrypt content, restrict access, prevent sharing, and even apply watermarks to clearly indicate document confidentiality. Watermarking is particularly useful in preventing accidental data leaks, as it visibly signals document sensitivity, reminding users to handle it with care.

This is especially important in the context of Copilot for Microsoft 365, as Copilot leverages organizational data to generate responses. Without proper labeling and protection, sensitive information could be exposed to unauthorized users, leading to compliance risks and data breaches. By automating classification and watermarking sensitive content, organizations can ensure that AI-generated outputs respect security policies and maintain trust in data handling.

Purview Information Protection: The Foundation for Securing Copilot

Microsoft Purview Information Protection (MPIP) provides a framework for classifying, labeling, and protecting data across Microsoft 365 applications and beyond. Sensitivity labels allow organizations to:

  • Classify data based on confidentiality levels.
  • Apply protection policies, such as encryption and access restrictions.
  • Control external sharing and data loss prevention (DLP) measures.
  • Monitor and audit label usage to track compliance.

For Copilot, Purview sensitivity labels ensure that AI-driven content generation adheres to organizational security policies. If a document is labeled “Confidential – Finance,” Copilot will respect this classification, ensuring that only authorized users can access related insights.

What labels should an organization consider?

A well-structured labeling strategy starts with defining clear classification categories that align with business needs and regulatory requirements. Sensitivity labels should be broad enough to cover organization-wide security needs while also granular enough to protect department-specific data.

Common sensitivity label categories

While every organization is unique, a typical sensitivity labeling structure might include the following:

  1. Public – No restrictions, suitable for general use (e.g., marketing brochures, public announcements).
  2. Internal Use Only – Restricted to employees, prevents external sharing (e.g., internal policies, team updates).
  3. Confidential – Limited to specific teams, applies encryption (e.g., financial reports, budget plans).
  4. Highly Confidential – Strict access control with encryption, watermarking, and restricted external sharing (e.g., M&A documents, executive strategy plans).
  5. Restricted – Most sensitive data, accessible only to designated individuals or departments (e.g., legal contracts, board meeting minutes).

Department-specific sensitivity labels

Beyond broad organizational categories, departments often require specific sensitivity labels to protect data that should never leave their domain. Some examples include:

Label Name Department Use Case Protection Settings
HR Confidential HR Employee records, salary information, performance reviews Restrict access to HR team only, prevent external sharing
Legal Privileged Legal Attorney-client privileged documents, contracts Enforce encryption, restrict access to legal personnel
Finance Restricted Finance Financial statements, audit reports Encryption, limited to finance department
R&D Confidential Research & Development Intellectual property, product designs Block sharing outside R&D team, enforce watermarks
Executive Restricted C-Suite & Board CEO and board-level strategy, acquisitions Restricted to named executives, strict access control

Why department-specific labels matter

Department-based labels help ensure data does not accidentally leave a designated business unit, reducing security risks and improving compliance. For example:

  • An “HR Confidential” label ensures that salary data, contracts, and employee performance reviews remain within the HR department.
  • A “Legal Privileged” label ensures that only the legal team can access sensitive contracts, reducing the risk of exposure.
  • A “Finance Restricted” label prevents budget documents and financial reports from being shared externally, helping with SOX and GDPR compliance.

Automating label assignment

Organizations can automate label assignment using Microsoft Purview’s machine learning and content inspection to detect sensitive content and apply the right label. For example:

  • If an Excel file contains employee ID numbers or tax information, it can automatically receive the HR Confidential label.
  • A document with legal disclaimers can be automatically tagged as Legal Privileged.

Combining labels with Copilot

Sensitivity labels also ensure Microsoft 365 Copilot respects data protection policies. For example:

  • HR Confidential → Prevents Copilot from summarizing performance reviews in shared spaces.
  • Legal Privileged → Blocks Copilot from extracting contract details into an email draft.
  • Finance Restricted → Ensures Copilot doesn’t surface financial reports in general team meetings.

By combining broad and department-specific labels, organizations enhance data security, prevent leaks, and maintain compliance while enabling employees to work efficiently with Microsoft Purview and Copilot.

Who should have access to a certain label?

Not all users should be able to see, apply, or modify all sensitivity labels. Implementing role-based access control (RBAC) ensures that labels are applied correctly and prevents users from misclassifying or mishandling sensitive data

Defining access levels for sensitivity labels

Sensitivity labels should follow the principle of least privilege; meaning users and departments should only have access to the labels they need for their job function.

Label Name Who Can Apply? Who Can Access? Additional Controls
Public All employees Everyone No restrictions
Internal Use Only Employees & contractors Employees only External sharing blocked
Confidential – Finance Finance managers, CFO office Finance team, C-Suite Encryption, Copilot VIEW allowed, EXTRACT blocked
Highly Confidential – M&A M&A team, select executives M&A team, CFO, CEO Watermarking, Copilot blocked
HR Confidential HR managers, legal team HR department only Strict internal access, Copilot blocked
Legal Privileged Legal team, compliance officers Legal team only Encryption, watermarking, Copilot blocked
Executive Restricted C-Suite, Board members CEO, Board, authorized executives Strict access control, no external sharing, Copilot blocked

Role-based access considerations

  1. Standard Employees: Can apply Internal Use Only labels but cannot access Confidential or Highly Confidential documents.
  2. Department-Specific Teams:

    • Finance team can apply Confidential – Finance labels but cannot override HR or Legal labels.
    • HR team can apply HR Confidential but cannot access Finance or Legal data.
    • Legal team can apply Legal Privileged but cannot modify Executive Restricted documents.
  3. Executives & C-Suite: Can view most confidential data but require explicit approval to access Highly Confidential or Executive Restricted data.

Example: Sensitivity labeling in a large organization

Sample company: Global Financial Corporation (GFC)

GFC is a multinational banking firm implementing Microsoft Purview Sensitivity Labels to secure sensitive financial data while leveraging Microsoft 365 Copilot to enhance productivity. The challenge is ensuring AI-driven insights comply with data security policies while allowing employees to work efficiently.

Sensitivity labels used in GFC

GFC has a combination of broad organizational labels and department-specific labels to enforce granular data protection policies.

Label Name Department/Scope Use Case Protection Settings Copilot Permissions
Public Organization-wide Marketing materials, press releases No restrictions Copilot can fully use
Internal Use Only Employees Internal newsletters, company-wide updates Block external sharing Copilot can EXTRACT content
Confidential – Finance Finance Budget reports, tax documents Encryption, Finance team only Copilot can VIEW but not EXTRACT
Highly Confidential – M&A M&A Team Mergers & acquisitions strategy Strict access control, watermarking, encryption Copilot access blocked
HR Confidential HR Employee records, salary data, contracts HR team only, no external sharing Copilot access blocked
Legal Privileged Legal Contracts, litigation documents Enforce encryption, Legal team only Copilot access blocked
Executive Restricted C-Suite & Board CEO-level strategy, financial forecasts Restricted to executives, encryption Copilot access blocked

Access & labeling policies in GFC

  • Role-Based Access Control (RBAC):

    • Finance team can apply Confidential – Finance labels but cannot override Highly Confidential – M&Alabels.
    • HR team can apply HR Confidential but cannot access Finance data.
    • Executives can view all Confidential labels but require explicit approval for Highly Confidential data.
  • Automatic Labeling Policies:

    • If a document contains employee salary data, it is automatically labeled HR Confidential.
    • If a file includes legal disclaimers, it is assigned Legal Privileged protection.
    • If AI detects the presence of M&A deal terms, it applies Highly Confidential – M&A restriction

    How sensitivity labels control Copilot usage in GFC

    Copilot follows label permissions to ensure that only appropriate data is processed, summarized, or extracted:

    1. Public & Internal Data → Copilot Fully Accessible

      • Copilot can retrieve, summarize, and generate content based on Internal Use Only documents.
    2. Confidential Data → Limited Copilot Access

      • VIEW permissions allow Copilot to read financial reports, but EXTRACT is disabled, preventing it from inserting financial figures into emails.
    3. Highly Confidential & Restricted Data → Copilot Blocked

      • Copilot cannot process, summarize, or extract data from files labeled Highly Confidential – M&A, HR Confidential, Legal Privileged, or Executive Restricted.

    Practical example of Copilot interacting with labeled data

    Scenario: A finance employee drafts a board meeting summary using Copilot for Word.

    • Copilot can reference “Confidential – Finance” reports (VIEW allowed).
    • Copilot cannot pull figures from Highly Confidential – M&A documents (EXTRACT denied).
    • If the employee tries to insert an HR Confidential document, Copilot blocks access entirely.

    Scenario: An HR manager asks Copilot to draft an email about upcoming promotions.

    • If the document contains HR Confidential details (e.g., salary increases), Copilot refuses to include content.
    • If the document is Internal Use Only, Copilot can summarize the non-sensitive parts.

    Conclusion

    As organizations increasingly adopt AI-driven tools like Microsoft 365 Copilot, the importance of sensitivity labelinghas never been greater. Data security and governance are no longer optional—they are fundamental to ensuring compliance, preventing leaks, and maintaining trust.

    A well-defined sensitivity labeling strategy enables organizations to:

    • Classify and protect data automatically across Microsoft 365 applications.
    • Restrict access based on roles and departments, ensuring sensitive content stays where it belongs.
    • Control how Microsoft 365 Copilot interacts with labeled data, preventing AI from surfacing confidential information in unauthorized contexts.
    • Ensure compliance with regulations like GDPR, HIPAA, and ISO 27001 by applying encryption, access controls, and data loss prevention (DLP) policies.

    Key takeaways

    • Sensitivity labels do more than control access—they also enforce encryption, restrict sharing, and apply visual markers like watermarks to reinforce security.
    • Department-specific labels, such as HR Confidential and Legal Privileged, help prevent sensitive data from leaving its intended domain.
    • Microsoft 365 Copilot can only process labeled content if it has the correct permissions, making it essential to configure VIEW and EXTRACT settings appropriately.
    • Automatic labeling policies in Microsoft Purview reduce human error, ensuring consistency in data protection.

    By taking a proactive approach to sensitivity labeling, organizations can confidently leverage AI-powered productivity tools like Copilot while maintaining data security, regulatory compliance, and business integrity.

    Now is the time to implement a structured sensitivity labeling strategy to safeguard your organization’s data and ensure AI-powered collaboration remains secure.

    Author