The Purview Labeling Mistake Almost Every Organization Makes
- E.C. Scherer

- Mar 18
- 4 min read
One of the most common questions I hear during deployments is:
“Why don’t we have a Client label?”
It usually comes up early in conversations about sensitivity labels. Someone is thinking about the types of information the organization handles and trying to map that into labels.
My answer is usually some version of this: Think of labels as classifications of data, not descriptions of what the data is about.
At one organization I worked with, their information security policy defined four classifications:
Public
Internal
Confidential
Highly Confidential
That policy became the foundation of the labeling strategy.
When someone asked why we didn’t have a Client label, the answer was simple:
Client data can span multiple classifications.
A client marketing brochure might be Public.
A client proposal might be Confidential.
A contract or financial record might be Highly Confidential.
Notes from the field: The subject of the document doesn’t determine its classification. The sensitivity of the information does.
The Mental Model That Causes Problems
When organizations start designing labels, the conversation often goes in a different direction.
Instead of classifications, the discussion becomes about things like:
PII
PHI
Client Data
Legal
HR
Financial
What’s happening here is that people are trying to solve several different problems at once.
Sometimes they are trying to:
tag documents by sensitive information types
map labels to compliance requirements
understand what their data estate actually contains
Those are all valid goals.
But sensitivity labels aren’t designed to solve those problems directly. When they’re used that way, things start to break down.
Notes from the field: The moment a label discussion starts with “We need labels for PII, PHI, Client, Legal, and HR,” I know we’re about to build a taxonomy instead of a security model.
What Sensitivity Labels Are Actually For
A sensitivity label should represent the classification of the data and the controls that apply to it.
A good label model does three things well.
First, it maps directly to security controls.
If something is labeled Highly Confidential, that should automatically trigger specific protections:
encryption
sharing restrictions
DLP policies
Second, it should be reusable across sensitive data types.
The same label should work whether the document contains:
PII
PHI
financial information
proprietary intellectual property
Third, it should be clear and concise for users.
Users shouldn’t have to stop and think:
“Is this more PII or financial data?”
They should only have to answer one question:
How sensitive is this information?
Notes from the field: If a user has to decide whether a document is more “PII” or “financial data,” the labeling model is doing too much work.

Why Policy Matters More Than Label Names
When I walk into a new environment, I care less about what the labels are called.
What matters is what the information security policy says. Confidential could be called Restricted. Public could be called General.
The names don’t matter nearly as much as the handling requirements behind them.
If a policy says:
Contract information is considered Highly Confidential and should not be stored outside of Microsoft 365.
That statement defines your baseline.
From there, the label exists to enforce the controls tied to that classification.
What Happens When Labels Are Built the Wrong Way
When labels are designed around sensitive data types instead of classifications, a few things usually happen.
Policies (both organizational and technical) start to conflict with each other.
New labels have to be created every time a new business scenario appears.
Users are forced to decide whether a document is more:
PII
Financial data
PHI
Security controls become redundant or inconsistent.
Administrative overhead grows quickly.
And eventually, the entire system starts to feel like guesswork. Instead of simplifying data security, the labeling strategy makes it harder.

Security Blanket Nature Break
Step away from the dashboards for a moment.

This Pink Lady’s Slipper (Cypripedium acaule) grows in quiet forest understories and can take years before producing a flower.
When you find one, there’s no confusion about what it is, no debate on how to classify it.
Clear categories make complex systems easier to understand.
The Goal of a Good Label Strategy
A good labeling strategy should make data protection predictable and scalable. Labels describe the sensitivity of the information. Controls enforce how that information must be handled.
A good labeling strategy should survive organizational change. If a merger, new regulation, or new business unit forces a redesign, the labels were probably tied to the wrong thing.
And users only need to answer a simple question when they create or share something:
How sensitive is this?
When the model works that way, labels become something people can actually use without overthinking them.
And the security controls tied to those labels start working the way they were intended to.

Comments