Wednesday, January 16, 2019

Personally Identifiable Information (PII) Essay

Personally Identifiable Information (PII) refers to teaching that mass be used to distinguish or trace an individuals identity, either alone or when combined with opposite personal or identifying schooling that is linked or linkable to a specific individual. 1 PII heap include but is not limited to a full name, an address, a home, office or mobile telephone numbers, an email address, a cordial certification number or other form of national ID number, an network Protocol address or a fingerprint or other biometric data . Non-PII can become PII whenever additional information is made accessible that when combined with existing information, could be used to identify an individual.Most people dont give a second thought to the information they ar asked to provide when apply ecommerce sites or creating accounts on various sites such(prenominal) as Facebook and Twitter. What is the data you entered being used for? What happens to this information once you suffer entered it and completed your transaction with a business? How is this information stored and for how long? How is my information protected from theft? Will my information be sold to 3rd parties? What are my rights should my personal data be lost or compromised? These are questions everyone should ask because your information in the wrong hands can be used to steal your money, steal your identity or both.According to the privateness Rights Clearinghouse, from April 2005 to April 2012 there were 3,062 data breaches nationwide affecting more than 546,000,000 PII records . Businesses mystify an ethical and legal obligation to protect your PII. Not only will a breach and subsequent loss of data cost businesses money, it will withal affect their reputations. When collecting and storing PII businesses must(prenominal) set policies on how the data is received, accessed, stored, genetical and released to third parties. Protecting PII involves a combination of only collecting and storing data that is needed to complete the task or transaction at hand, using encryption to store and transmit data, data-loss prevention and policy training and respect .Unfortunately there are not many standardized laws immaterial of the Health Insurance Portability and Accountability Act (HIPAA)2 exist that address the collection, depot and use of PII. There are even different standards among states when it comes to the notification of security breaches involving personal information. Forty-six states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands each have different legislation dealing with notification of the theft of PII.Businesses have to vouch they are aware of the various Federal and State laws dealing with PII. They must enact corporate policies and train their employees in the collection, handling, processing, storage and transmission of PII. Individuals must be vigilant and read the privacy policies of companies they do business with online so they are aware of what can and will be make with their personal information.

No comments:

Post a Comment