Preview

Pii Research Paper

Good Essays
Open Document
Open Document
484 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pii Research Paper
Personally Identifiable Information (PII) refers to information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual. 1 PII can include but is not limited to; a full name, an address, a home, office or mobile telephone numbers, an email address, a social security number or other form of national ID number, an Internet Protocol address or a fingerprint or other biometric data . Non-PII can become PII whenever additional information is made available that when combined with existing information, could be used to identify an individual. Most people don’t give a second thought to the information they are asked to provide when using ecommerce sites or creating accounts on various sites such as Facebook and Twitter. What is the data you entered being used for? What happens to this information once you have entered it and completed your transaction with a business? How is this information stored and for how long? How is my information protected from theft? Will my information be sold to third parties? What are my rights should my personal data be lost or compromised? These are questions everyone should ask because your information in the wrong hands can be used to steal your money, steal your identity or both. According to the Privacy Rights Clearinghouse, from April 2005 to April 2012 there were 3,062 data breaches nationwide affecting more than 546,000,000 PII records . Businesses have an ethical and legal obligation to protect your PII. Not only will a breach and subsequent loss of data cost businesses money, it will also affect their reputations. When collecting and storing PII businesses must set policies on how the data is received, accessed, stored, transmitted and released to third parties. Protecting PII involves a combination of only collecting and storing data that is needed to complete the task or transaction at

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pt 360 Research Paper

    • 188 Words
    • 1 Page

    As many of you may know, I have decided to leave the Atlanta Falcons Physical Therapy Centers in order to open my own practice, PT 360. I have two convenient locations; one in Johns Creek and the other is in Sandy Springs.…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The data protection act is designed to protect customers from the business taking disadvantage of their personal information. This affects any business that keep databases or…

    • 891 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Management System

    • 1115 Words
    • 5 Pages

    Distribution of Finance-Originating Documents: When disseminating records containing personally identifiable information (PII), Technicians must take reasonable precautions to prevent misuse of data. Under the Information Privacy Act, DMPO Personnel are required to ensure information is accurate, relevant, timely, complete and appropriate administrative, technical, and physical safeguards exist to ensure security and confidentiality of that information. Public Law 53-979, Information Privacy Act 1974.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The fundamental principles of data protection act to specify that that any person’s personal data must be:…

    • 1107 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Handle information

    • 579 Words
    • 2 Pages

    Data Protection Act 1998: This is how information about individuals is used. This covers eight principles under which personal data must be protected and collected. Data Protection Act says that the service user information must be confidential and can only be accessed with their consent. Service users must know what records are being kept and why the data is kept.…

    • 579 Words
    • 2 Pages
    Good Essays
  • Good Essays

    When you register on my site, when you place an order, subscribe or answer a survey, we take personal information from you, but all of they are voluntarily given by you. You may visit our site without giving information, but I might need to get your name, e-mail address, mailing address or credit card information if you register on my site or buy some of my products.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Online shopping – this could lead to the loss of private information like card numbers and passwords and leading to identity fraud.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Protection: There are some principles of managing personal information. It needs to be fairly and lawfully processed, used only for the purpose it was collected, must be adequate, relevant, not excessive, accurate, up-to-date, kept secure and only…

    • 211 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A privacy impact assessment (PIA) is a decision tool that can analyze of how personal information is collected, used, and maintained in a program. The purpose of a PIA is to prove that system owners or program managers consciously implement privacy protections throughout their development life cycle for their programs. In fact, the E-Government Act of 2002 requires for program managers to implement a PIA because it can help improve management and promotion (Privacy Impact Assessments. n.d). A PIA is a great tool that can be used to increase communication on how we can handle and address many of the privacy concerns that are still being faced today.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A business stands to face the same type of security and privacy issues. Proprietary information that is important to a business’ success can be stolen, sold or sabotaged by employees within the company. Some of the information taken can be trade secrets, financial documentation and employee personnel files.…

    • 962 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays

Related Topics