Free Essay

Personal Identifiable Information

In:

Submitted By jadrrih
Words 765
Pages 4
PII And Ethics Research Paper
Jadrrih

PII is an abbreviation that stands for Personal Identifiable Information as used in information security. This is information that can be used to identify, contact or locate a single person. Ethics are the standards set in place in order to distinguish right from wrong. As important as PII is in the modern information technology, it has its advantage, disadvantage and ethical issues. PII comes in handy in modern technology. The most commonly used information to identify individuals are ID and drivers numbers, social security numbers, vehicles registration number, date of birth, biometrics, facial recognition to name a few. If PII did not exist, it would be incredibly hard to narrow down and individual since many people share names. There are some advantages that tie in with PII when it comes to the purpose of distinguishing individual identity. Big corporations find PII important identifying their employees. For example most companies have employee ID which is unique from one employee to another. Government officials need to use PII to search and identify and distinguish individuals in their large data base. For example, all legal US residences have a social security number that identifies an individual. In forensic, PII is important to help track down and identify criminals. This identity can be obtained through facial recognition and finger prints resulting in a selective revelation of one’s identity. Finger prints are unique with each individual. As there are advantages to PII, there are disadvantages as well. Almost everyone is technologically savvy and tend to use the internet for their everyday life. For example, it is very convenient to shop, bank online, study, access medical records search and apply for jobs in order to have access to all this different sites, one has to give out personal information details on the internet. While all this sounds very convenient, there are criminals out there who are waiting for you to upload your personal information and their job is to retrieve it and exploit it. These individuals are called identity thieves. The biggest crime in the world now is identity theft. Identity theft is whereby criminals take over someone else identity and assumes it. Identity thieves exploit individuals’ information by accessing their financial, medical and other sensitive personal information. It is very easy nowadays to have your identity stolen. In recent reports, there has been tones of account takeover, whereby criminals are going into banks and assuming someone else identity and withdrawing money from this accounts. Medical records can be used to exploit an individual by selling it to vendors or blackmailing someone if there is sensitive information on their record. In my opinion, there are not strict laws that govern internet privacy abuse. Apart from the advantages and the disadvantages, there are ethical issues facing personal identifiable information. It seems to me that criminals cannot distinguish what is wrong and what is right. Technology has been abused to full capacity in recent years. Hackers have found loop holes around the internet and are using it to harass innocent victims. Ethics is not valued when it comes to technology because most people who create programs are the same people who turn around and abuse it. For example, most people who create anti-virus programs are the same people who go back and create virus, Trojan horses, worms to name a few. As a result, these individuals are making money all year round while pretending to protect your internet privacy while in real sense; they are the ones causing all the trouble. Another ethical issue is that most sites gather and individual personal information and end up storing it and sharing it with third parties for their own benefits. The effective sharing of this information while protecting the private information is a real challenge. Social networking has resulted in some user publicizing wrong information under false names. This to me is not ethical if someone is going to disguise his/her identity under false pretense. The government needs to set more strict laws that have the maximum penalty with the issue regarding internet privacy. The tradeoff would be to define the demarcating lines between what is public and what is private. Internet privacy is indeed important in case of the revelation of personally identifiable information but it requires being limited in cases where privacy puts the internet ethics at stake. All said and done the world we are living in today depends on technology almost in every aspect of life and the internet need to be protected.

Work cited from www.buzzle.com updated 9/23/2011

Similar Documents

Free Essay

Personal Identifiable Information in Today’s Age

...Personal Identifiable Information in Today’s Age Problem Statement Personal Identifiable Information (PII) is sensitive data of a person’s identity. If mishandled, this information can result in identity theft. There have been millions of consumers who have had their identity compromised from misuse or lost PII. To adequately protect PII, one must understand what it is. PII is information that can distinguish or trace a person identity. A few examples such as, a person’s Social Security number, age, home and office phone numbers are forms of PII. While the Social Security card is a distinctive document linking a person’s name and Social Security number, when associated with other forms of PII, as previously mentioned, it creates a high risk to the individual and eventually can lead to identity theft (Department of Defense, 2012). To assist consumers with identity theft government officials have established a Task Force and initiated several Acts to protect consumers. End Personal Identifiable Information in Today’s Age Information in today’s age is becoming easily accessible to many people. The Internet is just one resource that can provide information about a person. Internet search engines, such as Google provide a wealth of information, if used properly about a person. It is vital for the public and private sector to be aware and protect critical information from unwanted hands, if used illegally can cause damage to person’s identity. Besides search engines, social...

Words: 953 - Pages: 4

Free Essay

Information Technology Act Paper

...Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money on electronic transactions. This act is part of the Credit Card Consumers Act and the ETF was not considered this act was created. “The EFT Act contains important provisions concerting entry of consumers into the EFT system, delineation of rights of parties involved in EFT use, and establishment of liability for unlawful EFT use” (Fox, 1980, p. 212). The definition for EFT in the act is “a transfer of funds is initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account. EFTs include, but are not limited to point-of-sale (POS) transfers; automated teller machine (ATM) transfers; direct deposits or withdrawals of funds; transfers initiated by telephone; and transfers resulting from debit card transactions, whether or not initiated through an electronic terminal” (Electronic Funds Transfer Act of 1978, Section 205.3(b)). By having EFT defined, clearly can demonstrate...

Words: 1012 - Pages: 5

Free Essay

Aaaaaaaa

...What is PHI or PII? Excerpted from the UF Privacy Office’s General Awareness Training: |Personal Identification Information = Any name or number that may be used, alone or in conjunction with any other information, to | |identify a specific individual. | |“Any person who willfully and without authorization fraudulently uses … personal identification information without first obtaining| |that individual's consent, commits… a felony.” | |Personal Information = an individual's name, in combination with any of the following unencrypted data elements: Social security | |number; Driver's license or Florida ID Card numbers; account, credit card, or debit card numbers, in combination with any code or | |password that would permit access to an individual's financial account. | |“Any person who conducts business in this state and maintains computerized data in a system that includes personal information | |shall provide notice of any breach of the security of the system to any resident of this state whose unencrypted personal | |information was, or is reasonably believed to have been, acquired by an unauthorized person.” | | ...

Words: 301 - Pages: 2

Premium Essay

Service Request Sr-Kf-013

...Service Request SR-kf-013 Stephen Gowen BSA/310 BUSINESS SYSTEMS 03 January 2012 Becky Hoff Service Request SR-kf-013 Ever wonder why certain banners or advertisements seem to contain information you are or were interested in? Online consumer behavior is being tracked all over the world-wide-web via cookies, Flash cookies, and “Web beacons” such as Omniture. Ad networks utilize information collected via various Javascripts and/or cookies to dynamically create content for users. One such Ad network called BlueKai actually allows its users to see a visual representation of the data being collected and shared about them. The amount and variety of data contained in user cookies alone is simply staggering! Many consumers today are beginning to wonder whether or not their privacy is at risk. With that in mind, proposing a system that tracks online shopping behavior introduces quite a few risks. Legal Concerns Where PII (Personally Identifiable Information) is concerned, so is the law. When handling behavioral data of any kind, it must be stored securely. If any PII is collected, certain disclaimers, agreements, opt-out opportunities, etc. must be in place in order to refrain from attracting legal attention. Cookies must be handled delicately as well, especially if they utilized to track users on our shopping platform. When a user deletes his or her cookies, that user should become a new user on our network. Holding onto a user’s cookies against his...

Words: 1041 - Pages: 5

Free Essay

Information Systems

...statement to understand how your personal information will be treated as you make full use of the Forbes.com website and services. The Forbes.com website is owned and operated by Forbes.com LLC. Forbes has been awarded TRUSTe's Privacy Seal signifying that this privacy policy and practices have been reviewed by TRUSTe for compliance with TRUSTe's program requirements including transparency, accountability and choice regarding the collection and use of your personal information. TRUSTe's mission, as an independent third party, is to accelerate online trust among consumers and organizations globally through its leading privacy trustmark and innovative trust solutions. If you have questions or complaints regarding our privacy policy or practices, please contact us by email at privacy@forbes.com. If you are not satisfied with our response you can contact TRUSTe here. Forbes complies with the U.S. - E.U. Safe Harbor Framework and the U.S. - Swiss Safe Harbor Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal data from European Union member countries and Switzerland. Forbes has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement. To learn more about the Safe Harbor program, and to view Forbes' certification, please visit http://www.export.gov/safeharbor/. The TRUSTe program covers only information that is collected through this...

Words: 4264 - Pages: 18

Free Essay

When Faced with Growth

...Understanding The Concept of Protecting Personal Information (PPI) IFSM 201 6381 Concepts and Applications of Information Technology (2158) University of Maryland University College Understanding The Concept of Protecting Personal Information (PPI). Personally Identifiable Information or PII is information that can be used to distinctively identify, contact, or locate an individual. PPI is sensitive information that is associated with a person. These information should be accessed only on a strict need-to-know basis and handled and stored with great care. Personally identifiable information is information that can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc., alone, or when combined with secondary personal or secondary identifying information that is linked or linkable to a specific individual, such as date and place of birth, mother's maiden name, etc. Most companies keep sensitive personal information in their hard copy files such as names, addresses, gender, social security numbers, credit card, or other account data that uniquely identifies customers or employees (Heller, 2001, p. 1). This information is often necessary to complete customers’ orders, meet payroll, or perform other important business functions. However, if sensitive information gets into the wrong people, there is every tendency that it can lead...

Words: 942 - Pages: 4

Free Essay

Class Title

...First Access Marketing Agreement The following sets forth the policies for the collection and use of personally identifiable information ("Information") by First Access Card in connection with its operation of this website (the "Site"). First Access Card takes its obligations regarding privacy very seriously, and it wants to ensure users are fully informed about the Information they are providing to it. Collection of Information. In connection with the Site, First Access Card may collect Information in the following ways: through registration forms filled out by a user on the Site, through Information provided by a user in connection with the purchase of products or services on the Site, through the maintenance and analysis of web server logs, via e-mail sent by a user to First Access Card, through the use by First Access Card of third-party databases from which user information is extracted and combined with Information obtained by First Access Card through other means. First Access Card may also collect non-personally identifiable information from users via "cookies" (small text files placed by First Access Card on user computers), single-pixel GIF image files (also called “Web beacons”), Web server log analysis and other similar technological means. Such non-personally identifiable information may be used to track site trends and enhance the user experience, and may be shared with third parties. To the extent third parties may place advertising on the Site...

Words: 1040 - Pages: 5

Premium Essay

Bring Your Own Device

...productivity within the workforce as well as employee/employer work experience. With these benefits also come substantial risks involved with allowing such devices within the confines of buildings. These risks might include information security concerns, operational security concerns, and overall networking security. These concerns arise throughout all organizations, especially government organizations and major corporate retailers in light of recent cyber-attacks. BYOD is a major security topic in today's social market. Benefits offered to organizations that allow BYOD can span many different areas in the workplace. Productivity can be enhanced by allowing employees to transport work to their home device in order to complete a time-sensitive task after close of business or while traveling. BYOD might also allow the employer to save on equipment costs such as an intricate telephony network by allowing employees to use personal cellular phones for business contacts. Personal storage devices might also allow the employer to save on network storage devices for certain departments within the organization. Employee work experience may also be enhanced by allowing employees to have a personal communication device that is included in many emergency contacts information such as child care, hospitals, and doctors' offices. This could potentially allow an employee with special needs at home be more at ease while working knowing they have a means of communication readily available. These types...

Words: 787 - Pages: 4

Free Essay

Lab2

...Worksheet Obtaining Personally Identifiable Information through Internet Research Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored a variety of search engines and social networking Web sites that may contain personal information about you that, in the hands of an identity thief, could compromise and exploit your privacy. You documented the sites that displayed your personal information and suggested methods for controlling access to that information within the specific sites. You also explored the privacy policy of some of the more popular social networking sites. Lab Assessment Questions & Answers 1. Complete the following table to describe the results you discovered about your own personally identifiable information on the Internet. Search Engine Was personal information returned? (Yes or No) Dogpile.com Google.com InstantCheckmate.com AlltheInternet.com WhitePages.com Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Instructor Lab Manual ZabaSearch.com Your local government Web site Facebook LinkedIn Twitter 2. Was there enough personal information returned that could potentially...

Words: 435 - Pages: 2

Free Essay

Ifsm201 Identity Theft

...Identity theft In today’s information age we store our information various ways from hard copies, to storing our information on our computers and servers. Our most personal information: Date of Birth, Social Security Numbers, is stored by various companies, organizations, and the Federal Government. So in 1974 the United States realized it was storing lots of personal information on its citizens and enacted the privacy act of 1974, in which it states that “no agency will disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains” So how can we protect ourselves, they’ll always be someone out to obtain your information. The Definition to (PII) according to the Department of Labor website is- “Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator...

Words: 925 - Pages: 4

Premium Essay

Outsourcing Risk

...Outsourcing Risks of Information Technology 07 January 2013 CMGT 442 Pro's and Con's of Outsourcing Information Technology The cost of maintaining an informational technology department rises tremendously each year. The replacement of parts, the increase of service agreement, personnel raises, and new mandates from local and federal governments. By outsourcing some internal functions you immediately save money by managing services. Though there are a wealth of benefits to be gained through outsourcing only the services that you require there are inherent risks that accompany that given choice. If exploited any one risk can ruin all the benefits of outsourcing your internal company functions. We will explore any and all risks that may be inherented with outsourcing rolls such as data storage, payroll, human resources, sales order taking, and finally desktop and network support. The first important action before committing to outsourcing your data storage is to address a series of questions that are contained in a Records Management Risk Assessment checklist. These questions will remove assumptions and provide a better detailed course of action on how your data should be stored, what data will be stored, and address if any local or compliance laws may be in question. Company Compliance risks: 1. Can my data be stored outside my jurisdiction? 2. Is Audit Management sufficient enough in this instance...

Words: 1136 - Pages: 5

Free Essay

Security Threats

...security exposure that results from a product weakness that the product developer did not intend to introduce and should fix once it is discovered” (Microsoft TechNet, 2014). There are possibility that the two databases could have vulnerabilities such as a weakness in the technology, configuration or security policies. The vulnerabilities can lead to potential risks in the personnel records systems. Security risks can be described as actions that could cause loss or damage to computer hardware, software, data or information. Potential security risks to milPDS and Remedy are computer viruses, unauthorized access of systems, personal information theft, personally identifiable information (PII) being compromised or violated, and system failure. These vulnerabilities and security risks can result in serious issue to the center. As a center that has a main purpose of managing personal records, any compromise, whether it is information stolen or a database system losing information can be disastrous for many different reasons. After threats and vulnerabilities have been identified, an assessment should be processed to figure out how the threat and vulnerability affected the system(s). This will assist in determining what measures are needed to ensure the vulnerability is handled. There are policies, Air Force Instructions and procedures in place if threats and vulnerabilities have been detected. The Commander will appoint an action officer to assess the violation and determine if...

Words: 474 - Pages: 2

Free Essay

Confidentiality in the Classroom

...life. Guarding personal information prior to the onslaught of identity theft was important but not to the extent that it is today. In today’s classroom protecting confidential information is a 3-fold process – protecting the student’s records, protecting personally identifiable information from the student’s record and allowing parent’s access to their child’s information. There are federal and state laws that govern confidentiality and how schools can and cannot utilize that information as outlined under the Family Educational Rights and Privacy Act (FERPA). FERPA, a federal law, applies to educational agencies or institutions that receive federal funds and protects the privacy of student educational records and assures parents the right to access those records. FERPA also allows authorized educational personnel the right to access and review student records without prior parental consent and in situations where conduct “poses a significant risk to the safety or well-being of a student, other students, or other members of the school community” allows the district to release information from a discipline record without consent to employees who have a legitimate educational interest in a student’s behavior. In Confidentiality issues: parental rights each state’s board of education outlines how they will handle sensitive and confidential information regarding students, student’s personal information and student’s educational materials. Such information such as directory...

Words: 1254 - Pages: 6

Free Essay

Ifsm301 Research Paper

...groceries, nor go to the Motor Vehicle Administration to renew their tags. Technology has made it so that you can complete these transactions with a click of a mouse. However, it is also increasingly easy to steal someone’s information. The personal information each site collects can be sold and used by third party organizations. This personal information which is respectively called Personally Identifiable Information (PII) is, “any uniquely identifying information that can be used to contact or locate a person, or can be used in conjunction with other sources to identify a single individual.” Examples of Personally Identifiable Information • Full name • Address • Phone number • Social security number • Driver’s license number • Mother’s maiden name • Date of birth • Biometrics information These common types of PII alone are not harmful to the individual. They are incapable of being easily identified, unless you pair them with other identifiers. For instance, combining name or address or phone number with a birth date or social security number make an individual easier to identify. The development in technology makes it increasingly easier to access an individual’s personal information. Companies have the ability to gain the personal information of anyone that has visited their site without them knowing it. Most websites have privacy policies; however the interpretation level and diversity of the policy varied widely. The arrival of e-commerce has amplified...

Words: 506 - Pages: 3

Free Essay

Personally Identifiable Information

...Personally Identifiable Information IFSM 201 Everyone in today’s society is at risk for identity theft or other fraudulent actions against them using unauthorized use of their personally identifiable information. Luckily, there are many different ways to prevent such actions. The Department of Homeland Security defines” personally identifiable information (PII) as any information that permits the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, legal permanent resident, visitor to the U.S., or employee or contractor to the Department.” (Callahan, 2012). Some Personally identifiable information that can be used to cause harm on their own are social security number, driver’s license number, password number, alien registration number, etc. Other PII that can be used to cause harm when combined with other information are: name, email address, home address, date of birth, last 4 digits of social security number, mother’s maiden name, account passwords, phone number etc. There are numerous ways to combine someone’s information and gain access to private information. Unfortunately most PII are not difficult to get access to, because these information are use in everyday activities. Whether it is the doctor’s office that basically has all PII on a person or the lawyers office or a store that a credit card was used to purchase something...

Words: 1070 - Pages: 5