Free Essay

Personally Identifiable Information

In:

Submitted By Stacious
Words 1070
Pages 5
Personally Identifiable Information
IFSM 201

Everyone in today’s society is at risk for identity theft or other fraudulent actions against them using unauthorized use of their personally identifiable information. Luckily, there are many different ways to prevent such actions. The Department of Homeland Security defines” personally identifiable information (PII) as any information that permits the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, legal permanent resident, visitor to the U.S., or employee or contractor to the Department.” (Callahan, 2012).
Some Personally identifiable information that can be used to cause harm on their own are social security number, driver’s license number, password number, alien registration number, etc. Other PII that can be used to cause harm when combined with other information are: name, email address, home address, date of birth, last 4 digits of social security number, mother’s maiden name, account passwords, phone number etc. There are numerous ways to combine someone’s information and gain access to private information.
Unfortunately most PII are not difficult to get access to, because these information are use in everyday activities. Whether it is the doctor’s office that basically has all PII on a person or the lawyers office or a store that a credit card was used to purchase something or the car dealership that copies driver’s license before a test drive. Regrettably, most of these businesses does not know how to protect PII, therefore does not train there staff accordingly. Businesses or reckless in protecting customers PII by; mishandling, leaving the information in un lock cabinets or in plain view on a desk, sending the information through un-secure internet emails or fax or not a high enough security on their computer system making it easy for hackers to get access that information. Just in 2014, numerous companies were hacked including two of the largest retail stores in America, Target Home depot. According to the Washington post “Hackers also grabbed personal information, including names, home addresses and telephone numbers, of up to an additional 70 million Target customers in that attack.” (Douglas, 2014). It was also reported that “The cyber­attack has resulted in 2,400 cards from customers being used in fraudulent transactions so far.” (Douglas, 2014). Similar attacks were also against home depot where millions of customers personal information where compromised. These are just a few examples of what hackers been up to. Protecting ones PII for the most part is intuition, knowing what is sensible, making sure the information is being left in capable hands, kind of like protecting ones baby. It can hard to have to do at times and on the other it can happen by mistake. Like forgetting to shred and important piece of document with PII and it ends up in the wrong hands or leaving the information with someone whom you taught was trustworthy, turns out that person has a different agenda. Some common practices that everyone should participate in regarding PII but do not are: securing personal information in your home, don’t leave a social security on the dining room table, not everyone who visits you have to best intentions. Do not walk with social security number in wallet, this should be common sense unfortunately it is not. Do not leave electronics or other personal information documents in the car, if it must be the car it should be locked in the trunk out of plain view. Do not discuss PII over the phone or forward same information in an email. Do not post sensitive information on social media networks for examples do not create a status saying all your passwords are the same. It is imperative for everyone to know the risk that are involve in using social media and websites. Social media should be treated like a stranger and everyone should act accordingly. The Department of Homeland Security list more technical ways to protect ones PII that may not be so much of a common sense action. For mailings containing a small amount of Sensitive PII materials, Seal Sensitive PII materials in an opaque envelope or container, Mail using the U.S. Postal Service’s First Class Mail, Priority Mail, or an accountable commercial delivery service ,For large data extracts, database transfers, backup tape transfers, Encrypt the data (if possible) and use a receipted delivery service (i.e., Return Receipt, Certified or Registered mail) or a tracking service (e.g., "Track & Return") to ensure secure delivery is made to the appropriate recipient. (Callahan, 2012).
Taking precautions are not always successful with the right amount of motivation any decent hacker can get to the information they want. The hacker may not even get your information from you but a business that you shopped with. The thing is to not make it easy for hackers, maybe after couple tries to crack a password with success the hacker will give up. Make passwords and username unpredictable and change them for each online line account. Always take every precaution that is out there to make sure Personally Identifiable information for as long it they can be. Recklessness can lead to more than one attempt at identity theft and there may no way gain back what was stolen.
Bibliography
Callahan, M. E. (2012, March ). Homeland Security. Retrieved February 25, 2015, from http://www.dhs.gov/sites/default/files/publications/privacy/Guidance/handbookforsafeguardingsensitivePII_march_2012_webversion.pdf
Douglas, D. (2014, January 29). The Washington Post . Retrieved February 25, 2015, from http://www.washingtonpost.com/business/economy/holder-pledges-to-hunt-down-thieves-in-target-breach/2014/01/29/6f97517a-8900-11e3-833c-33098f9e5267_story.html
Identity Theft Resource Center . (n.d.). Retrieved February 25, 2015, from http://www.idtheftcenter.org/ITRC-Surveys-Studies/2014databreaches.html
Tsukayama, H. (2014, April 22). Washington Post . Retrieved February 25, 2015, from http://www.washingtonpost.com/blogs/the-switch/wp/2014/04/22/hackers-are-getting-better-at-offense-companies-arent-getting-better-at-defense/

--------------------------------------------
[ 1 ]. “Without a doubt, 2015 will see more massive takedowns, hacks, and exposure of sensitive personal information like we have witnessed in years past,” said Levin. (Identity Theft Resource Center )
[ 2 ]. "We’ve got a lagging situation here, where businesses are not acting quick enough to keep up with the capabilities of threat actors,” said David Burg, the global and U.S. advisory cybersecurity leader at PricewaterhouseCoopers (PwC). (Tsukayama, 2014)

Similar Documents

Free Essay

Personally Identifiable Information (Pii) and Data Breaches

...Personally Identifiable Information (PII) and Data Breaches By Stevie D. Diggs University Maryland University College IFSM201 Section 7974 Semester 1309 Personally Identifiable Information (PII) and Data Breaches Knowing and training on personally identifiable information (PII) is important in today’s society. There has been research on data breaches and identity theft that links them both together. This is to help personnel have a clear understanding on the impact of what is at steak and an explanation of PII. Many businesses and organizations have different definition for PII because of the classification of data for each, and that is why understanding PII is important. Examples of PII include, but are not limited to the following: full name, maiden name, mother‘s maiden name, or alias; personal identification number, social security number (SSN), passport number, driver‘s license number, taxpayer identification number, or financial account or credit card number; address information, street address or email address; personal characteristics, including photographic image, fingerprints, handwriting, or other biometric data. How do you protect PII? Who has access to PII? Who are affected by data breaches and identity theft? How to prevent data breaches and identity theft? The research introduced in this essay is from Verizon along with multiple articles involving military and organizations. PII is defined definitely by military and organizations. Training along with knowing...

Words: 1541 - Pages: 7

Free Essay

Protection Against Identity Theft

...is a crime that can easily ruin one’s life and cause extreme suffering and loss. Criminals have been using other people’s identity since the beginning of time to commit crimes, achieve financial gain, and for many other illegal purposes. Since the rise in the popularity of the Internet, identity theft has also been on the rise. “Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion.” (Douglas, 2012) By securing someone else’s personally identifiable information (PII), a criminal with enough knowledge about the Internet could illegally gain access to medical records, bank accounts, and many other aspects of the unknowing victim’s life. This is why protecting one’s personally identifiable information is paramount in avoiding identity theft. There are many methods criminals can use to acquire PII but there are many ways one can protect their information as well. It is easier to protect PII by practicing several simple habits rather than forfeiting time, effort, and potentially large sums of money after one’s identity has been compromised. The United States Department of Justice suggests several easy tips to help avoid becoming a victim of identity theft. Individuals should be stingy about releasing their PII to anyone they do not know or trust. (Identity Theft And Identity Fraud, 2014) It is common to receive phone calls or emails that are offering the sale of a product,...

Words: 1008 - Pages: 5

Premium Essay

Service Request Sr-Kf-013

...Service Request SR-kf-013 Stephen Gowen BSA/310 BUSINESS SYSTEMS 03 January 2012 Becky Hoff Service Request SR-kf-013 Ever wonder why certain banners or advertisements seem to contain information you are or were interested in? Online consumer behavior is being tracked all over the world-wide-web via cookies, Flash cookies, and “Web beacons” such as Omniture. Ad networks utilize information collected via various Javascripts and/or cookies to dynamically create content for users. One such Ad network called BlueKai actually allows its users to see a visual representation of the data being collected and shared about them. The amount and variety of data contained in user cookies alone is simply staggering! Many consumers today are beginning to wonder whether or not their privacy is at risk. With that in mind, proposing a system that tracks online shopping behavior introduces quite a few risks. Legal Concerns Where PII (Personally Identifiable Information) is concerned, so is the law. When handling behavioral data of any kind, it must be stored securely. If any PII is collected, certain disclaimers, agreements, opt-out opportunities, etc. must be in place in order to refrain from attracting legal attention. Cookies must be handled delicately as well, especially if they utilized to track users on our shopping platform. When a user deletes his or her cookies, that user should become a new user on our network. Holding onto a user’s cookies against his...

Words: 1041 - Pages: 5

Free Essay

When Faced with Growth

...Understanding The Concept of Protecting Personal Information (PPI) IFSM 201 6381 Concepts and Applications of Information Technology (2158) University of Maryland University College Understanding The Concept of Protecting Personal Information (PPI). Personally Identifiable Information or PII is information that can be used to distinctively identify, contact, or locate an individual. PPI is sensitive information that is associated with a person. These information should be accessed only on a strict need-to-know basis and handled and stored with great care. Personally identifiable information is information that can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc., alone, or when combined with secondary personal or secondary identifying information that is linked or linkable to a specific individual, such as date and place of birth, mother's maiden name, etc. Most companies keep sensitive personal information in their hard copy files such as names, addresses, gender, social security numbers, credit card, or other account data that uniquely identifies customers or employees (Heller, 2001, p. 1). This information is often necessary to complete customers’ orders, meet payroll, or perform other important business functions. However, if sensitive information gets into the wrong people, there is every tendency that it can lead...

Words: 942 - Pages: 4

Free Essay

Information Systems

...to understand how your personal information will be treated as you make full use of the Forbes.com website and services. The Forbes.com website is owned and operated by Forbes.com LLC. Forbes has been awarded TRUSTe's Privacy Seal signifying that this privacy policy and practices have been reviewed by TRUSTe for compliance with TRUSTe's program requirements including transparency, accountability and choice regarding the collection and use of your personal information. TRUSTe's mission, as an independent third party, is to accelerate online trust among consumers and organizations globally through its leading privacy trustmark and innovative trust solutions. If you have questions or complaints regarding our privacy policy or practices, please contact us by email at privacy@forbes.com. If you are not satisfied with our response you can contact TRUSTe here. Forbes complies with the U.S. - E.U. Safe Harbor Framework and the U.S. - Swiss Safe Harbor Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal data from European Union member countries and Switzerland. Forbes has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement. To learn more about the Safe Harbor program, and to view Forbes' certification, please visit http://www.export.gov/safeharbor/. The TRUSTe program covers only information that is collected through this website...

Words: 4264 - Pages: 18

Free Essay

Class Title

...First Access Marketing Agreement The following sets forth the policies for the collection and use of personally identifiable information ("Information") by First Access Card in connection with its operation of this website (the "Site"). First Access Card takes its obligations regarding privacy very seriously, and it wants to ensure users are fully informed about the Information they are providing to it. Collection of Information. In connection with the Site, First Access Card may collect Information in the following ways: through registration forms filled out by a user on the Site, through Information provided by a user in connection with the purchase of products or services on the Site, through the maintenance and analysis of web server logs, via e-mail sent by a user to First Access Card, through the use by First Access Card of third-party databases from which user information is extracted and combined with Information obtained by First Access Card through other means. First Access Card may also collect non-personally identifiable information from users via "cookies" (small text files placed by First Access Card on user computers), single-pixel GIF image files (also called “Web beacons”), Web server log analysis and other similar technological means. Such non-personally identifiable information may be used to track site trends and enhance the user experience, and may be shared with third parties. To the extent third parties may place advertising on the Site...

Words: 1040 - Pages: 5

Premium Essay

Bring Your Own Device

...productivity within the workforce as well as employee/employer work experience. With these benefits also come substantial risks involved with allowing such devices within the confines of buildings. These risks might include information security concerns, operational security concerns, and overall networking security. These concerns arise throughout all organizations, especially government organizations and major corporate retailers in light of recent cyber-attacks. BYOD is a major security topic in today's social market. Benefits offered to organizations that allow BYOD can span many different areas in the workplace. Productivity can be enhanced by allowing employees to transport work to their home device in order to complete a time-sensitive task after close of business or while traveling. BYOD might also allow the employer to save on equipment costs such as an intricate telephony network by allowing employees to use personal cellular phones for business contacts. Personal storage devices might also allow the employer to save on network storage devices for certain departments within the organization. Employee work experience may also be enhanced by allowing employees to have a personal communication device that is included in many emergency contacts information such as child care, hospitals, and doctors' offices. This could potentially allow an employee with special needs at home be more at ease while working knowing they have a means of communication readily available. These types...

Words: 787 - Pages: 4

Free Essay

Ifsm201 Identity Theft

...Identity theft In today’s information age we store our information various ways from hard copies, to storing our information on our computers and servers. Our most personal information: Date of Birth, Social Security Numbers, is stored by various companies, organizations, and the Federal Government. So in 1974 the United States realized it was storing lots of personal information on its citizens and enacted the privacy act of 1974, in which it states that “no agency will disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains” So how can we protect ourselves, they’ll always be someone out to obtain your information. The Definition to (PII) according to the Department of Labor website is- “Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator...

Words: 925 - Pages: 4

Free Essay

Lab2

...Assessment Worksheet Obtaining Personally Identifiable Information through Internet Research Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored a variety of search engines and social networking Web sites that may contain personal information about you that, in the hands of an identity thief, could compromise and exploit your privacy. You documented the sites that displayed your personal information and suggested methods for controlling access to that information within the specific sites. You also explored the privacy policy of some of the more popular social networking sites. Lab Assessment Questions & Answers 1. Complete the following table to describe the results you discovered about your own personally identifiable information on the Internet. Search Engine Was personal information returned? (Yes or No) Dogpile.com Google.com InstantCheckmate.com AlltheInternet.com WhitePages.com Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Instructor Lab Manual ZabaSearch.com Your local government Web site Facebook LinkedIn Twitter 2. Was there enough personal information returned that could potentially...

Words: 435 - Pages: 2

Free Essay

Personal Identifiable Information

...PII And Ethics Research Paper Jadrrih PII is an abbreviation that stands for Personal Identifiable Information as used in information security. This is information that can be used to identify, contact or locate a single person. Ethics are the standards set in place in order to distinguish right from wrong. As important as PII is in the modern information technology, it has its advantage, disadvantage and ethical issues. PII comes in handy in modern technology. The most commonly used information to identify individuals are ID and drivers numbers, social security numbers, vehicles registration number, date of birth, biometrics, facial recognition to name a few. If PII did not exist, it would be incredibly hard to narrow down and individual since many people share names. There are some advantages that tie in with PII when it comes to the purpose of distinguishing individual identity. Big corporations find PII important identifying their employees. For example most companies have employee ID which is unique from one employee to another. Government officials need to use PII to search and identify and distinguish individuals in their large data base. For example, all legal US residences have a social security number that identifies an individual. In forensic, PII is important to help track down and identify criminals. This identity can be obtained through facial recognition and finger prints resulting in a selective revelation of one’s identity...

Words: 765 - Pages: 4

Free Essay

Confidentiality in the Classroom

...personal information prior to the onslaught of identity theft was important but not to the extent that it is today. In today’s classroom protecting confidential information is a 3-fold process – protecting the student’s records, protecting personally identifiable information from the student’s record and allowing parent’s access to their child’s information. There are federal and state laws that govern confidentiality and how schools can and cannot utilize that information as outlined under the Family Educational Rights and Privacy Act (FERPA). FERPA, a federal law, applies to educational agencies or institutions that receive federal funds and protects the privacy of student educational records and assures parents the right to access those records. FERPA also allows authorized educational personnel the right to access and review student records without prior parental consent and in situations where conduct “poses a significant risk to the safety or well-being of a student, other students, or other members of the school community” allows the district to release information from a discipline record without consent to employees who have a legitimate educational interest in a student’s behavior. In Confidentiality issues: parental rights each state’s board of education outlines how they will handle sensitive and confidential information regarding students, student’s personal information and student’s educational materials. Such information such as directory information, closed...

Words: 1254 - Pages: 6

Free Essay

Security Threats

...security exposure that results from a product weakness that the product developer did not intend to introduce and should fix once it is discovered” (Microsoft TechNet, 2014). There are possibility that the two databases could have vulnerabilities such as a weakness in the technology, configuration or security policies. The vulnerabilities can lead to potential risks in the personnel records systems. Security risks can be described as actions that could cause loss or damage to computer hardware, software, data or information. Potential security risks to milPDS and Remedy are computer viruses, unauthorized access of systems, personal information theft, personally identifiable information (PII) being compromised or violated, and system failure. These vulnerabilities and security risks can result in serious issue to the center. As a center that has a main purpose of managing personal records, any compromise, whether it is information stolen or a database system losing information can be disastrous for many different reasons. After threats and vulnerabilities have been identified, an assessment should be processed to figure out how the threat and vulnerability affected the system(s). This will assist in determining what measures are needed to ensure the vulnerability is handled. There are policies, Air Force Instructions and procedures in place if threats and vulnerabilities have been detected. The Commander will appoint an action officer to assess the violation and determine if...

Words: 474 - Pages: 2

Free Essay

Child Internet Protection

...are on the internet more than they are watching television. Information technology has had to advance itself to adjust with the new ethical issues that came along with child internet surfers. Privacy and protection acts protect children that use the internet. Two of these acts are the Children’s Internet Protection Act and the Children’s Online Privacy Protection Act. According to "Informationshield.com" (1998), The Children’s Online Privacy Protection Act (COPPA) “prohibits unfair or deceptive acts or practices in connection with the collection, use, or disclosure of personally identifiable information from and about children on the Internet.”(para. 1) COPPA is in place to ensure children are being protected because children are learning more and more about technology and using it on a day-to-day basis. They are using it in the classroom at school, at home, and on their cellular devices. There are predators that collect information from websites geared towards children thirteen and under and these individuals try to gain a child’s trust and friendship in order to harm them. These types of ethical issues made the Children’s Online Privacy Protection Act necessary. COPPA requires a parent to give consent for a child’s personal information to be collected or put to use for any reason. The companies that have websites are also responsible for providing and maintaining reasonable procedures to keep information confidential and secure. Another Act created to protect children...

Words: 513 - Pages: 3

Premium Essay

Kudler Foods

...implementing a Frequent Shopper Program. This is a loyalty program in which will allow for their frequent shoppers to accumulate points that are redeemable for high end gift items and also specialty food items (Apollo Group, Inc., 2010). Kudlers’ has in the past faced challenges of keeping product inventories. While increasing customer satisfaction, the Frequent Shopper Program will as well help fix the retail store’s inventory challenges. It will help track the consumer’s shopping trends, information which will then be used to update inventories thus help the Kudler’s in stocking more of the items that their customers want leading to customer satisfaction. Despite the benefits that come with the Frequent Shopper Program, the project has potential legal, ethical, and information security concerns. These must be addressed beforehand to ensure the success of the program. Legal Issues For Kudler’s Frequent Shopper System to succeed, it will need to maintain personally identifiable information (PII) database. The Frequent Shopper Cards should be registered with customer details. That is, the name, address, and telephone number and email address....

Words: 890 - Pages: 4

Free Essay

Big Five Personality Triats

...Azad institute of management assignment submitted by: Marketing management Maybelline Logo’s[pic][pic][pic][pic] [pic][pic] About Maybelline [pic] From a small, family-owned business to the number one cosmetics company in America, Maybelline New York takes trends from the catwalk to the sidewalk, empowering women to make a statement, explore new looks, and flaunt their own creativity and individuality. Inspired by confident, accomplished women, Maybelline gives you scientifically-advanced formulas, revolutionary textures and up-to-the-minute, trendsetting shades effortlessly, affordably, beautifully. Maybe she’s born with it. Maybe it’s Maybelline. Maybelline is an American makeup brand sold worldwide and owned by the French cosmetics giant, L'Oréal.[1] Their slogan is Maybe she's born with it. Maybe it's Maybelline. [2] History The Maybelline Company was created by New York chemist T.L. Williams in 1915. Williams, in his early 30's noticed his younger sister applying a mixture of Vaseline and coal dust to her eyelashes to give them a darker, fuller look. He adapted it in his small laboratory and produced a product sold locally called Lash-Brow-Ine. The product was a local hit, but the awkward name held it back. His sister, who inspired the product, was named Maybel. So T.L. Williams renamed it Maybelline, a combination of Maybel and Vaseline. It is under this name that Maybelline has achieved its now legendary...

Words: 3041 - Pages: 13