This website uses cookies to ensure you have the best experience. Learn more

Personally Identifiable Information Essay

1070 words - 5 pages

Personally Identifiable Information
IFSM 201

Everyone in today’s society is at risk for identity theft or other fraudulent actions against them using unauthorized use of their personally identifiable information. Luckily, there are many different ways to prevent such actions. The Department of Homeland Security defines” personally identifiable information (PII) as any information that permits the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, legal permanent resident, visitor to the U.S., or employee or contractor to the Department.” ...view middle of the document...

Just in 2014, numerous companies were hacked including two of the largest retail stores in America, Target Home depot. According to the Washington post “Hackers also grabbed personal information, including names, home addresses and telephone numbers, of up to an additional 70 million Target customers in that attack.” (Douglas, 2014). It was also reported that “The cyber­attack has resulted in 2,400 cards from customers being used in fraudulent transactions so far.” (Douglas, 2014). Similar attacks were also against home depot where millions of customers personal information where compromised. These are just a few examples of what hackers been up to.
Protecting ones PII for the most part is intuition, knowing what is sensible, making sure the information is being left in capable hands, kind of like protecting ones baby. It can hard to have to do at times and on the other it can happen by mistake. Like forgetting to shred and important piece of document with PII and it ends up in the wrong hands or leaving the information with someone whom you taught was trustworthy, turns out that person has a different agenda. Some common practices that everyone should participate in regarding PII but do not are: securing personal information in your home, don’t leave a social security on the dining room table, not everyone who visits you have to best intentions. Do not walk with social security number in wallet, this should be common sense unfortunately it is not. Do not leave electronics or other personal information documents in the car, if it must be the car it should be locked in the trunk out of plain view. Do not discuss PII over the phone or forward same information in an email. Do not post sensitive information on social media networks for examples do not create a status saying all your passwords are the same. It is imperative for everyone to know the risk that are involve in using social media and websites. Social media should be treated like a stranger and everyone should act accordingly. The Department of Homeland Security list more technical ways to protect ones PII that may not be so much of a common sense action. For mailings containing a small amount of Sensitive PII materials, Seal Sensitive PII materials in an opaque envelope or container, Mail using the U.S. Postal Service’s First Class Mail, Priority Mail, or an accountable commercial...

Other assignments on Personally Identifiable Information

The Bluest Eye Essay

970 words - 4 pages The Bluest Eye Essay (2nd Draft) Ms. Morrison divides her novel “The Bluest Eye“ into four seasons by making use of motives of her own life. The desire for communicating and sharing aspects with the reader develops a real and identifiable story. But, the reader will only receive knowledge about character perspectives and time frames piece by piece. In order to develop Pecolas fortune to a dramatic climax, she let’s the nature act against her

Computer Fraud Essay

1221 words - 5 pages On June 26 of 2011, Gary Foster, a former vice president of the treasury finance department of Citigroup, is arrested at New York’s John F. Kennedy International Airport, for allegedly embezzling more than $19 million from the financial institution and its customers. After the discovery, the same year, of an infiltration by external hackers which compromised personally identifiable information of thousands of customers, the arrest confirmed the

Security Policy & Standard, Task 2

1741 words - 7 pages lack of proper handling and due care of information. Organizations must be concerned with relevant compliance to requirements like Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA), and Personally Identifiable Information (PII). Establishing a process of continued review and improvement will allow HBWC can adapt to changes in risk (threats) and adapt to ever changing legal responsibilities. (Arnason, S, & Willett

Management Information Systems

2655 words - 11 pages Moral Dimensions of Information Systems • Technical solutions • The Platform for Privacy Preferences (P3P) • • • Allows Web sites to communicate privacy policies to visitor’s Web browser – user User specifies privacy levels desired in browser settings E.g., “medium” level accepts cookies from first-party host sites that have opt-in or opt-out policies but rejects thirdparty cookies that use personally identifiable information without an opt-in

Childhood Obesity On The Rise

2772 words - 12 pages demands. Mrs. Obama is so passionate about turning around the childhood obesity problem that she has set a goal for the program to revert the percent of obese children to what it used to be in the 1970s. She plans on having the percent by the year 2030. As I read all the information in this taskforce, I think that this program is going to be very beneficial in the long run. I personally wish I could have had a breakdown like this when I was

Information Systems Security

3283 words - 14 pages Information Systems Security Strayer University CIS 333 June 18, 2014 David Bevin Information Systems Security The scope of our assignment as an information officer at Whale Pharmaceuticals is to safeguardour daily operations which require a combination of both physical and logical access controls to protect medication and funds maintained on the premises and personally identifiable information and protected health information of our

Irb Application

3623 words - 15 pages | | |CONFIDENTIALITY | |B5 |Describe the extent subject's personally identifiable private data will be held in | | | |confidence

Marketing Plan

6196 words - 25 pages events, we believe in supporting the efforts of relevant efforts of our vendors. We believe that consumers have a right to full disclosure of potential dangers and our marketing practices. This includes marketing in digital media that complies with all applicable laws, regulations, and self- regulatory guidelines relating to privacy disclosures, permission marketing, and collection and use of personally identifiable information. Hoverboard


714 words - 3 pages The first ethical issue presented in the ethics game simulation was whether to warn consumers about the contaminated product and what information to provide consumers about the contaminant. The second ethical issue was whether to sell a product that does not meet U.S. safety requirements in a foreign market that has lower safety restrictions. G-BioSport was not required to meet prior approval from the Federal Drug Administration before they

Economy Effect Of Marijuana

277 words - 2 pages Modern American History by Alan Renga 2nd Mid Term! You will be given 3 Short Essay questions and 20 Multiple Choice questions deriving from this list! 80 points total! The 1920s Warren Harding then Calvin Coolidge Tea Pot Dome 1st Red Scare Immigration Restriction, Sacco and Vanzetti Langston Hughes, Marcus Garvey, KKK Prosperity, advertising Prohibition, Al Capone Flappers, Clara Bow, Rudolph Valentino Babe Ruth, Jack Dempsey

The Vc Shakeout

2033 words - 9 pages opinion of us to withstand negative information, but there’s a twist when it comes to manager–employee interactions. Research by Darren Treadway, of the University at Buffalo, and others shows that in such situations, empty flattery doesn’t work—in fact, it backfires. Successful flattery takes skill. CONTINUED ON PAGE 24 POLITICALLY SKILLED EMPLOYEES The more they ingratiate, the less obvious it becomes BOSS’S RATING OF EMPLOYEE’S WORKPLACE BEHAVIOR

Similar Documents

Privacy Regulation Essay

1028 words - 5 pages transactions can be finished, Escrow will pay sellers. However, even though credit card information of customers is anonymous to sellers, not to Escrow. Besides, it only can be used on eBay. There isn’t a national wide law to protect online transactions and customers’ personal information. California has an Online Privacy Protection Act of 2003, which “requires an operator, defined as a person or entity that collects personally identifiable

Informational Privacy In The United States Marine Corps

639 words - 3 pages Cpl at the time, and the lower ranking said, “SSgt this isn’t something that can wait a day”. I was ignored and the days training went on as scheduled. It wasn’t until we were receiving our annual training on Personally Identifiable Information (PII) that I absolutely lost it on these rosters that were circulating. How could we be about to receive training on how to protect Marines PII when such a PII violation was taking place? Luckily, a

The Internet Essay

989 words - 4 pages growing reliance on computers to work and communicate have made the control of computer networks an important part of information security. Security days as just a technical or technology issue are done. It is becoming a central concern for leaders at the highest level of many organizations and governments, transcending national borders. Customers are demanding the highest security, as worries about privacy, the protection of personally

Final Essay

830 words - 4 pages legislation highlight the need for good systems administration and controls, but focus on different aspects of the business. The main focus of HIPAA is to protect personally identifiable health information while SOX is concerned with data that impacts financial reporting. Violations may be met with both civil and criminal penalties. Therefore, the company must be ever watchful of new threats to their systems, data, and business operations. The most