Preview

Personal Identifiable Information

Satisfactory Essays
Open Document
Open Document
307 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Identifiable Information
Personal Identifiable Information
PII And Ethics Research Paper
William

PII is an abbreviation that stands for Personal Identifiable Information as used in information security. This is information that can be used to identify, contact or locate a single person. Ethics are the standards set in place in order to distinguish right from wrong. As important as PII is in the modern information technology, it has its advantage, disadvantage and ethical issues. PII comes in handy in modern technology. The most commonly used information to identify individuals are ID and drivers numbers, social security numbers, vehicles registration number, date of birth, biometrics, facial recognition to name a few. If PII did not exist, it would be incredibly hard to narrow down and individual since many people share names. There are some advantages that tie in with PII when it comes to the purpose of distinguishing individual identity. Big corporations find PII important identifying their employees. For example most companies have employee ID which is unique from one employee to another. Government officials need to use PII to search and identify and distinguish individuals in their large data base. For example, all legal US residences have a social security number that identifies an individual. In forensic, PII is important to help track down and identify criminals. This identity can be obtained through facial recognition and finger prints resulting in a selective revelation of one’s identity. Finger prints are unique with each individual. As there are advantages to PII, there are disadvantages as well. Almost everyone is technologically savvy and tend to use the internet for their everyday life. For example, it is very convenient to shop, bank online, study, access medical records search and apply for jobs in order to have access to all this different sites, one has to give out personal information details on the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    209

    • 584 Words
    • 2 Pages

    It is very important to keep information secure and private that individuals and staffs private information will stay protected from unauthorised viewing. It is their right to to have their private information to be protected. It is important to protect information to avoid indentity theft. As well as to keep service users trust between services and service users. To gain their trust, they have to know that their private information is safe and protected and can`t be used against them or seen by someone who has no permission to see it. Without all these things services can`t have confidentiality and trust from service users and their services wouldn`t have any users as people wouldn`t be able to feel safe and protected and would leave them feeling vulnarable as their information could be accessed by anyone.…

    • 584 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4222 305

    • 3637 Words
    • 11 Pages

    Privacy – Privacy is a basic human need. We all need to do some things alone and to have time to ourselves to do as we please. Our need for privacy depends on our personality, interests and circumstances. We can respect peoples’ privacy by ensuring that their dignity is safeguarded, and by protecting them from situations that might cause them distress.…

    • 3637 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    The department of defense starting using the Common Access Card or CAC in the spring of 2001. The CAC is used to enable physical access to building, installations, and controlled spaces, and is used to securely access unclassified information systems and applications that link the Department's computer networks. It also allows users to log on to their computer, encrypt e-mail, or digitally sign documents. Which if that that was not enough to insure the fact that it needs to constantly accountable for the CAC holds various forms of PII.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is important to have a secure protected system for all the service users because it is required by law – under the data protection act 1998 states all personal information must be kept private and secured under a lock also to not speak about any individuals outside of the office or in a public area this is done so that all service users details are protected in order to prevent identity theft.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Some communication between individuals may cause the delivery of personal information that may cause an negative outcome(s)…

    • 813 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    RICHARD RODRIGUES

    • 335 Words
    • 2 Pages

    A person identity is made of moral principles, own character and personality, moreover identity is the portrait to the outside world of whom we really are.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Privileged Information

    • 923 Words
    • 4 Pages

    On Tuesday, February 28th, 2017 the NCIS show was titled, “Privileged Information.” Marine Sargent Erin Hill fell off the roof of her apartment in the middle of the day. The woman was put in the hospital in critical condition. Gibbs and his team are trying to find the trail leading up to the investigation. All the clues made it seem like a suicidal attempt. However, when Sargent Hill goes into cardiac arrest, her psychologist opens up to Gibbs. Hills psychologist explains how she was involved with covering up a murder. But, this was not a suicide. She specifically said, this was an attempted murder case. As the team met Hills older sister (Devin) which basically raised her, she opened up to them. It was concluded that the building maintenance…

    • 923 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nvq 3

    • 345 Words
    • 2 Pages

    Personal Identity includes our values, goals, likes/dislikes, our abilities, and our mistakes. It is our style of clothing and the choices that we make in everyday life.…

    • 345 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Identity is the distinct personality of an individual regarded as a persisting entity; it is a set of personal morals, beliefs, and characteristics which depict overall person identity. In Life of Pi words play a crucial role in shaping main character's identity. At the beginning of the movie, Pi initially named as Pisine Molitor Patel, but everyone at school makes fun of him and called him “pissing”. This causes Pi to take a stand and change his identity, change his name to Pi. During the course of Pi's life the influence of words contours his individuality as well. His father states "how can he…

    • 1580 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Data protection act 1998. This is how information about individuals is used. This covers eight principles under which personal…

    • 807 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Mathias (2013) stated that identity management (ID management) is defined as a wide-ranging area that manages the personal identification during a system, (such as a country or a social networking) and have access to gain resources from it through associating user rights and restriction with established identity.…

    • 1633 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Informational privacy is extremely important. Your personnel emails should be private and the amount of privacy with your work email should have limits set forth by your employer. If someone has an email account and sometimes happens to them and they are not here no more should someone be able to read their emails? When Justin Ellisworth gave his life for his country, his parents tired to get access to read emails so that they can understand what was going on in his life before he gave the ultimate sacrifice to his country. Should Yahoo have given Justin Ellisworth parents access to his emails. At what point does our personnel informational privacy become something that is not private? This brings up another question: Should work emails be treated the same as personnel emails when it comes to the amount of privacy that we as individuals have?…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Gives individuals the right to know what information is held about them and provides a framework to ensure the personal information is handled properly.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    F UNCTION POINT ANALYSIS C ounting Function Points Reference Guide IFPUG CPM Version 4.2 this application; and is dependent upon the user’s external business view of the application. Boundary Rules: • The boundary is determined based on the user's point of view. The focus is on what the user can understand and describe. • The boundary between related applications is based on separate business functions as seen by the user, not on technological concerns.…

    • 4118 Words
    • 17 Pages
    Powerful Essays