Preview

Personally Identifiable Information

Good Essays
Open Document
Open Document
1078 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personally Identifiable Information
UNDERSTANDING OUR RESPONSIBILITY REGARDING PERSONALLY IDENTIFIABLE INFORMATION
IFSM 201
JULY 22, 2012
Abstract
Anyone who uses computer technology today accepts the fact that their Personally Identifiable Information (PII) may or could be transmitted, collected, and used to benefit the one who receives that information. It is our responsibility to know what PII transmissions are being made available for public use over the web. Understanding all the aspects of PII and the approaches that are to be taken to protect our privacy will make us more aware of PII. As we continue to utilize the technology available, we expose ourselves to become donors of PII. Having knowledge of what PII is and how information is being compiled to identify our interest is necessary when accessing computer technology of today.

Understanding Our Responsibility Regarding Personally Identifiable Information
There are all kinds of companies, agencies, and groups that collect information about us every time we logon or access a website. This gathering of information happens in the background without our even being made aware of that action. When seeking to identify a definition for the word privacy, there is no single meaning for the word because it is relative to the individual. Whenever someone engages in the use of a computer to communicate with another or connect to other communication devices, they introduce an opportunity of releasing private or PII. As a consumer, we need to be aware of what materials about our existence are available to the public and to individuals who may seek to do us harm in terms of identity theft. How we choose to control the release of these materials and those that we choose not to release, is a measure of the privacy we assign to that concern (Allison, Capretz, Yamany, & Wang, 2012). Having a good understanding of what PII is and how to recognize the methods of obtaining PII is the first step to taking responsibility for our own protection. It’s a



References: Allison, D., Capretz, M., Wang, S., & El Yamany, H. (2012). Privacy Protection Framework with Defined Policies for. Journal of Software Engineering and Applications, (5), 200-215. Poritz, J. (2007). Who Searches the Searchers? Community Privacy in the Age of Monolithic Search Engines. The Information Society, 23(5), 383-389 U.S. Department of Homeland Security. (2011). Handbook for Safeguarding Sensitive PII at DHS (). In . (Ed.). -------------------------------------------- [ 1 ]. Privacy has largely been equated with every individual’s right to privacy, and the concern is personally identifiable information, or PII. [ 2 ]. The loss of someone’s business card that has information about that individual does not present a concern for privacy. The security of sensitive information would not be included on the business card. [ 3 ]. To understand more about how DHS operates and governs the use of PII, visit the DHS website at http://www.dhs.gov/index.shtm [ 4 ]. Risk of harm refers to possibility that an individual may experience a substantial harm, embarrassment, unfairness or inconvenience to someone on whom information is filed.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Data classification and security requirements – what measures will be implemented to protect the three states of data…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Privacy is the state of being free from intrusion in one’s personal life, or so it used to be. In Simson Garfinkel’s article “Privacy Under Attack” he discusses how technology has invaded people’s privacies over the years and continues to do so. From telephone systems and mail to car computers and surveillance cameras.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Unit 4222 305

    • 3637 Words
    • 11 Pages

    Privacy – Privacy is a basic human need. We all need to do some things alone and to have time to ourselves to do as we please. Our need for privacy depends on our personality, interests and circumstances. We can respect peoples’ privacy by ensuring that their dignity is safeguarded, and by protecting them from situations that might cause them distress.…

    • 3637 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    In the book Technology and Society: Opposing Viewpoints, Joseph D’agnese discusses our loss of privacy on the internet: “. . .almost every move you make is catalogued in service to the gods of commerce. They know what you’re buying. What you listen to. Where you chat” (D’Agnese, 180). This has become very scary for our generation as our personal information can easily get out. Not enough privacy lowers our happiness level. We feel as if we are being controlled and watched.…

    • 1049 Words
    • 5 Pages
    Good Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Feminism: a topic of discussion in many homes and classrooms, which asserts the utmost attention amongst its listeners. A crazy ideal that believes women hold fundamental rights among men, and deserve the same treatment, the same opportunities. Feminism has grown since its conception in the early 20th century, and has catapulted upward in a grand and illustrious fashion, clinging to the souls of women who will no longer be oppressed by an abusive patriarchy. However, in this decade, feminism has become the topic of crude humor, has been made the punchline of jokes directed toward women. Feminism has become merely a way to generalize women as “crazy, hormonal monsters” who should never have a say in democracy because their “time of…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In today’s era of technology, many people are concerned about internet privacy. Most concerns are usually sparked by misinformation. One piece of technology that is most misunderstood is the cookie and its uses.…

    • 693 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    Privacy is defined as the state of being free from public attention (Oxforddictionaries.com). Microsoft, a multinational billion dollar technology company, defines internet privacy as personal information that one provides on the internet and can only be accessed by an exclusive group (Microsoft.com). In short, personal information includes anything from first and last name, address, email, telephone number, or social security number (coppa.org). Keeping this information safe will in turn keep you safe, that is why there are some laws in place to enforce internet privacy.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Privacy issues are a growing concern of Americans, especially the Internet. The American people are expressing fear about defending their privacy online, but they continue to share more personal data than ever. Personal identifying information is often collected by businesses and stored in different formats, both digital and traditional paper. Meanwhile, data mining and other aggressive information-capturing techniques have become ordinary for businesses large and small. Companies like Facebook, Itunes, Snapchat, Instagram, Twitter, Amazon, Yahoo, banks, hotels and grocery stores store your information and resale it to other companies. States have used the U.S. Constitution as…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Name, age, address, social security number. all of these are the usual examples of “Personally identifiable information” or PII. We take for granted that our information is somewhere “out there”, on someone computer, safe, manned by an alert computer expert or office manager.The truest reality is unknown to us and the likelihood of nefarious access to our personal information grows along with the internet. While the majority of us are careful not to disclose our information,( just as we are careful not to leave the house without our keys) there is the occasion where we forget. We live in a state of constant distraction. We slip. Nevertheless, our own vigilance is the first level of many defenses that can protect our PII.…

    • 488 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Acts Paper

    • 418 Words
    • 2 Pages

    Technology advancements made it necessary to protect everyone’s privacy since it had become much easier to store and access an individual’s personal data within a corporation’s database. According to our text: “privacy is the right to be left alone and to be free of unreasonable personal intrusions. Information privacy is the right to determine when, and to what extent, information about yourself can be gathered and/or communicated to others (Rainer & Cegielski, 2011, pg. 79). Identity theft has become a very serious issue since technology advancements have made it easier for criminals to commit Identity Theft or allow companies to track one’s habits and create a personal profile of a consumer within seconds.…

    • 418 Words
    • 2 Pages
    Good Essays