Preview

Pii Research Paper

Good Essays
Open Document
Open Document
457 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pii Research Paper
Personally identifiable information (PII) is any data about a person that could potentially identify that person. It could be something like a name, fingerprints or other bionmetric data. Email address, street address, telephone number or social security number are also other examples of personally identifiable information. It happens with businesses and organizations a lot. (Rouse, 2008)
“Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft.
Misusing, losing or otherwise compromising this data can carry a steep financial cost, damage a business’s reputation, and even lead to criminal prosecution, because of complex and frequently changing regulations.” (Stringer, 2010)
Even though companies keep PII, it doesn’t mean that your stuff is safe. Unfortunately, crackers don’t decide who they are trying to break into. Most of them are going after people that will help out the most. Companies that have that information have to constantly fight against this happening. It shouldn’t be just the companies worried about an individual’s PII. Every individual should be educated or educate themselves about their PII before they just start handing it out to everyone and anyone. Some people just don’t realize how important it is and they should be introduced to what could happen if they all access to this information. I know that policies and warnings about handing over that information to people, but not everyone reads the fine print before they hand off this information.
Trends with PII and showed an increase in trends with people breaking into systems and stealing PII. According to the research that John did this is what was found out:
“While corporate executives are beginning to realize the

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    5. Customer privacy data and intellectual property assets are critical because they hold personal information that can pose a potential threat if exposed.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Businesses are swiping customers’ licenses to get the information saved on the bar codes or magnetic strips. Common information found on the driver licenses and additional information like marital status, phone number, housing value, income range and profession. Their main purpose is to detect underage drinkers and fake IDs, however a lot of businesses are also using their information for marketing purposes in order to understand their customers better and know how to efficiently advertise to each customer segment. The major problem with this is that most of the cases customers are not aware of what is happening when businesses are swiping their cards. And unknowingly, customers are sharing their personal information to businesses. It also is a problem because that information is not regulated and could end in the hands of wrong…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    TDA 2.3 (3.3, 3.4)

    • 1799 Words
    • 6 Pages

    Information and Communication Support Officer, (2004) Plymouth City Council. Retrieved October 18 2013 from http://www.plymouth.gov.uk/freedom_of_information_what_schools_need_to_know.pdf…

    • 1799 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Personal data processed for any purpose shall not be kept for longer then is necessary.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    References: Author Unknown. Breach Report 2010, Redspin Inc. Dec. 2010. Retrieved from http://www.redspin.com/resources/whitepapers-datasheets/index.php on April 19, 2012. Badzek, L., Gross, G. Confidentiality and Privacy: At the Forefront for Nurses. The American Journal of Nursing, Vol. 99, No. 6 (June, 1999), pp.52-54. Lippincott Williams & Wilkins. Retrieved April 18, 2012 from http://www.jstor.org/stable/3472150. Byfield, E. 315,000 Patients ' Information Disappears From Emory Healthcare. WSBTV. Retrieved April 18, 2012 from file:///F:/Ethics%20information%20age/315,000%20patients%27%20information%20disappears%20from%20Emory%20Healthcare%20_%20www.wsbtv.com.htm Dixon, P. MEDICAL IDENTITY THEFT: The Information Crime that Can Kill You, March 3, 2006. World Privacy Forum. Retrieved from http://www.worldprivacyforum.org/pdf/wpf_medicalidtheft2006.pdf on April 24, 2012. Foreman, Judy (26 June 2006). "At Risk of Exposure”. Los Angeles Times. Retrieved April 23 , 2012. Gellman, R. Fact Sheet 8a: HIPAA Basics: Medical Privacy in the Electronic Age. Privacy Clearing House. March, 2012. Retrieved April 19, 2012 from http://www.privacyrights.org/fs/fs8a-hipaa.htm. Health Insurance Portability and Accountability Act of 1996, 42 U.S.C. § 1320d-9 (2010).…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Good Essays

    Case Management System

    • 1115 Words
    • 5 Pages

    Distribution of Finance-Originating Documents: When disseminating records containing personally identifiable information (PII), Technicians must take reasonable precautions to prevent misuse of data. Under the Information Privacy Act, DMPO Personnel are required to ensure information is accurate, relevant, timely, complete and appropriate administrative, technical, and physical safeguards exist to ensure security and confidentiality of that information. Public Law 53-979, Information Privacy Act 1974.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Any information that is personally identifiable just isn't said and researched by immediate Checkmate when you consider that it is covered via unique applicable legal guidelines. All the information which is stored in public documents should no longer be disclosed because it involves targeted touchy expertise as well. For this reason, there are quantity of legal guidelines which are running to regulate the authorized use and openness of the expertise. Important act of all of them is…

    • 796 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hippa

    • 805 Words
    • 4 Pages

    HIPAA security officers are trained in all HIPAA regulations and protocols and take an oath to uphold HIPAA regulations and report any deviations to the Department of Health Read more: HIPAA Security Officer Responsibilities | eHow.com http://www.ehow.com/list_6784702_hipaa-security-officer-responsibilities.html#ixzz2GC0xnucb…

    • 805 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    Protecting patient’s privacy is of the most important when it comes to the health care field. There are many individuals who want to steal information which is not theirs, but allows them to this information to get what they want and this is, called identity theft. This paper will take a look at the incident at St. John’s Hospital and what should be done with patient information and what not to do with unwanted files. This paper will also take a look at the management plan and code of conduct.…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Good Essays

    One of the most common responses I get from small-business owners when I talk to them about data security goes something like this: "Who would want to steal anything from us? It's not like we're the NSA."…

    • 823 Words
    • 3 Pages
    Good Essays