Preview

What Is Personal Identifiable Information?

Powerful Essays
Open Document
Open Document
1380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Is Personal Identifiable Information?
Personal Identifiable Information (PII)
Corey Heinrich
March 20, 2016

Personal Identifiable Information Personally identifiable information (PII) is “any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.” (McCalisster, Grance, & Scarfone, 2010) The risk is now greater than ever that consumers will have their personal data misappropriated. Recent Data Breaches demonstrate how vulnerable
…show more content…

Consumers have more to fear than just a breach of their financial information. They have to be wary of companies that change privacy policies without notice, publish their personal email contacts without consent, and sell their personal information to advertisers for a profit. In fact, companies are continually finding new ways to leverage the customer data they control by analyzing customer buying trends to discover new insights, which they can sell for a profit. In addition, with the rise of the Internet of Things, the data available about consumer habits is set to increase dramatically. The data is collected through accessing a variety of online and offline consumer activities revealing personal information disclosed in connection with such activities. n22 These activities include: purchasing products online; browsing the Internet; filling out a form or survey to get a coupon; social media; subscribing to websites; or mobile …show more content…

Self-regulation is considered the “least intrusive and most efficient means” to use in such a rapidly evolving area as the Internet. This approach relies on notice and consent, whereby a company is required to provide notice to consumers of how it will collect and use their information, and consumers consent by using the goods or services the company provides. Furthermore, the notice-and-consent model for privacy that currently predominates in unregulated industries in the United States has been roundly criticized as a failure. Often taking the form of End User License Agreements (EULAs) or Terms and Conditions forms, these notices are prohibitively long and written in legalese that most consumers do not understand. The result is that no one reads the terms and conditions for a given product or

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data classification and security requirements – what measures will be implemented to protect the three states of data…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    This paper will examine legitimate and promoting ramifications of certain Internet mechanical improvements affecting rivalry and customer security in the internet. The paper will investigate to what degree antitrust and customer assurance laws are satisfactory to manage the difficulties to a focused commercial center and purchaser security postured by the advancement of the internet advancements and markets, for instance, Internet web crawlers, informal communities and wearable gadgets (King & Raja, 2012, p. 309). The paper reasons that lawful apparatuses for ensuring a focused the internet commercial center are genuinely vigorous, while the legitimate instruments to shield buyers from being followed and profiled by advertisers and from the potential interruptions of individual protection made conceivable by considerably more propelled Internet joined sensor and related…

    • 2641 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    In the late of 2013, we start hearing the scandal that our customers’ personal information is leaking. The customer private information including customer’s name, phone number, home address, and even credit card information. Our customers entered their private information when purchasing our products online at target.com, and registering for our loyal reward card REDcard. According to the latest customer survey in United States, there are around 189.4 million digital shoppers in 2013 and will be expected 210.2 million digital shoppers in 2017 (Statista, 2014). From the feedback in stores, about 20% customers use REDcard to pay for their purchase…

    • 2317 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    After watching the documentary “Terms and Conditions May Apply”, I have learned how important reading terms and conditions are, and the consequences of not reading them. Terms & Conditions have always been overlooked as textbook long rules that won’t affect the user, so the majority of people typically skip reading them and automatically hit “agree”. Many websites take advantage of the fact that most users skip over them by implementing rules that would greatly benefit the website and possible harm the user. Therefore, millions of online consumers are putting themselves at risk everyday. This has become increasingly dangerous, as users are unknowingly agreeing to these hidden conditions that eventually can cause major problems.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This article focuses in how devices can transmits a consumer private information to third parties, and how consumers have little knowledge that their information is kept in databases to be sold. In 2020 most home devices will interconnected both wire and wireless to each other across a network, giving unlimited potential to create personal profiles…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Data has become a prominent source for information about people to be discovered over the past few years. While the collection of personal data is no immediate harm to anyone, it becomes an issue when the data is used for malicious purposes. This includes spying and tracking people based on their internet history. Furthermore, data can be used by police forces to predict crimes and their victims before they occur. Although this may seem like a flawless idea, it can have harmful side-effects, such as removing the opportunity for decisions to be made by the person.…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Identity Theft

    • 2587 Words
    • 11 Pages

    Bibliography: "Identity Theft: What to Do If It Happens to You | Privacy Rights Clearinghouse." Privacy Rights Clearinghouse | Empowering Consumers. Protecting Privacy. Web. 25 May 2011. .…

    • 2587 Words
    • 11 Pages
    Good Essays
  • Good Essays

    In 2010, Octopus Company took “cooperation with the partners” to make use of clients’ personal data and get the commission. Although Octopus Company claimed that they had obtained agreement to persons involved, because Octopus card holders had agreed the “personal data policy”. However, as a matter of fact that lots of card holders did not read the policy, at an obscure spot in the right lower part of the company's home page, we can find a link about "personal data policy”. It is a long document in small print which is as to what Octopus Company does with personal data. According to the document, the one of the items is that "designing new or improving existing services provided by us, our subsidiaries and our affiliates for customers' use", (MP English, 2010) it also includes that "designing new or improving existing services provided by us, our subsidiaries and our affiliates for customers' use"(MP English, 2010) and "marketing of goods and/or services by us, our subsidiaries, our affiliates or any of our selected business partners"(MP English, 2010). The marketing behavior had drawn public attention.…

    • 762 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 8 Computer

    • 2419 Words
    • 10 Pages

    and make unauthorized online purchases. Idnetity theft is a growing problem costing billions of dollars…

    • 2419 Words
    • 10 Pages
    Good Essays