Personally identifiable information, or PII, is a common term associated with data privacy regulations. While “PII” is specific to the United States (other countries call it personal data or simply personal information), the concept of what PII is and why it’s so important translates globally. Here’s what you need to know:
PII includes many types of data.
It can broadly be defined as “any information that can be used to identify, contact, or locate a specific individual.” Examples of PII include full names, home addresses, national ID numbers, and passport numbers. That’s a short list, but the key takeaway is that PII refers to confidential information of specific people.
PII is highly sought after by cybercriminals.
PII carries a lot of value. When cybercriminals manage to steal it, they can then sell it to other criminals, use it to launch a variety of scams, or steal someone’s identity. Identity theft is especially dangerous because it allows the scammer to open fraudulent accounts in the victim’s name.
If you have access to PII, you’re responsible for it.
Depending on your role, you might have access to someone’s personal information. It’s your obligation to ensure that information remains protected. Simple actions like locking workstations when not in use and never sharing your credentials are examples of common sense security that help prevent unauthorized access.
Protecting PII is about more than just protecting data.
While every organization wants to avoid any sort of breach of security, the central concept here is protecting people, not just data. That’s because PII is a digital representation of an actual person. When it gets stolen or leaked, it could lead to a variety of harmful consequences that impact someone in real life.
Maintaining data security and privacy is not difficult.
You don’t need to be a computer expert to protect PII. In fact, security (and privacy) are functions of using situational awareness and avoiding scams. You can spot scams by looking for common warning signs such as threatening language, urgent requests, and unexpected links or attachments.
Remember, you are the last line of defense when it comes to protecting PII! Stay alert, always follow policy, and think before you click.
Article retrieved from Healthy Security Habits by The Security Awareness Company – KnowBe4, Inc. (2024)