Best Practices in Protecting PII Data

1932 Words4 Pages

Abstract

I have decided to write a research paper on the importance of protecting personally identifiable information (PII) in Information Technology. PII is a critical, but often overlooked skill requirement for IT professionals. The subject of PII data is of vital importance to me since I work with PII data frequently and must be prepared to handle it correctly and ethically, less risk the violation of privacy law. In addition to satisfying the necessary requirements for a research paper, the intention of this paper are to provide:

• A thorough treatment regarding what PII data is and isn’t

• Define the best practices in handling PII data in the field

• Providing case studies and legal references that explore the issues of PII data and privacy rights.

What is PII?

PII, otherwise known as Personally Identifiable Information, is very broad concept with many different applications and meanings. In its more general sense, one could say that PII could be any piece of stored information that can be used to identify someone. However, it is more accurate to state in this context that PII is data that is:

“capable of being associated with a particular individual through one or more identifiers, including, but not limited to, a Social Security number, a driver's license number, a state identification card number, an account number, a credit or debit card number, a passport number, an alien registration number or a health insurance identification number, and does not include publicly available information that is lawfully made available to the general public from federal, state or local government records or widely distributed media. (Wright, 2009)”

This definition provides the largest context as to what PII is and its role i...

... middle of paper ...

...fhause, D. (2008). Student Information at Risk in SunGard Laptop Theft -- Campus Technology. Retrieved February 14, 2010, from http://campustechnology.com/articles/2008/04/student-information-at-risk-in-sungard-laptop-theft.aspx

SecureWorks. (n.d.). HIPAA Compliance Solutions. Retrieved February 14, 2010, from http://www.secureworks.com/compliance/comp/hipaa.html

Spinello, R. A. (2003). CyberEthics morality and law in cyberspace. Boston: Jones and Bartlett.

Sungard Higher Education. (2008, September 02). SunGard Higher Education Laptop Theft. SunGard Higher Education. Retrieved June 18, 2010, from http://www.sungardhe.com/custom.aspx?id=1554&LangType=1033

Wright, B. (n.d.). PII Security Legislation. Retrieved February 14, 2010, from http://legal-beagle.typepad.com/wrights_legal_beagle/2009/04/what-is-the-definition-of-personally-identifiable-information.html

More about Best Practices in Protecting PII Data

Open Document