preview

Assignment 2: Personally Identifiable Information

Satisfactory Essays

Personally identifiable information (PII) exactly what is it? Any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing anonymous data can be considered PII. PII can also be sensitive or non-sensitive. Non-sensitive PII is information that can be transmitted in an unencrypted form without resulting in harm to the individual. Non-sensitive PII can be easily gathered from public records and phone books. A PII can include access to a person social security, date of birth, place of birth and driver’s license number and telephone numbers. PII has it positives and negatives some of the positives ways PII is used is that it can track down …show more content…

Don’t give out personal information on the phone, through the mail or over the Internet unless you’ve initiated the contact or know who you’re dealing with. If a company that claims to have an account with you sends email asking for personal information, do not click on links in received in your email. You should type the company name into your web browser, go to their site, and contact them through their customer service department. Before you dispose of a computer, get rid of all the personal information it stores. Use a wipe utility program to overwrite the entire hard drive, also before you trade in or get rid of your old cell phone find out how to delete all information including emails, apps, voice messages, and text messages. Keep passwords private, encrypted your data and do not overshare on social networks, use security software and update often, change your passwords every 3 to 6 months, be careful when using Wi-Fi in places like Starbucks or hotels make sure that your info will be protected and always read privacy policies and lock your …show more content…

Within an organization there are several functional areas that help protect personal identifiable information. There must be senior-level discussions about data because the companies are holding sensitive information. The marketer acts a point of contact, a center point for the rest of the organization. In most large organizations, there is an information security group that lays out the policies and should do a good job of educating the rest of the organization. Outside of the organization, marketers must be sensitive to anyone they may be contracting with as vendor or supplier and holding those parties accountable for data security measures. Data-driven marketers must maintain consumer trust. Everyone who touches data needs to be concerned, whether they are involved with collection, transfer, or any usage. They all must understand the

Get Access