Nobody downloaded yet

Personally Identifiable Information (PII) - Research Paper Example

Comments (0) Cite this document
Summary
Therefore, training and knowledge of the PII is of unmeasurable vitality in today’s society. To sufficiently protect PII, one must comprehend what Personal…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Personally Identifiable Information (PII)
Read TextPreview

Extract of sample "Personally Identifiable Information (PII)"

Download file to see previous pages Information in the modern society is becoming easily available to many people. The internet in specific is one of the main sources through, which many people are obtaining information concerning other persons. Some of the search engines of the internet such as Google can provide important details of a person if well used. Therefore, the private sector as well as public sector should ensure that vital information of people is protected from being accessed by an unauthorized persons. In addition to search engines, social networks are playing a critical role in disclosing personal information, which can be used to for illegal acts. Thus, because of this, various governments and law making agencies have imposed various Acts and Laws in order to enhance Protecting Personal Information (PPI).
The legal and federal agencies have a mandate to protect sensitive information of people from unauthorized access. The Privacy Act (1974) was the first legislation created to oversee that personal information is safeguarded. The Act was established amidst rising concerns on the impact of computer databases on the private rights of individuals. The Act details how, what, or when the information is to be disclosed. The State, Federal and Local agencies shall collect information to help them conducting their businesses but should properly protect the data from the unauthorized intrusion. The U.S. Department of Commerce (DOC) in partnership with ‘National Institute of Standards and Technology (NIST)’ established Special Publication (SP) 800-122, which protects the PII existing in databases.
‘The National Institute of Standards and Technology’ proposes that agencies should establish safeguards to ensure proper handling of the information. In this regard therefore, organizations should enforce the following; creation of policies and procedures for PPI, conducting appropriate training of employees to reduce the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Personally Identifiable Information (PII) Research Paper - 1”, n.d.)
Retrieved from https://studentshare.org/information-technology/1659062-personally-identifiable-information-pii
(Personally Identifiable Information (PII) Research Paper - 1)
https://studentshare.org/information-technology/1659062-personally-identifiable-information-pii.
“Personally Identifiable Information (PII) Research Paper - 1”, n.d. https://studentshare.org/information-technology/1659062-personally-identifiable-information-pii.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Personally Identifiable Information (PII)

Identity Theft (PII)

...?Identity Theft Introduction Identity theft is the crime that involves stealing of a person’s private information “in order to impersonate that person in a legal sense”, according to Vacca (2005, p.137). When a person’s identity is stolen, he is at great risk of facing a terrifying number of monetary and individual dealings done in his name by the thief. Technology, along with its pros, has introduced exceedingly technical and chic means of acquiring someone’s basic identifying information. Whatever means the thief uses, identity theft brings great damage to the victim’s name and reputation as the victim is solely left responsible for...
3 Pages(750 words)Research Paper

Thinking Personally about Social Change

...? I am a South Asian residing in a small town in Karachi. Karachi has been my of birth and I grew up in this I have witnessed all phases of my life and survived this city through its worst and best phases. The city is the financial hub of the country, is the 11th largest city in the world and is home to millions. It is a rich ethnic composition of immigrants from India, Pakhtuns, Pathans and Pashtos. However the city is low on its literacy rate and high on poverty rates. The poverty rates were very high a decades and people were dying of mal nutrition back then. Similarly where education was concerned, the lower middle class and the lower class was especially negligent of the need to give their children education. Some of them... I am a South ...
3 Pages(750 words)Assignment

Personally Identifiable Information (PII) : Ethical Implications

...? Personally Identifiable Information (PII) – Ethical Implications Personally Identifiable Information (PII) - Ethical Implications Personal Identifiable Information abbreviated as PII refers to the info that can be used to contact, locate or identify a single person. On the other hand, ethics refers to the standards put in place to tear the line between right and wrong. In as much as Personal Identifiable Information is important in the modern...
3 Pages(750 words)Research Paper

Protecting Personally Identifiable Information and other ethical issues

...? Protecting personality identifiable information and other ethical issues July 21, Protecting personality identifiable information and other ethical issues Law and ethics are general and popular guiding principles in people’s actions and interactions. Ethics defines concepts of morality for identification of rights and wrongs for regulation of behavior among individuals or groups of people. Protection of personally identifiable information, ensuring safety of involved stakeholders, benefiting stakeholders, respecting autonomy, acting with integrity are some of the ethical issues, and...
3 Pages(750 words)Research Paper

Secure Computer Systems

...enabling greater efficiency in the delivery of e government services. Through a depth of experience and breadth of technologies spanning from servers to desktops and laptop PCs to mobile devices, Microsoft offers the most comprehensive technological solution to address this ongoing need". By Kimberly Nelson, Microsoft executive director for e-government, and William Billings, chief security advisor for the Microsoft U.S. Public Sector division. 'Protecting personally identifiable information (PII) (http://www.microsoft.com/industry/government/federal/protectinginformation.mspx) Crippling penalties and fines on errant institutions that have had a lax approach to...
2 Pages(500 words)Essay

INFORMATION SOCIETY & INFORMATION ECONOMY

...INFORMATION SOCIETY & INFORMATION ECONOMY Online banking and information economy Introduction The internet has revolutionized the use and abuse of information and communication technology (ICT) in almost every sphere of commercial and non commercial activity. Thus ICT has acquired a significant dimension in the coordination efforts of companies in their global operations and it is increasingly becoming the world's most important determinant of commercial and trade related issues and actions. For instance online banking has become the daily norm of many customers. Its significance in the internal and external communication strategy of the bank in its global and local...
16 Pages(4000 words)Essay

INFORMATION SOCIETY & INFORMATION ECONOMY

...News (2002) reported that television in Britain is undergoing its biggest change since the introduction of color pictures in the 1960s and the arrival of multichannel satellite TV in the late 1980s. The new generation of digital televisions uses the same technology as computers which implies that anything one can do in a personal computer can also be done in digital TV. The interactive benefits include extra information on-screen using the remote control, or alternative camera angles during sports events, and e-commerce facilities. The companies are able to offer this because cable networks can carry much more data much faster than phone lines. More than a third of British homes now have digital TVs, or...
16 Pages(4000 words)Essay

How did psychology effect our personally

...Psychology Effects Psychology has played a huge role at affecting me on a personal level. It has made me understand the different nuances of life in a much broader fashion than I used to think of the same in the past. It is a fact that psychology is something that puts things into proper equations and resolves conflicts. Psychology has been able to change my thinking because it has made alternate arrangements in the wake of trying circumstances. It has altered the ways and means through which value is derived for my respective work tasks (Wang, 2006). It has eased things which are somewhat of an interesting domain for me as well as the ones which were earlier taken up as being difficult and hard to come by with. Its role has been... ...
2 Pages(500 words)Essay

Research Paper PII

...Personally Identifiable Information (PII) Introduction The use of the digital technologies in processing information exposes usersto the risk of losing the vital personal information to fraudsters. While computers have revolutionized numerous aspects of human life including communication and economics, the same technology has equally presented numerous risks. Cybercrime refers to a unique type of criminal activities carried out through the internet. This implies that users must employ appropriate measures in order to curb the infiltration of privacy and the loss of vital personal information on the digital formats. Cyber criminals use numerous technologies in forcing entrance into personal accounts thus obtaining valuable personal... ...
4 Pages(1000 words)Essay

1.Personally Identifiable Information (PII)

...Personally Identifiable Information Introduction In today’s age, the Personal Identifiable Information (PII) is a rather sensitive and delicate data for the personal identification. It’s therefore imperative that the knowledge and training on the PII is given immeasurable priority in the modern age. To sufficiently protect the Personal Identifiable Information, proper comprehension about it is needed. PII is the information that is used in distinguishing the identity of someone. Examples of the...
3 Pages(750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Personally Identifiable Information (PII) for FREE!

Contact Us