StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Personally Identifiable Information - Research Paper Example

Cite this document
Summary
The information is mainly used to either trace or distinguish identity of individuals and/or organizations (Erika McCallister, 2010). The information retrieved…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Personally Identifiable Information
Read Text Preview

Extract of sample "Personally Identifiable Information"

The paper "Personally Identifiable Information" is a delightful example of an essay on information technology. Various agencies and organizations maintain information about individuals to facilitate the easy identification process. The information is mainly used to either trace or distinguish the identity of individuals and/or organizations (Erika McCallister, 2010). The information retrieved and stored by agencies includes name, mother’s maiden name, telephone numbers, address information, asset information, biometric records, and social security number.

Also, some agencies may need information that can be linked to a given individual such as financial, medical, and educational as well as employment information. The above-listed information among others is collectively referred to as personally-identifying information. Developments realized in the field of information technology have been responsible for personally-identifying information being collected and stored by organizations as well as agencies. The importance and potential threats facing the use of such information has resulted in more attention being directed towards the capability of the system to uphold a high level of privacy while offering appropriate protection.

Identifying information about Individuals and liable organizations whose reputation is at stake needs to be collected, stored and disclosed in accordance with privacy laws and principles (Erika McCallister, 2010). Therefore organizations and agencies dealing with personally-identifying information need to uphold a high level of privacy by ensuring that reliable protection practices are put in place to safeguard individuals and organizations against any damage caused by inappropriate dissemination of recorded information.

There are a number of factors that should be embraced by agencies dealing with confidential information about individuals and organization. The personal data being collected should be subjected to a given limit as outlined by the law (Erika McCallister, 2010). For instance, data collection has to be fair and lawful as well as after receiving consent from the data subject. Personal data need to be complete, accurate and as per the intended purpose of collection. In order to acquire consent from the data subject, the purposes need to be communicated not later than the collection date (Rosenbaum, 2015).

The use of collected data should be limited to the intended purpose only unless consent from data subject has been received or the law allows it. Concerning security matters, personal data need to be safeguarded against unauthorized access or loss, use, disclosure, modification, and destruction. Openness policy should be put in place to facilitate practices, policies, and development regarding personal data. Organizations need to put in place means enabling the easy establishment of the existence of personal information and the main purpose of use in addition to data identity controller (Rosenbaum, 2015).

Also, individuals need to be given the right to confirm if the data controller has correct personal data, as a sign of individual participation. Basing on the ethical issues related to the process of acquiring and protecting personal information, the data controller is accountable for complying with the stated factors of ensuring privacy and appropriate use of personally-identifying information. Individuals need to be protected against breach of confidentiality leading to negative effects. Unless organizations and agencies adhere to set information technology ethics outlining the use of personal information, individuals are prone to negative effects resulting from the loss or inappropriate disclosure of the information.

Individuals whose personal identifying information has been wrongly disclosed to the public are most likely to experience physical, social or financial damage. The negative effects are collectively referred to as harm. Harms against a data subject can take place in the form of identity theft, blackmail, discrimination, physical harm or emotional distress. Also, organizations face similar threats resulting from a breach of confidentiality. For instance, an organization will experience financial losses, administrative burdens, loss of public confidence and reputation as well as legal liability.

There are three impact levels associated with the loss of confidentiality with respect to the use of personally identifiable information by agencies. The impact levels can be high, moderate or low (Harold E. Gottschalk, 2012). A low impact level is experienced by an individual if the loss results into limited adverse effects on his or her finance, operations or assets. Moderate impact level is experienced when the breach of confidentiality results in serious adverse effects. The impacts can be experienced in the form of a reduced performance by the individual, significant damage to personal assets, significant financial loss and significant harm to an individual without loss of life.

Lastly, impact levels resulting from inappropriate use of personally-identifying information can result in severe adverse effects on an individual’s finance, operations, and assets. An experience of such losses confirms the existence of the third impact levels as a result of breaching of confidentiality. Therefore high impact level involves serious financial, social and physical losses, loss of livelihood as well as a loss of life (Erika McCallister, 2010). The impacts discussed above can be effectively avoided by both agencies and organizations having personally identifiable information.

There are two main measures that ought to be embraced by organizations so as to safeguard personal information collected. The first measure is procedure and policy creation.2 Organizations need to come up with appropriate policies outlining ways of handling personally-identifying information. The policies should include privacy laws and principles to safeguard personal data. The policies should explain ways of collecting, disclosing, sharing, use as well as consequences associated with failing to observe privacy principles.

The other measure involves conducting training, education, and awareness aimed at imparting members of staff with the desired body of knowledge and skills, designed to reinforce or change their behavior when handling personal information.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Personally Identifiable Information Research Paper - 23, n.d.)
Personally Identifiable Information Research Paper - 23. https://studentshare.org/information-technology/1881829-research-paper
(Personally Identifiable Information Research Paper - 23)
Personally Identifiable Information Research Paper - 23. https://studentshare.org/information-technology/1881829-research-paper.
“Personally Identifiable Information Research Paper - 23”. https://studentshare.org/information-technology/1881829-research-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Personally Identifiable Information

E-commerce Data Privacy and Security

hellip; The website must specify the kind of information that will be collected from the user.... He concluded that corporate organizations gather personal information from their users on four core factors stated below: To provide value added services to special customers.... Moreover, in order to buy any product from the website, corporate organizations require shipping and billing information in order to sell the product to the web user.... Corporate organization also trade customer information to third parties....
4 Pages (1000 words) Literature review

Personally Identifiable Information (PII) : Ethical Implications

Personally Identifiable Information (PII) – Ethical Implications Name: Institution Date: Personally Identifiable Information (PII) - Ethical Implications Personal Identifiable Information abbreviated as PII refers to the info that can be used to contact, locate or identify a single person.... The terrorists should not have any access to their Personally Identifiable Information such as face recognition or places residence.... On the other hand, fraudsters can access an individual's Personally Identifiable Information and use the information to defraud a hardworking citizen of his or her hard-earned...
3 Pages (750 words) Research Paper

Protecting Personally Identifiable Information and other ethical issues

Protection of Personally Identifiable Information, ensuring safety of involved stakeholders, benefiting stakeholders, respecting autonomy, acting with integrity are some of the ethical issues, and this paper explores them subject to ethical theories.... Protection of Personally Identifiable Information is a significant ethical issue and involves such principles as privacy, confidentiality, and anonymity and traverses utilitarianism, deontology, and virtue ethics theories....
3 Pages (750 words) Research Paper

Secure Computer Systems

'Protecting Personally Identifiable Information (PII) (http://www.... 'Protecting Personally Identifiable Information (PII) (http://www.... "Improving data protection reduces risks associated with breaches and will enhance confidence in the government's ability to protect citizens' privacy and personal information, while simultaneously enabling greater efficiency in the delivery of e government services.... "Improving data protection reduces risks associated with breaches and will enhance confidence in the government's ability to protect citizens' privacy and personal information, while simultaneously enabling greater efficiency in the delivery of e government services....
2 Pages (500 words) Essay

W5-Data Security Policy

Business and client information security and privacy are the leading concern in… This research is about the preservation of the business and client information as well as other confidential information ... y information we point out data that have been produced into the structure that is significant and functional to the human beings (Laudon & Modern technology poses modern confronts to the protection of entity privacy which existing (Laudon & Laudon, 1999)....
5 Pages (1250 words) Essay

Final Project Problem at Work

4), “Personally Identifiable Information (PII) is any information that permits the identity of an individual to be directly inferred.... This is because it has been discovered that loss of Personally Identifiable Information has resulted to loss of millions of records over the past few years thus causing massive harms to both individuals and organizations (McCallister, 2010).... However, in most cases the loss of Personally Identifiable Information is only discovered after it has already caused massive harm to the victims some of which are irreversible....
4 Pages (1000 words) Essay

Direct Marketing as a Tool to Eliminate Middlemen in the Promotion Process

It identifies customer needs, determines the target markets, and designs appropriate products, services and programmes to serve these markets.... Overall corporate success hinges essentially on how effectively… This is due to the fact that marketing management provides vital means to interact with consumers, competitors and society at large, and to influence the outcome of a business operation....
6 Pages (1500 words) Essay

Personally Identifiable Information

To sufficiently protect PII, one must comprehend what Personal… PII is the type of information that distinguishes the identity of a person e.... In the recent past, millions of consumers have had their identity compromised leading to information in the modern society is becoming easily available to many people.... The internet in specific is one of the main sources through, which many people are obtaining information concerning other persons....
4 Pages (1000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us