Whether at work, at home, or on the go, we’re beholden to a lifecycle of data that is often the top target of cybercriminals. Protecting that data isn’t a highly technical process, but rather one that requires common t to privacy in every aspect of our lives! sense and a strong commitment
What is PII?
PII, or personally identifiable information, is sensitive data that could be used to identify, contact, or locate an individual. t to privacy in every aspect our live
What are some examples of PII? PII includes (but is not limited to) home addresses, personal email addresses, national ID numbers, credit card numbers, and personal phone numbers.
What are some examples of non-PII? Info such as business phone numbers and email addresses, race, religion, gender, workplace, and job titles are typically not considered PII.
But they should still be treated as sensitive, linkable info because they could identify an individual when combined with other data.
Why is PII so important?
On a personal level, our PII is necessary to acquire some goods and services, such as medical care and utilities. But in the wrong hands, PII leads to identity theft and other forms of fraud.
On a professional level, we may store PII of customers, clients, vendors, contractors, employees, and partners. If left unprotected, our organization could face steep fines and our reputation could be severely damaged.
How do you protect PII at work?
Protecting PII begins and ends with following our organization’s security policies, which were created to ensure that the data we handle remains private.
Treat all requests for sensitive info with a high degree of scrutiny, stay alert, think before you click, and if you have any questions, please ask! For more info on email filtering click here
How do you protect PII at home?
We encourage you to develop a home security policy similar to what we use here at work, which calls for common sense practices, such as not clicking on random links and attachments, guarding personal info online and in real life, destroying sensitive documents beyond recognition, and setting social media profiles to fully private.