Monday, May 13, 2019

1.Personally Identifiable Information (PII) Research Paper

1.Personally Identifiable Information (PII) - Research Paper ExampleThe internet is iodin of the leading sources through which the PII washstand be obtained. The search engines such as Google and social networks can be used in disclosing vital details about a person. The public and private sector should then take a leading role in the protective cover of this vital data from access by the unauthorized persons. The disclosure of this information can be used to do illegal acts. Various justice making agencies and the governments have imposed Laws and Acts with an aim of enhancing protection of the PII.The legal and national units have obligation defend the small information of persons from access by the unauthorized persons. The Privacy Act (1974) was established to ensure that the sensitive information is properly guarded. The Act details what, when or how the sensitive information of people should be disclosed. The State, Federal and Local agencies shall collect the informati on to facilitate the conducting of the businesses while ensuring the protection of the information from the unauthorized intrusion (Arditi, Herman, & Lambert, 2013). The guinea pig Institute of Standards and Technology proposes that the agencies should put measures in place to ensure that the information is properly handled. To enhance protection of the PII, organizations should carry out the following creation of the procedures and policies for the PII, appropriate training to reduce exposure of the PII, response conception development (to reduce PII breach), Collection and Retention of the PII, and among many more others.The unethical use of the data (data breaches) has change magnitude tremendously since the introduction of the PII. Due to the security breaches, PII continues to be in danger with the introduction of the new technology. PII can not only open the financial accounts, but also make falsified purchases (Chalmers, 2013). The Cyber Criminals and data thieves attach edged interest on the PII

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.