173 0 obj <>/Filter/FlateDecode/ID[<433858351E47FF448B53C1DCD49F0027><3128055A8AFF174599AFCC752B15DF22>]/Index[136 68]/Info 135 0 R/Length 157/Prev 228629/Root 137 0 R/Size 204/Type/XRef/W[1 3 1]>>stream PII is information that can be used to identify or contact a person uniquely and reliably or can be traced back to a specific individual. Which of the following are risk associated with the misuse or improper disclosure of PII? We're available through e-mail, live chat and Facebook. Think security. planning; privacy; risk assessment, Laws and Regulations /*-->*/. In the event their DOL contract manager is not available, they are to immediately report the theft or loss to the DOL Computer Security Incident Response Capability (CSIRC) team at dolcsirc@dol.gov. The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that protects the privacy of health information. This course explains the responsibilities for safeguarding PII and PHI on both the organizational and individual levels, examines the authorized and unauthorized use and disclosure of PII and PHI, and the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection. PCI-DSS is a set of security standards created to protect cardholder data. These attacks show how cybercriminals can use stolen PII to carry out additional attacks on organizations. #block-googletagmanagerfooter .field { padding-bottom:0 !important; } PII is regulated by a number of laws and regulations, including the Gramm-Leach-Bliley Act, the Fair Credit Reporting Act, and the Health Insurance Portability and Accountability Act. Result in disciplinary actions. However, because PII is sensitive, the government must take care to protect PII, as the unauthorized release or abuse of PII could result in potentially grave repercussions for the individual whose PII has been compromised, as well as for the federal entity entrusted with safeguarding the PII. PRIVACY AND PERSONALLY IDENTIFIABLE INFORMATION (PII - Quizlet Essential Environment: The Science Behind the Stories Jay H. Withgott, Matthew Laposata. COLLECTING PII. To be considered PII, the data must be able to be used to distinguish or trace an individuals identity. Our Other Offices. Safeguarding Personally Identifiable Information (PII) - United States Army The CES DoD Workforce Orientation is a presentation (including a question and answer segment) that has been designed to familiarize the workforce with the core tenets of the DoD CES personnel system. The Information Security (INFOSEC) Program establishes policies, procedures, and requirements to protect classified and Controlled Unclassified Information (CUI) that, if disclosed, could cause damage to national security. endstream endobj startxref Identifying and Safeguarding Personally Identifiable Information (PII) This training starts with an overview of Personally Identifiable Information (PII), and protected health information (PHI), a significant subset of PII, and the significance of each, as well as the laws and policy that govern the maintenance and protection of PII and PHI.
identifying and safeguarding pii knowledge check