The information they are after will change depending on what they are trying to do with it. The CES DoD Workforce Orientation is a presentation (including a question and answer segment) that has been designed to familiarize the workforce with the core tenets of the DoD CES personnel system. 0000001422 00000 n .cd-main-content p, blockquote {margin-bottom:1em;} Learning Objectives:This course is designed to enable students to: Target Audience:DOD information system users, including military members and other U.S. Government personnel and contractors within the National Industrial Security Program. Federal Information Security Modernization Act; OMB Circular A-130, Want updates about CSRC and our publications? .h1 {font-family:'Merriweather';font-weight:700;} - Analyze how an organization handles information to ensure it satisfies requirements -mitigate privacy risks -determine the risks of collecting, using, maintaining, and disseminating PII on electronic information systems. Joint Knowledge Online - jten.mil The DoD Cyber Exchange is sponsored by How to Identify PII Loss, 1 of 2 How to Identify PII . PHI is one of the most sought-after pieces of data that a cybercriminal has in their sights. Lewis's Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas . In some cases, all they need is an email address. This information can include a persons name, Social Security number, date and place of birth, biometric data, and other personal information that is linked or linkable to a specific individual. DHS employees, contractors, consultants, and detailees are required by law to properly collect, access, use, share, and dispose of PII in order to protect the privacy of individuals. The Federal government requires the collection and maintenance of PII so as to govern efficiently. In this module, you will learn about best practices for safeguarding personally identifiable information . 0000003346 00000 n Federal government websites often end in .gov or .mil. This information can be maintained in either paper, electronic or other media. COLLECTING PII. Security Awareness Hub - usalearning.gov Whether youre supplementing your training in DCWF Orientation or coming back for a refresher, this learning game is designed to test your knowledge of the Defense Cyber Workforce Framework (DCWF). 2XXi:F>N #Xl42 s+s4f* l=@j+` tA( This is information that can be used to identify an individual, such as their name, address, or Social Security number. Identity thieves are always looking for new ways to gain access to peoples personal information. PII stands for personally identifiable information. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). 0000001903 00000 n 136 0 obj <> endobj It is vital to protect PII and only collect the essential information. PII must only be accessible to those with an "official need to know.". The Privacy Act of 1974 is a federal law that establishes rules for the collection, use, and disclosure of PII by federal agencies. .manual-search-block #edit-actions--2 {order:2;} Skysnag helps busy engineers enforce DMARC, responds to any misconfigurations for SPF or DKIM which increases email deliverability, and eliminates email spoofing and identity impersonation. These attacks show how cybercriminals can use stolen PII to carry out additional attacks on organizations. Privacy Statement, Stuvia is not sponsored or endorsed by any college or university, Pennsylvania State University - All Campuses, Rutgers University - New Brunswick/Piscataway, University Of Illinois - Urbana-Champaign, Essential Environment: The Science Behind the Stories, Everything's an Argument with 2016 MLA Update, Managerial Economics and Business Strategy, Primates of the World: An Illustrated Guide, The State of Texas: Government, Politics, and Policy, IELTS - International English Language Testing System, TOEFL - Test of English as a Foreign Language, USMLE - United States Medical Licensing Examination. Guidance on the Protection of Personal Identifiable Information Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. 0000001199 00000 n Think security. The Information Security (INFOSEC) Program establishes policies, procedures, and requirements to protect classified and Controlled Unclassified Information (CUI) that, if disclosed, could cause damage to national security. Minimize the use, display or storage of Social Security Numbers (SSN) and all other PII. PCI compliance includes taking responsibility for ensuring that financial data is protected at all stages, including when it is accepted, transferred, stored, and processed. To be considered PII, the data must be able to be used to distinguish or trace an individuals identity. Any information that can be used to determine one individual from another can be considered PII. 157 0 obj <>stream The launch training button will redirect you to JKO to take the course. This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual's responsibilities for safeguarding PII. .usa-footer .container {max-width:1440px!important;} PII is a person's name, in combination with any of the following information: Mother's maiden name Driver's license number Bank account information Credit card information Relatives' names Postal address The act requires that federal agencies make their records available to the public unless the records are protected from disclosure by one of the acts exemptions. SP 800-122 (EPUB) (txt), Document History: The purpose of Lesson 1 is to provide an overview of Cyber Excepted Service (CES) HR Elements Course in general. College Physics Raymond A. Serway, Chris Vuille. Our Other Offices. Safeguarding Personally Identifiable Information (PII) - United States Army Captain Padlock: Personally Identifiable Information (PII) isinformation used to distinguish or trace an individual's identity, such as name, social security number, mother's maiden name, and biometric records. Training Catalog - DoD Cyber Exchange The GDPR requires companies to get explicit permission from individuals before collecting, using, or sharing their personal data. This is a potential security issue, you are being redirected to https://csrc.nist.gov. Identifying and Safeguarding PII V4.0 (2022) Flashcards | Quizlet 0 Organizations are encouraged to tailor the recommendations to meet their specific requirements. Which of the following are risk associated with the misuse or improper disclosure of PII? We're available through e-mail, live chat and Facebook. Identifying and Safeguarding Personally Identifiable Information (PII) Version: 5.0 Length: 1 Hour This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual . Course Launch Page - Cyber A lock () or https:// means you've safely connected to the .gov website. %%EOF The site is secure. Some types of PII are obvious, such as your name or Social Security number, but . The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student educational records. hb```> AX @Lt;8w$02:00H$iy0&1lcLo8y l ;SVn|=K [CDATA[/* >