Featured Research

from universities, journals, and other organizations

Guide To Protect People From Theft Of Personally Identifiable Information

Date:
January 14, 2009
Source:
National Institute of Standards and Technology
Summary:
A new draft guide on protecting personally identifiable information such as social-security and credit-card account numbers from unauthorized use and disclosure.

Thefts of personally identifiable information (PII), such as social security and credit card account numbers, are increasing dramatically. Adding to the difficulty of fighting this problem, organizations often disagree on what PII is, and how to protect it. Now, in a first-of-its-kind publication, the National Institute of Standards and Technology (NIST) has issued a draft guide on protecting PII from unauthorized use and disclosure.

Related Articles


“You can’t protect PII unless you can identify it,” says NIST’s Erika McCallister, a co-author of the new work. The new NIST publication provides practical guidelines for implementing a basic definition of PII established by the government’s Office and Management and Budget (OMB) in a 2007 memo: “information which can be used to distinguish or trace an individual’s identity” either all by itself—such as fingerprints, which are unique—or in combination with other information, such as date of birth, which can belong to multiple people but can be narrowed down to an individual in connection with other data.

Echoing former national security advisor McGeorge Bundy, who once stated, “If we guard our toothbrushes and diamonds with equal zeal, we will lose fewer toothbrushes and more diamonds,” McCallister and her co-authors observe that, “All PII is not created equal.” A telephone area code holds less specific information about an individual than a social security number, so “you don’t need to protect things the same way,” McCallister says.

The NIST team recommends tailoring safeguards to the level of risk involved in holding personal information. PII should be graded by “PII confidentiality impact level,” the degree of potential harm that could result from the PII if it is inappropriately revealed. For example, an organization might require appropriate training for all individuals who are granted access to PII, with special emphasis on moderate- and high-impact PII, and might restrict access to high-impact PII from mobile devices, such as laptops and cellphones, which are generally at greater risk of compromise than non-portable devices, such as desktop computers at the organization’s headquarters.

The publication also recommends basic actions that organizations should take: identify all the PII they maintain, minimize the amount of PII they collect to what is strictly necessary to accomplish their mission, and develop incident response plans to handle breaches of PII. Such plans would include elements such as determining when and how individuals should be notified, and whether to provide remedial services, such as credit monitoring, to affected individuals.

Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)


Story Source:

The above story is based on materials provided by National Institute of Standards and Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute of Standards and Technology. "Guide To Protect People From Theft Of Personally Identifiable Information." ScienceDaily. ScienceDaily, 14 January 2009. <www.sciencedaily.com/releases/2009/01/090113174619.htm>.
National Institute of Standards and Technology. (2009, January 14). Guide To Protect People From Theft Of Personally Identifiable Information. ScienceDaily. Retrieved March 6, 2015 from www.sciencedaily.com/releases/2009/01/090113174619.htm
National Institute of Standards and Technology. "Guide To Protect People From Theft Of Personally Identifiable Information." ScienceDaily. www.sciencedaily.com/releases/2009/01/090113174619.htm (accessed March 6, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Friday, March 6, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Star Wars Inspires Mobile Holograms

Star Wars Inspires Mobile Holograms

Reuters - Business Video Online (Mar. 6, 2015) 3D holograms could soon be coming to your mobile phone. Inspired by the famous Princess Leia hologram from Star Wars, a U.S. company is showcasing a prototype display at the Mobile World Congress at Barcelona and says it could be used for real-time video calls. Ivor Bennett reports Video provided by Reuters
Powered by NewsLook.com
Game Makers Lured Into Virtual Worlds

Game Makers Lured Into Virtual Worlds

AFP (Mar. 6, 2015) Some 25,000 people have descended upon San Francisco to show off the latest technologies and video games at the Game Developers Conference. Developers here discuss the future of the industry. Duration: 02:20. Video provided by AFP
Powered by NewsLook.com
Star Wars-Inspired Prototype Creates Holographic Display

Star Wars-Inspired Prototype Creates Holographic Display

Reuters - Innovations Video Online (Mar. 5, 2015) A prototype holographic display named Leia - after the Star Wars princess who appeared in holographic form asking Obi-Wan Kenobu for help - is demonstrated at the Mobile World Congress in Barcelona. Matthew Stock reports. Video provided by Reuters
Powered by NewsLook.com
IKEA and Samsung Launch Embedded Wireless Charging Range

IKEA and Samsung Launch Embedded Wireless Charging Range

Reuters - Innovations Video Online (Mar. 5, 2015) Samsung and IKEA hope their new embedded wireless charging products, launched at Barcelona&apos;s Mobile World Congress, will tempt consumers eager for plugless power. Jim Drury reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins