Companies are required to provide individuals with information about their rights under the GDPR and ensure that individuals can easily exercise those rights. This course may also be used by other Federal Agencies. 0000001199 00000 n Or they may use it themselves without the victims knowledge. PPTX Safeguarding PIITraining Course - United States Army In addition to the forgoing, if contract employees become aware of a theft or loss of PII, they are required to immediately inform their DOL contract manager. @media only screen and (min-width: 0px){.agency-nav-container.nav-is-open {overflow-y: unset!important;}} This includes companies based in the U.S. that process the data of E.U. PII must only be accessible to those with an official need to know.. How to Identify PII Loss, 1 of 2 How to Identify PII . PCI compliance includes taking responsibility for ensuring that financial data is protected at all stages, including when it is accepted, transferred, stored, and processed. PII is any information that can be used to identify a person, such as your name, address, date of birth, social security number, and so on. Topics, Erika McCallister (NIST), Tim Grance (NIST), Karen Scarfone (NIST). SP 800-122 (DOI) This includes information like names and addresses. Local Download, Supplemental Material: DHS employees, contractors, consultants, and detailees are required by law to properly collect, access, use, share, and dispose of PII in order to protect the privacy of individuals. Subscribe, Contact Us | Unauthorized recipients may fraudulently use the information. .usa-footer .container {max-width:1440px!important;} What is PII? Examples, laws, and standards | CSO Online The purpose of Lesson 1 is to provide an overview of Cyber Excepted Service (CES) HR Elements Course in general. or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. PRIVACY AND PERSONALLY IDENTIFIABLE INFORMATION (PII - Quizlet View more (Brochure) Remember to STOP, THINK, before you CLICK. The course is designed to prepare DOD and other Federal employees to recognize the importance of PII, to identify what PII is, and why it is important to protect PII. Major legal, federal, and DoD requirements for protecting PII are presented. Dont Be Phished! In this module, you will learn about best practices for safeguarding personally identifiable information . Within HIPAA are the privacy rule and the subsets, security rule, enforcement rule, and breach notification rule which all deal with various aspects of the protection of PHI. 173 0 obj <>/Filter/FlateDecode/ID[<433858351E47FF448B53C1DCD49F0027><3128055A8AFF174599AFCC752B15DF22>]/Index[136 68]/Info 135 0 R/Length 157/Prev 228629/Root 137 0 R/Size 204/Type/XRef/W[1 3 1]>>stream The CES DoD Workforce Orientation is a presentation (including a question and answer segment) that has been designed to familiarize the workforce with the core tenets of the DoD CES personnel system. The purpose of this course is to identify what Personally Identifiable Information (PII) is and why it is important to protect it. It is vital to protect PII and only collect the essential information. This interactive training explains various types of social engineering, including phishing, spear phishing, whaling, smishing, and vishing. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) The site is secure. Get started with Skysnag and sign up using this link for a free trial today. law requires gov to safeguard pii privacy act senior military component offical for privacy DON CIO info stored on a computer data at rest scenario considered a breach -leaving document with pii in open area -attaching someone's medical info in a letter to the wrong recipient -posting truncated ssn in a public website Before sharing sensitive information, make sure youre on a federal government site. This interactive exercise provides practical experience in the processes of cybersecurity risk assessment, resource allocation, and network security implementation. The GDPR imposes significant fines for companies that violate its provisions, including up to 4% of a companys global annual revenue or 20 million (whichever is greater), whichever is greater. .cd-main-content p, blockquote {margin-bottom:1em;} A .gov website belongs to an official government organization in the United States. 0000001866 00000 n IDENTIFYING & SAFEGUARDING PII Which of the following are risk associated with the misuse or improper disclosure of PII? PDF Cyber Awareness Challenge 2022 Information Security Only individuals who have a "need to know" in their official capacity shall have access to such systems of records. Identifying and safeguarding personally identifiable information This course explains the responsibilities for safeguarding PII and PHI on both the organizational and individual levels, examines the authorized and unauthorized use and disclosure of PII and PHI, and the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection. .manual-search ul.usa-list li {max-width:100%;} PII is any information which can be used to distinguish or trace an individuals identity. trailer Learning Objectives:This course is designed to enable students to: Target Audience:DOD information system users, including military members and other U.S. Government personnel and contractors within the National Industrial Security Program. The information they are after will change depending on what they are trying to do with it. ), which was introduced to protect the rights of Europeans with respect to their personal data. Classification Conflicts and Evaluations IF110.06 Derivative Classification IF103.16 Joint Knowledge Online - jten.mil 0000002158 00000 n The Federal government requires the collection and maintenance of PII so as to govern efficiently. 147 0 obj <> endobj .h1 {font-family:'Merriweather';font-weight:700;} Federal Information Security Modernization Act; OMB Circular A-130, Want updates about CSRC and our publications? Damage to victims can affect their good name, credit, job opportunities, possibly result in criminal charges and arrest, as well as cause embarrassment and emotional stress. .paragraph--type--html-table .ts-cell-content {max-width: 100%;} PII stands for personally identifiable information. PII can include anything from a persons name and address to their biometric data, medical history, or financial transactions. Managing, safeguarding, and evaluating their systems of records Providing training resources to assure proper operation and maintenance of their system(s) Preparing public notices and report for new or changed systems `I&`q# ` i . The act requires that federal agencies give individuals notice of their right to access and correct their PII and establish penalties for PII misuse. The .gov means its official. To be considered PII, the data must be able to be used to distinguish or trace an individuals identity. DOD Mandatory Controlled Unclassified Information (CUI) Training PII stands for personally identifiable information. #block-googletagmanagerfooter .field { padding-bottom:0 !important; } For example, they may not use the victims credit card, but they may open new, separate accounts using the victims information. 0000003346 00000 n The following are some examples of information that can be considered PII: Several merchants, financial institutions, health organizations, and federal agencies, such as the Department of Homeland Security (DHS), have undergone data breaches that put individuals PII at risk, leaving them potentially vulnerable to identity theft. Contract employees also shall avoid office gossip and should not permit any unauthorized viewing of records contained in a DOL system of records. DOL internal policy specifies the following security policies for the protection of PII and other sensitive data: The loss of PII can result in substantial harm to individuals, including identity theft or other fraudulent use of the information. Privacy Statement, Stuvia is not sponsored or endorsed by any college or university, Pennsylvania State University - All Campuses, Rutgers University - New Brunswick/Piscataway, University Of Illinois - Urbana-Champaign, Essential Environment: The Science Behind the Stories, Everything's an Argument with 2016 MLA Update, Managerial Economics and Business Strategy, Primates of the World: An Illustrated Guide, The State of Texas: Government, Politics, and Policy, IELTS - International English Language Testing System, TOEFL - Test of English as a Foreign Language, USMLE - United States Medical Licensing Examination, Identifying and Safeguarding PII V4.0 (2022);TEST OUT Qs & Final Test Solved completely. PII can also include demographic, medical, and financial information, or any other information linked or linkable to a specific . This document provides practical, context-based guidance for identifying PII and determining what level of protection is appropriate for each instance of PII. (Answered) IDENTIFYING & SAFEGUARDING PII Test 2022|2023. - Analyze how an organization handles information to ensure it satisfies requirements -mitigate privacy risks -determine the risks of collecting, using, maintaining, and disseminating PII on electronic information systems. Company Registration Number: 61965243 Identify the responsibilities for safeguarding PII and PHI on both the organizational and individual levels Identify use and disclosure of PII and PHI State the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection Delivery Method: eLearning Length: 1 hour The document also suggests safeguards that may offer appropriate levels of protection for PII and provides recommendations for developing response plans for incidents involving PII. The Freedom of Information Act (FOIA) is a federal law that gives individuals the right to access certain government records. This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual's responsibilities for safeguarding PII. Developed to be used in conjunction with annual DoD cybersecurity awareness training, this course presents the additional cybersecurity responsibilities for DoD information system users with access privileges elevated above those of an authorized user. .manual-search-block #edit-actions--2 {order:2;} Organizations are encouraged to tailor the recommendations to meet their specific requirements. Secure .gov websites use HTTPS Industry tailored BEC Protection, Email authentication and DMARC enforcement. This information can include a persons name, Social Security number, date and place of birth, biometric data, and other personal information that is linked or linkable to a specific individual. This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual's responsibilities for safeguarding PII. The Department of Energy defines PII as any information collected or maintained by the department about an individual that could be used to distinguish or trace their identity. Avoid compromise and tracking of sensitive locations. 2XXi:F>N #Xl42 s+s4f* l=@j+` tA( Terms of Use This training is intended for DOD civilians, military members, and contractors using DOD information systems. Course Launch Page - Cyber 04/06/10: SP 800-122 (Final), Security and Privacy View more DoD Cyber Workforce Framework (DCWF) Orientation is an eLearning course designed to familiarize learners with the fundamental principles of the DCWF. Any information that can be used to determine one individual from another can be considered PII. Captain Padlock: Personally Identifiable Information (PII) isinformation used to distinguish or trace an individual's identity, such as name, social security number, mother's maiden name, and biometric records. The DoD Cyber Exchange is sponsored by Air Force Privacy Act > Important Links > Training - AF PII can be used to commit identity theft in several ways. Handbook for Safeguarding Sensitive Personally Identifiable Information Ensure that the information entrusted to you in the course of your work is secure and protected. SP 800-122 (EPUB) (txt), Document History: Identifying and Safeguarding Personally Identifiable Information (PII) /*-->*/. Identifying and Safeguarding Personally Identifiable Information (PII) Version: 5.0 Length: 1 Hour This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual . Our Other Offices. When approval is granted to take sensitive information away from the office, the employee must adhere to the security policies described above. Terms of Use System Requirements:Checkif your system is configured appropriately to use STEPP. 147 11 0 Share sensitive information only on official, secure websites. The U.S. General Services Administration notes that PII can become more sensitive when it is combined with other publicly available information. Identity thieves are always looking for new ways to gain access to peoples personal information. This is information that can be used to identify an individual, such as their name, address, or Social Security number. Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. In others, they may need a name, address, date of birth, Social Security number, or other information. PII can be collected in a combination of methods, including through online forms, surveys, and social media. Washington, DC 202101-866-4-USA-DOL1-866-487-2365www.dol.gov, Industry-Recognized Apprenticeship Programs (IRAP), Bureau of International Labor Affairs (ILAB), Employee Benefits Security Administration (EBSA), Employees' Compensation Appeals Board (ECAB), Employment and Training Administration (ETA), Mine Safety and Health Administration (MSHA), Occupational Safety and Health Administration (OSHA), Office of Administrative Law Judges (OALJ), Office of Congressional and Intergovernmental Affairs (OCIA), Office of Disability Employment Policy (ODEP), Office of Federal Contract Compliance Programs (OFCCP), Office of Labor-Management Standards (OLMS), Office of the Assistant Secretary for Administration and Management (OASAM), Office of the Assistant Secretary for Policy (OASP), Office of the Chief Financial Officer (OCFO), Office of Workers' Compensation Programs (OWCP), Ombudsman for the Energy Employees Occupational Illness Compensation Program (EEOMBD), Pension Benefit Guaranty Corporation (PBGC), Veterans' Employment and Training Service (VETS), Economic Data from the Department of Labor, Guidance on the Protection of Personal Identifiable Information. It is the responsibility of the individual user to protect data to which they have access. Retake Identifying and Safeguarding Personally Identifiable Information (PII). Minimize the use, display or storage of Social Security Numbers (SSN) and all other PII. Identifying and Safeguarding Personally Identifiable Information (PII This information can be maintained in either paper, electronic or other media. Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. Security Awareness Hub - usalearning.gov Official websites use .gov The Federal government requires the collection and maintenance of PII so as to govern efficiently. Biology Mary Ann Clark, Jung Choi, Matthew Douglas. The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. Unlock insights, bypass email authentication configuration issues including SPF and DKIM; and protect your domain from spoofing with strict DMARC enforcement, all autonomously with Skysnag. Erode confidence in the governments ability to protect information. Non-sensitive PII is information that can be used to identify an individual, but that is not likely to be used to harm them if it falls into the wrong hands. ), Health Information Technology for Economic and Clinical Health Act (HITECH), Encrypting all PII data in transit and at rest, Restricting access to PII data to only those who need it, Ensuring that all PII data is accurate and up to date, Destroying PII data when it is no longer needed. This factsheet is intended to help you safeguard Personally Identifiable Information (PII) in paper and electronic form during your everyday work activities. .table thead th {background-color:#f1f1f1;color:#222;} The regulation applies to any company that processes the personal data of individuals in the E.U., regardless of whether the company is based inside or outside the E.U. This includes information like Social Security numbers, financial information, and medical records. Ensure that the information entrusted to you in the course of your work is secure and protected. div#block-eoguidanceviewheader .dol-alerts p {padding: 0;margin: 0;} .usa-footer .grid-container {padding-left: 30px!important;} Which of the following establishes Written for Institution Central Texas College Course All documents for this subject (1) The benefits of buying summaries with Stuvia: Guaranteed quality through customer reviews PII can be defined in different ways, but it typically refers to information that could be used to determine an individual, either on its own or in combination with other information. PII is a person's name, in combination with any of the following information: Mother's maiden name Driver's license number Bank account information Credit card information Relatives' names Postal address PII must only be accessible to those with an "official need to know.". The DoD ID number or other unique identifier should be used in place of the SSN whenever possible. Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and Accountability Act (HIPAA), 1995 Data Protection Directive (95/46/E.C. ol{list-style-type: decimal;} The Office of Personnel Management and Anthem breaches are examples of this, where millions of pieces of PII were taken and then used to attack other organizations like the IRS. Sensitive PII is information that can be utilized to identify an individual and that could potentially be used to harm them if it fell into the wrong hands. Documentation hb```f`` B,@Q\$,jLq `` V Result in disciplinary actions. In some cases, all they need is an email address. Some accounts can even be opened over the phone or on the internet. Identifying and Safeguarding PII V4.0 (2022) Flashcards | Quizlet Safeguarding Personally Identifiable Information (PII) - United States Army Thieves can sell this information for a profit. The GDPR replaces the 1995 Data Protection Directive (95/46/E.C. Identifying and Safeguarding Personally Identifiable Information (PII) Marking Special Categories of Classified Information Original Classification Unauthorized Disclosure of Classified Information and Controlled Unclassified Information Insider Threat Establishing an Insider Threat Program Insider Threat Awareness Maximizing Organizational Trust The document explains the importance of protecting the confidentiality of PII in the context of information security and explains its relationship to privacy using the the Fair Information Practices, which are the principles underlying most privacy laws and privacy best practices. The CES Operational eGuide is an online interactive resource developed specifically for HR practitioners to reference the following topics: History, Implementation, Occupational Structure, Compensation, Employment and Placement, Performance Management, Performance and Conduct Actions, Policies and Guidance. Lewis's Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas . PII should be protected from inappropriate access, use, and disclosure. 0000001422 00000 n (Answered) IDENTIFYING & SAFEGUARDING PII Test 2022|2023. The Leaders Orientation is an executive presentation (including a question and answer segment) that has been designed to familiarize DoD Leaders with core tenets of the DoD CES personnel system. Start/Continue Identifying and Safeguarding Personally Identifiable Information (PII). [CDATA[/* >