Personally identifiable information (PII), refers to any data that can be used to identify a specific individual, either directly or indirectly. This includes information such as name, address, social security number, email address, phone number, and date of birth. PII can also include less obvious data points like IP addresses and device identifiers when they can be linked to an individual. Organizations must take precautions to secure and protect PII to maintain user privacy and comply with data protection regulations.
Advancements in information technology have resulted in a lucrative market for gathering and reselling PII. Because of its potential use in identity theft and financial crime, bad actors target PII. In response to mounting risks, numerous website privacy policies explicitly address PII collection. PII is also protected under legal and regulatory requirements that mandate the uses, treatment of, and security measures to protect consumers.
Legislations include the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA). In cloud environments, measures such as encryption and access controls are often implemented to protect PII. A data breach involving PII can result in financial loss, damage to reputation, and even legal liability in some cases.
So what exactly is PII?
In the United States, the National Institute of Standards and Technology Special Publication 800-122 defines PII, or personally identifiable information, as "any information about an individual maintained by an agency, including any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information."
Securing PII is of highest priority due to its potential impact on individuals' privacy, safety, and financial well-being. Unauthorized access to PII can lead to identity theft, fraud, and reputational damage, putting individuals at significant risk. Additionally, breaches involving PII can result in substantial financial losses for businesses, legal penalties, and damage to their reputation.
Organizations are obligated to protect PII under various data protection regulations, such as GDPR and HIPAA, which mandate stringent security measures to safeguard sensitive personal information. By securing PII, organizations not only uphold their ethical responsibility toward user privacy but also maintain compliance with regulatory requirements, mitigate financial and legal risks, and preserve trust with customers and stakeholders.
PII laws and regulations aim to protect individuals' privacy by ensuring that their personal information is securely collected, processed, stored, and shared. These laws vary across countries and regions, but the core principles remain similar.
GDPR, implemented in 2018, is the most comprehensive privacy legislation globally, applicable to all EU member countries. It regulates PII processing, provides data subjects with rights such as access, rectification, and erasure, and enforces strict penalties for non-compliance. Organizations that process data of EU residents must comply with GDPR, regardless of their location.
The US lacks a comprehensive federal privacy law. Instead, it has a sectoral approach, with laws like HIPAA for healthcare, COPPA (Children's Online Privacy Protection Act) for children's data, and GLBA (Gramm-Leach-Bliley Act) for financial institutions. Additionally, some states have enacted their own privacy laws, such as the California Consumer Privacy Act (CCPA).
PIPEDA is a federal privacy law that governs the collection, use, and disclosure of personal information in the course of commercial activities. It requires organizations to obtain consent for data collection and processing, implement security measures, and provide individuals access to their data.
The Privacy Act 1988 governs the protection of personal information in Australia. The APPs, which are part of the act, set out 13 principles that regulate the handling of personal information by organizations, including collection, use, disclosure, security, and individual access.
LGPD, enacted in 2020, is Brazil's comprehensive privacy legislation. It establishes principles, rights, and obligations for the processing of personal data. Similar to GDPR, LGPD applies to any organization processing the data of individuals located in Brazil, regardless of the organization's location.
China's PIPL, effective from November 2021, is a comprehensive data protection law that governs the collection, use, processing, and storage of personal information. It emphasizes consent, data minimization, and cross-border data transfer restrictions, among other provisions.
PDPB, currently a draft bill, aims to regulate the processing of personal data in India. It proposes principles such as purpose and storage limitation, data localization, and individual rights like access and correction.
These are just a few examples of PII laws and regulations worldwide. As data privacy concerns continue to grow, we see more countries adopting privacy laws to protect the rights of individuals'.
Both personal data and PII share the common goal of ensuring the protection and privacy of individuals' information. That said, while the concepts of personal data and PII overlap, they differ legislatively.
Personal data is a broader category, one that encompasses all information relating to an identified or identifiable individual. The European Union and other jurisdictions outside the United States often use the term personal data. The GDPR is a prime example of legislation that provides a comprehensive framework for protecting personal data, aligning data protection rules across EU member states.
Again, personal data legislation covers a wide range of data types — identifiers, contact information, demographic data, preferences, and online behavior. Personal data can be either directly identifying or indirectly identifiable when combined with other data points.
PII is a subset of personal data that focuses on information that can be used to directly or indirectly identify a specific individual. In the United States, privacy laws and data protection regulations commonly use the term PII. Different states and sectors have varying definitions of PII, and the scope of protection may differ depending on the context and specific regulations. Examples of U.S. legislation addressing PII include HIPAA and the CCPA.
To clearly distinguish these two terms, think of personal data as information “related to” identifiable individuals. When we say personal data covers a range of information "related to" identifiable individuals, we emphasize that personal data encompasses any information associated with an identified or identifiable person. This concept signifies a broad scope of data types that could be connected to an individual in some way, including seemingly anonymous data points (i.e., a product preference) that, when combined with other data points, become indirectly identifiable information.
PII, on the other hand, "focuses on" data with a more explicit connection to an individual's identity. It has a narrower scope, concentrating on data that can pinpoint or trace back to a particular person, either directly or indirectly.
Legislations taking a non-prescriptive, principles-based approach to data protection — as the GDPR does — give rise to the term personal data. Information that wouldn’t necessarily qualify as PII under HIPAA, for example, may qualify as personal data within the scope of the GDPR.
PHI is a specific type of PII that relates to an individual's physical or mental health, healthcare services, or payment for healthcare services. PHI includes medical records, test results, insurance information, and billing data.
In the United States, PHI is protected under HIPAA, which governs the collection, use, and disclosure of PHI by covered entities (healthcare providers, health plans, and healthcare clearinghouses) and their business associates. Infractions of HIPAA regulations are severe, as required to protect information of a sensitive nature and prevent the fallout of harm from unauthorized access or disclosure of PHI.
Observing PII security best practices help organizations to protect sensitive data, maintain trust with their customers, and comply with privacy regulations worldwide.
Collect and store only the necessary PII for a specific purpose. Limiting the amount of data held reduces the risk of unauthorized access or misuse.
Implement role-based access controls (RBAC) to limit employees' access to PII based on their job responsibilities. Use strong authentication methods, such as multifactor authentication (MFA), to ensure only authorized personnel can access sensitive data.
Use encryption, both at rest and in transit, to protect PII from unauthorized access. Employ strong encryption algorithms and manage encryption keys securely.
Categorize PII based on sensitivity levels and apply appropriate security controls accordingly. Data classification helps prioritize the protection of critical data and maintain regulatory compliance.
Establish a data retention policy that defines how long PII is stored and when it should be deleted or anonymized. Securely dispose of PII when it's no longer needed, using methods like secure deletion or physical destruction.
Conduct periodic audits and risk assessments to identify potential vulnerabilities and ensure compliance with privacy regulations. Implement continuous monitoring to detect and respond to security incidents promptly.
Provide regular training to employees on data protection, privacy regulations, and cybersecurity. Educate them on the importance of PII security and their role in safeguarding sensitive information.
Develop a robust incident response plan that outlines the steps to take in case of a data breach or security incident. This plan should include communication protocols, identification and containment procedures, and recovery strategies.
Assess and monitor third-party vendors that handle PII to ensure they follow security best practices and comply with relevant regulations. Establish contractual agreements that outline data protection responsibilities.
Integrate privacy considerations into the development lifecycle of products, services, and applications. This approach helps proactively address potential privacy risks and ensures that PII protection is a core component of the design process.
Three types of personal information include:
Identifying refers to the process or act of recognizing and distinguishing a specific individual or entity based on unique characteristics or attributes. In the context of data, identifying information directly points to an individual, such as a name, social security number, or passport number.
Identifiable refers to the potential for data to be associated with a specific individual, either directly or indirectly. Identifiable data may not immediately reveal an individual's identity, but when combined with other information, it can be used to pinpoint the person. Examples of identifiable data include IP addresses, device identifiers, and geolocation data. The distinction between identifying and identifiable is crucial in data protection and privacy, as it influences how organizations handle, process, and secure personal information.
Access control models are frameworks that define how permissions are granted and managed within a system, determining who can access specific resources. They guide the development and implementation of access control policies. Common models include: