CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program. Think protection. The information they are after will change depending on what they are trying to do with it. 0000003346 00000 n This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual's responsibilities for safeguarding PII. This is a potential security issue, you are being redirected to https://csrc.nist.gov. In addition to the forgoing, if contract employees become aware of a theft or loss of PII, they are required to immediately inform their DOL contract manager. Lewis's Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas . With these responsibilities contractors should ensure that their employees: Contractors should ensure their contract employees are aware of their responsibilities regarding the protection of PII at the Department of Labor. Because DOL employees and contractors may have access to personal identifiable information concerning individuals and other sensitive data, we have a special responsibility to protect that information from loss and misuse. Major legal, federal, and DoD requirements for protecting PII are presented. PII must only be accessible to those with an official need to know.. .h1 {font-family:'Merriweather';font-weight:700;} 0 203 0 obj <>stream Local Download, Supplemental Material: Minimize the use, display or storage of Social Security Numbers (SSN) and all other PII. The purpose of this lesson is to review the completed course work while reflecting on the role of HR Practitioners in CES organizations. PII is a person's name, in combination with any of the following information: Mother's maiden name Driver's license number Bank account information Credit card information Relatives' names Postal address Sensitive PII is information that can be utilized to identify an individual and that could potentially be used to harm them if it fell into the wrong hands. Popular books. 0000001199 00000 n #block-googletagmanagerfooter .field { padding-bottom:0 !important; } Which of the following must Privacy Impact Assessments (PIAs) do? We're available through e-mail, live chat and Facebook. The following are some examples of information that can be considered PII: Several merchants, financial institutions, health organizations, and federal agencies, such as the Department of Homeland Security (DHS), have undergone data breaches that put individuals PII at risk, leaving them potentially vulnerable to identity theft. Result in disciplinary actions. The Privacy Act of 1974 is a federal law that establishes rules for the collection, use, and disclosure of PII by federal agencies. Think privacy. Federal government websites often end in .gov or .mil. The Department of Energy defines PII as any information collected or maintained by the department about an individual that could be used to distinguish or trace their identity. /*-->*/. PII should be protected from inappropriate access, use, and disclosure. Captain Padlock: Personally Identifiable Information (PII) isinformation used to distinguish or trace an individual's identity, such as name, social security number, mother's maiden name, and biometric records. This information can include a persons name, Social Security number, date and place of birth, biometric data, and other personal information that is linked or linkable to a specific individual. .dol-alert-status-error .alert-status-container {display:inline;font-size:1.4em;color:#e31c3d;} Dont Be Phished! The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student educational records. Think OPSEC! PII stands for personally identifiable information. #block-googletagmanagerheader .field { padding-bottom:0 !important; } %%EOF %%EOF Contract employees also shall avoid office gossip and should not permit any unauthorized viewing of records contained in a DOL system of records. This factsheet is intended to help you safeguard Personally Identifiable Information (PII) in paper and electronic form during your everyday work activities. 0000001061 00000 n Any organization that processes, stores, or transmits cardholder data must comply with these standards. Companies are required to provide individuals with information about their rights under the GDPR and ensure that individuals can easily exercise those rights. Unlock insights, bypass email authentication configuration issues including SPF and DKIM; and protect your domain from spoofing with strict DMARC enforcement, all autonomously with Skysnag. This site requires JavaScript to be enabled for complete site functionality. planning; privacy; risk assessment, Laws and Regulations 173 0 obj <>/Filter/FlateDecode/ID[<433858351E47FF448B53C1DCD49F0027><3128055A8AFF174599AFCC752B15DF22>]/Index[136 68]/Info 135 0 R/Length 157/Prev 228629/Root 137 0 R/Size 204/Type/XRef/W[1 3 1]>>stream As a Government employee you can personally suffer criminal or civil charges and penalties for failure to protect PII. Only individuals who have a "need to know" in their official capacity shall have access to such systems of records. Any information that can be used to determine one individual from another can be considered PII. Identify the responsibilities for safeguarding PII and PHI on both the organizational and individual levels Identify use and disclosure of PII and PHI State the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection Delivery Method: eLearning Length: 1 hour Share sensitive information only on official, secure websites. IDENTIFYING & SAFEGUARDING PII Which of the following are risk associated with the misuse or improper disclosure of PII? <]/Prev 236104>> PII/PHI Personally Identifiable Information (PII) is information that can be used to distinguish or trace an individual's identity, either alone or when combined with other information that is linked or linkable to a specific individual. These attacks show how cybercriminals can use stolen PII to carry out additional attacks on organizations. Terms of Use Access Control; Audit and Accountability; Identification and Authentication; Media Protection; Planning; Risk Assessment; System and Communications Protection, Publication: Safeguarding refers to protecting PII from loss, theft, or misuse while simultaneously supporting the agency mission. The Federal government requires the collection and maintenance of PII so as to govern efficiently. Everything's an Argument with 2016 MLA Update University Andrea A Lunsford, University John J Ruszkiewicz. Ensure that the information entrusted to you in the course of your work is secure and protected. PII must only be accessible to those with an "official need to know.". Damage to victims can affect their good name, credit, job opportunities, possibly result in criminal charges and arrest, as well as cause embarrassment and emotional stress. The launch training button will redirect you to JKO to take the course. In terms of the protection of PHI, HIPAA and the related Health Information Technology for Economic and Clinical Health Act (HITECH) offer guidelines for the protection of PHI. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) Personally Identifiable Information (PII), Privacy Act System of Records Notice (SORN), Post Traumatic Stress Disorder (PTSD) Research, Office of the Administrative Assistant to the Secretary of the Army, Department of Defense Freedom of Information Act Handbook, AR 25-55 Freedom of Information Act Program, Federal Register, 32 CFR Part 518, The Freedom of Information Act Program; Final Rule, FOIA/PA Requester Service Centers and Public Liaison Officer. 0000003055 00000 n System Requirements:Checkif your system is configured appropriately to use STEPP. 0000002651 00000 n Ensure that the information entrusted to you in the course of your work is secure and protected. DHS employees, contractors, consultants, and detailees are required by law to properly collect, access, use, share, and dispose of PII in order to protect the privacy of individuals. xref Company Registration Number: 61965243 PII, or personally identifiable information, is any piece of data that someone could use to figure out who you are. , b@ZU"\:h`a`w@nWl Identity thieves are always looking for new ways to gain access to peoples personal information. The site is secure. In this module, you will learn about best practices for safeguarding personally identifiable information . Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. Retake Identifying and Safeguarding Personally Identifiable Information (PII). Skysnags automated software safeguards your domains reputation and keeps your business away from compromised business emails, password theft, and potentially significant financial losses. PII can also include demographic, medical, and financial information, or any other information linked or linkable to a specific . An official website of the United States government. Which of the following are risk associated with the misuse or improper disclosure of PII? We're available through e-mail, live chat and Facebook. The act requires that covered entities take reasonable steps to safeguard the confidentiality of protected health information and limits the disclosure of protected health information without consent. Erode confidence in the governments ability to protect information. Once you have a set of PII, not only can you sell it on the dark web, but you can also use it to carry out other attacks. Washington, DC 202101-866-4-USA-DOL1-866-487-2365www.dol.gov, Industry-Recognized Apprenticeship Programs (IRAP), Bureau of International Labor Affairs (ILAB), Employee Benefits Security Administration (EBSA), Employees' Compensation Appeals Board (ECAB), Employment and Training Administration (ETA), Mine Safety and Health Administration (MSHA), Occupational Safety and Health Administration (OSHA), Office of Administrative Law Judges (OALJ), Office of Congressional and Intergovernmental Affairs (OCIA), Office of Disability Employment Policy (ODEP), Office of Federal Contract Compliance Programs (OFCCP), Office of Labor-Management Standards (OLMS), Office of the Assistant Secretary for Administration and Management (OASAM), Office of the Assistant Secretary for Policy (OASP), Office of the Chief Financial Officer (OCFO), Office of Workers' Compensation Programs (OWCP), Ombudsman for the Energy Employees Occupational Illness Compensation Program (EEOMBD), Pension Benefit Guaranty Corporation (PBGC), Veterans' Employment and Training Service (VETS), Economic Data from the Department of Labor, Guidance on the Protection of Personal Identifiable Information. startxref Identifying and Safeguarding Personally Identifiable Information (PII) This training starts with an overview of Personally Identifiable Information (PII), and protected health information (PHI), a significant subset of PII, and the significance of each, as well as the laws and policy that govern the maintenance and protection of PII and PHI. A .gov website belongs to an official government organization in the United States. Center for Development of Security Excellence, Defense Counterintelligence and Security Agency, Identifying and Safeguarding Personally Identifiable Information (PII) DS-IF101.06, My Certificates/Digital Badges/Transcripts, My Certificates of Completion for Courses, Controlled Unclassified Information (CUI) Training, Personally Identifiable Information (PII) Training, Hosted by Defense Media Activity - WEB.mil, Define PII and Protected Health Information, or PHI, a significant subset of PII, and the significance of each, as well as the laws and policy that govern the maintenance and protection of PII and PHI, Identify the responsibilities for safeguarding PII and PHI on both the organizational and individual levels, Identify use and disclosure of PII and PHI, State the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection. DOL internal policy specifies the following security policies for the protection of PII and other sensitive data: The loss of PII can result in substantial harm to individuals, including identity theft or other fraudulent use of the information. PII ultimately impacts all organizations, of all sizes and types. In others, they may need a name, address, date of birth, Social Security number, or other information. .cd-main-content p, blockquote {margin-bottom:1em;} 0000001422 00000 n Developed to be used in conjunction with annual DoD cybersecurity awareness training, this course presents the additional cybersecurity responsibilities for DoD information system users with access privileges elevated above those of an authorized user. Knowledge Check, 1 of 3 Knowledge Check; Summary, 2 of 3 Summary; Finished, 3 of 3 Finished; Clear and return to menu . The course is designed to prepare DOD and other Federal employees to recognize the importance of PII, to identify what PII is, and why it is important to protect PII. The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. This Handbook provides best practices and DHS policy requirements to prevent a privacy incident involving PII/SPII during all stages of the information lifecycle: when collecting, storing, using, disseminating, or disposing of PII/SPII. PII is any personal information which is linked or linkable to a specified individual. The course reviews the responsibilities of the Department of Defense (DoD) to safeguard PII, and explains individual responsibilities. law requires gov to safeguard pii privacy act senior military component offical for privacy DON CIO info stored on a computer data at rest scenario considered a breach -leaving document with pii in open area -attaching someone's medical info in a letter to the wrong recipient -posting truncated ssn in a public website 0000000516 00000 n The course is designed to prepare DOD and other Federal employees to recognize the importance of PII, to identify what PII is, and why it is important to protect PII. .paragraph--type--html-table .ts-cell-content {max-width: 100%;} For example, they may need different information to open a bank account then they would file a fraudulent insurance claim. This includes companies based in the U.S. that process the data of E.U. [CDATA[/* >