Personal Identity Information or Personally Identifiable Information (PII) is information that permits the identity of an individual to be directly or indirectly inferred. An example of PII would be a person’s full name combined with a Social Security Number, passport number, or email address. Personally Identifiable Information is often found on public websites including your Full Name combined with your zip code, race, gender, address, and date of birth.
Pro Tip: CyberHoot suggests answering challenge questions, used by websites to help you recover access to an online account, with made-up answers. Just be sure to save the bogus answer in your password manager. It's too easy for hackers to find our true PII on various public websites and break back into our online accounts if we tell the truth on PII Q&A.
Multiple data protection laws such as the General Data Protection Regular (GDPR) and the California Consumer Protection Act (CCPA) have been adopted by various countries and US states to create guidelines for companies who gather, store, process, and sell the PII of their clients. The basic principles outlined by these laws provide restrictions and rights to consumers for managing and controlling access to their own sensitive information (PII). Most of these privacy laws allow users to ask the following questions or make these demands of companies:
And many more rights beyond these few above. For details see CyberHoot’s CCPA and GDPR cybrary pages.
Legislation is in place throughout most of the world, so businesses should focus on examining their local country’s (or state’s) data privacy rights. Once you understand your legal obligations in your own home country or state, you’ll want to develop each of the following:
It’s very important to have a plan to notify any users and applicable agencies involved in a data breach. The time to work out how to notify and what the applicable home country laws and requirements are is not during a breach but before one. In the US exists a patchwork quilt of data privacy laws by individual states. There is no federal law in effect. In preparing your breach notification process, make sure you seek outside counsel and expertise to help you comply with each state you may have data on (or country as the case may be).
CyberHoot recommends you know the laws affecting your company and you prepare a Breach Notification process document reflecting those laws. Don’t forget to test the process annually as well.
Companies that collect, process, and store PII on consumers should call that out in an online privacy policy. CyberHoot provides a template for adoption to all subscribers to our product. This outlines establishing a Data Protection Officer email address for data privacy inquiries by consumers and an authentication process to validate the legitimacy of the request.
Let’s say your company is a hotel. You receive a request email to DPO@HotelName.com for all the dates you stayed at that hotel from John Doe during the past year. The email states this is a GDPR request and you have every right to the answer. It came from JaneDoe@Emailprovider.com. Should you respond? No. Jane Doe has no right to John Doe’s information under GDPR or CCPA or any other legislation. Your authentication process must engage via a unique identifier which is typically the email address owned by the person making the request. Under privacy legislation, you are required to verify the identity of the privacy requestor before providing any PII Data back.
SMB PROTECTIONS BEYOND Data Privacy Regulations
CyberHoot recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:
Source: NCSD Glossary, CNSSI 4009, GAO Report 08-356, as cited in NIST SP 800-63 Rev 1, Investopedia
CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like:
Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’. Sign up for the monthly newsletter to help CyberHoot with its mission of making the world ‘More Aware and More Secure!’
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.