Consumers no longer have to go to a store to make purchases, buy groceries, nor go to the Motor Vehicle Administration to renew their tags. Technology has made it so that you can complete these transactions with a click of a mouse. However, it is also increasingly easy to steal someone’s information. The personal information each site collects can be sold and used by third party organizations. This personal information which is respectively called Personally Identifiable Information (PII) is, “any uniquely identifying information that can be used to contact or locate a person, or can be used in conjunction with other sources to identify a single individual.”
Examples of Personally Identifiable Information
• Full name
• Phone number
• Social security number
• Driver’s license number
• Mother’s maiden name
• Date of birth
• ...view middle of the document...
Most websites have privacy policies; however the interpretation level and diversity of the policy varied widely.
“Unauthorized access, use, or disclosure of PII can seriously harm individuals by contributing to identity theft, blackmail, or embarrassment.” Treatment of PII is very distinct from other data because not only does it need to be protected. It also needs to be collected, maintained and disseminated according to Federal Law guidelines. The overseers of PII need to have and maintain certain parameters in place to better protect individual’s information.
Brueggeman, D. T. (2010). How Understanding Impacts Ethics and Privacy. In The Refractive Thinker (pp. 81-102). Press.
Hann, I.-H. H.-L.-Y. (2007). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach . Journal of Management Information Systems, 13-42.
McCallister, E. G. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Gaithersburg: National Institute of Standards & Technology Special Publication.
Narayanan, A. S. (2010). Privacy and Security: Myths and Fallacies of "Personally Identifiable Information" . Stanford: Association of Computing Machinery.
Williams, B. K. (2011). Using Information Technology: A Practical Introduction to Computes & Communication (9th ed.). Boston: McGraw-Hill Companies.