PII – Personally Identifiable Information

Personally identifiable information (PII) is any information or data that can be used to discover or distinguish an individual’s identity and specific details about the individual. While definitions for PII vary slightly, the National Institute of Standards and Technology (NIST) specifically defines personally identifiable information as:

“Any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother’s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.”

Protecting Personally Identifiable Information

Also referred to as personal identifiable information, PII has become increasingly relevant in recent years as privacy laws and regulations have become more stringent for enterprises. As a result, IT departments are tasked with assessing and addressing the specific risks that an individual can be identified when corporate information is made publicly available, including when that information might be combined with other available information that could be used to identify an individual.

Compromised personal identifiable information carries the possibility of causing substantial harm to individuals in the form of identity theft or other fraudulent use of their personal information, and enterprises are now required to take all necessary measures to safeguard this sensitive information to protect their customers and employees and prevent being liable for compromised PII.

Examples of Personally Identifiable Information

Examples of details that fall under the umbrella of personally identifiable information include the individual’s full name, e-mail address, home address, telephone number, social security number, date of birth and birthplace, passport number, IP address in certain cases), driver’s license number, credit card numbers, mother’s maiden name, login credentials and more.

 

 

 

 

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Related Articles

Software Environment

A software environment is a collection of programs, libraries, and utilities that allow users to perform specific tasks. Software environments are often used by...

ClickUp

ClickUp is a cloud-based work and project management platform that enables teams to manage tasks, collaborate in real-time, gain insights via reporting, and more....

Chunk (Data Chunk)

A chunk, also called a data chunk, by RFC2960 SCTP (Stream Control Transmission Protocol) standards, is the term used to describe a unit of...

Blog Search Engine

A blog search engine is specifically focused on finding content in the blogosphere. Blog search engines only index and provide search results from blogs...

Agile Project Management

Agile project management enables business teams to approach their projects and tasks with...

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes...

Rich Communication Services (RCS)

Rich communication services (RCS) is a mobile messaging approach in which session initiation...