PII – Personally Identifiable Information

Personally identifiable information (PII) is any information or data that can be used to discover or distinguish an individual’s identity and specific details about the individual. While definitions for PII vary slightly, the National Institute of Standards and Technology (NIST) specifically defines personally identifiable information as:

“Any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother’s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.”

Protecting Personally Identifiable Information

Also referred to as personal identifiable information, PII has become increasingly relevant in recent years as privacy laws and regulations have become more stringent for enterprises. As a result, IT departments are tasked with assessing and addressing the specific risks that an individual can be identified when corporate information is made publicly available, including when that information might be combined with other available information that could be used to identify an individual.

Compromised personal identifiable information carries the possibility of causing substantial harm to individuals in the form of identity theft or other fraudulent use of their personal information, and enterprises are now required to take all necessary measures to safeguard this sensitive information to protect their customers and employees and prevent being liable for compromised PII.

Examples of Personally Identifiable Information

Examples of details that fall under the umbrella of personally identifiable information include the individual’s full name, e-mail address, home address, telephone number, social security number, date of birth and birthplace, passport number, IP address in certain cases), driver’s license number, credit card numbers, mother’s maiden name, login credentials and more.

 

 

 

 

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...