All
All

Guide to Protecting the Confidentiality of PII

395 KB | 3 files | null DOC,null PDF

Security breaches that lead to exposure of personally identifiable information (PII) are embarrassing and costly to your enterprise. This guide will help establish a risk-based approach to protecting private information.

Breaches of personally identifiable information (PII) have increased dramatically over the past few years and have resulted in the loss of millions of records. Breaches of PII are hazardous to both individuals and organizations. Individual harms may include identity theft, embarrassment, or blackmail. Organizational harms may include a loss of public trust, legal liability, or high costs to handle the breach. To appropriately protect the confidentiality of PII, organizations should use a risk-based approach. This document provides guidelines for a risk-based approach to protecting the confidentiality of PII.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Guide to Protecting the Confidentiality of PII.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. ...  More >>

Money3 PCI Compliance: The Definitive Guide

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise. ...  More >>

Cryptographic Key Management Issues & Challenges in Cloud Services

The management of cryptographic keys is a critical and challenging security management function, especially in the case of a cloud environment. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.