logo

Personal Identifiable Information Strategy

   

Added on  2020-05-11

7 Pages1822 Words206 Views
Running head: PERSONAL IDENTIFIABLE INFORMATION STRATEGYPersonal Identifiable Information StrategyName of StudentName of University

1PERSONAL IDENTIFIABLE INFORMATION STRATEGY4. Governance of PII and digital identities for users of the portalPersonally identifiable information or PII is susceptible to several threats and risks. The cybercriminals and hackers mainly target thesensitive information that is present in the cloud storage of the organization. They can misuse the data. The data might also be lost because oftheir wrong activities. PII can be lost also because of lost hard drives, equipment as good documents along with cyber attacks. If PII is stolen orlost then it can cause financial loss and also harm the reputation of the organization. A data breach can harm the organization in several ways.Therefore, it can be said that it is essential to develop strong governance policies in the organization for protecting the personally identifiableinformation of the users. The governance of PII is a complex process and must be well planned and implemented. PII governance forms anessential and integral part of managing PII as well as digital identities. This also helps in social progress as well as economic development. PIIfoundation forms the basis for a secure organization as well as a cloud platform. The digital identity of the organization can be made effective byimplementing strong governance policy for protecting the PII. Initially, the PII dealt with the telephone numbers of the people. With the growthof technology, people are able to access and process data at a faster speed. This has also led to the increase in loss of data and therefore thepersonally identifiable information is subjected to various risks and threats. The data loss can be divided into two categories called intentionaland unintentional data loss. Accidental loss of data is not much harmful because there are no malicious intentions behind such loss. The data losscan be caused due to the carelessness of the employees and some kind of errors that are made by the employees. These employees do not haveany wrong intention to harm the organization. Lack of strong security policies can also cause accidental loss of data. The other type of threat isthe deliberate threat that can harm the organization in a severe manner. The exposure of this risk is high because there are malicious intentions

2PERSONAL IDENTIFIABLE INFORMATION STRATEGYbehind such attacks. These attacks can be either external or internal. PII can contain sensitive information like name, address, phone numbersand financial details of the user. It can also contain health-related information and payroll information of the employees of the organization.Preventive measures must be taken in order to protect these valuable data from any types of attacks. There can be malware attacks like virusattacks, worms, phishing attacks and Trojan horse attacks as well. Spyware can enter the system and quietly steal data from the system. Datamust be protected in a proper manner in order to protect the reputation of the company as well as the sensitive data of the users. Therefore, aproper strategy must be implemented for the governance of PII and for protecting the digital identity of users of My License portal. Thegovernance plan is discussed below.4.1. PII and digital identities for the users of My license Portal 1. The users need to have proper knowledge regarding storage of the data. They must be aware of all the various types of security threats andrisks that can harm the sensitive information. Proper knowledge about the importance of security measures forms the basic step for forming thegovernance plan of PII. Proper track of the data record of the users is important. Proper access control strategies must be developed that willallow specific users to access specific information. Access control can be considered to be a key feature for protecting the PII. Every user willnot be able to access all the available users. This access control mechanism will allow protecting the information from any unauthorized accessof data. Unauthorized access can harm the integrity as well as confidentiality of the information. Implementing strong access control policieswill help to protect PII of the users in an effective manner.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Personal Identifiable Information Assignment
|26
|5634
|103

Assignment of Cloud Privacy and Security
|13
|3394
|89

Cloud Privacy and Security
|18
|3664
|384

Threat and Risk Assessment for PII ( Personal Identifiable Information )
|20
|6165
|318

Online Privacy: Protecting Your Personal Data and Security
|8
|2203
|260

Assignment On ICT Risks & Security Concerns
|13
|3436
|93