Differences between revisions 7 and 8
Revision 7 as of 2023-03-17 20:38:43
Size: 1277
Comment:
Revision 8 as of 2023-03-17 20:46:33
Size: 1601
Comment:
Deletions are marked like this. Additions are marked like this.
Line 33: Line 33:
If a PII leak is discovered to have (potentially or actually) occurred, organizations must issue a report...

 * to the United States Computer Emergency Readiness Team (US-CERT) in 1 hour
 * to Component Privacy Office in 24 hours
 * and to the Defense Privacy, Civil Liberties, and Transparency Division in 48 hours

Personally Identifiable Information


Definition

Any information that can be used to distringuish or trace an identity, whether alone or when used in connection with other information.

PHI is a subclass of PII with additional requirements and considerations.


Federal Regulations

The Privacy Act of 1974 established requirements for the federal government's use of PII.

The Federal Information Security Management Act of 2002 (FISMA) identifies security controls on the use of PII. The Office of Management and Budget (OMB) has produced guides and memoranda to further specify the requirements of these acts.


Department of Defense Privacy Program

DoD 5400.11-R defines the Privacy Program which controls the use of PII within the U.S. Department of Defense.

If a PII leak is discovered to have (potentially or actually) occurred, organizations must issue a report...

  • to the United States Computer Emergency Readiness Team (US-CERT) in 1 hour
  • to Component Privacy Office in 24 hours
  • and to the Defense Privacy, Civil Liberties, and Transparency Division in 48 hours


Freedom of Information Act

The Freedom of Information Act defines PII-based restrictions on freedom of information requests.


CategoryRicottone

UnitedStates/InformationLaw/PersonallyIdentifiableInformation (last edited 2025-02-06 21:07:55 by DominicRicottone)