SlideShare a Scribd company logo
1 of 2
Download to read offline
Protecting PII
 Ensure that all personal data is
properly marked “OFFICIAL USE
ONLY” or “PRIVACY ACT DATA”.
 Immediately report any loss or
suspected loss to Cyber Security.
 Lock up PII records, notes, or
materials that may contain
personal data.
 Log off or turn off your computer
whenever you leave your desk
 Determine the need-to-know prior
to disclosing PII.
 Always encrypt (Entrust) personal
data sent by e-mail.
 Destroy by approved methods
(shredder) when personal data is
not required to be retained.
 Be conscious of your surroundings
when discussing PII

Privacy Act
The Privacy Act of 1974 (5 U.S.C. 552a)
establishes controls over what personal
information is collected and maintained
by the Executive Branch and how the
information is used.
“All DOE employees and contractors are
subject to the Privacy Act and must comply
with its provisions. Non-compliance with the
Privacy Act carries criminal and civil
penalties.”

WEMS Security presents…

It’s personal and private
The information
that we are
protecting is
personal and
should be
considered
private. The
loss of PII can
lead to
identity theft or result in adverse
actions being taken against the
employee who loses PII and
ultimately erode confidence in
the Government’s ability to
protect personal information.
Avoid unauthorized disclosures
and report any confirmed or
suspected breaches or misuse
of PII immediately to Cyber
Security at 740-897-3338 or
740-897-3853.

If you have any questions concerning
PII contact WEMS Security at

740-897-3853 or 740-897-2604

Protecting
Personally
Identifiable
Information
What is PII?
DOE Order 206.1, Department of Energy
Privacy Program, defines PII as any
information collected or maintained by the
Department about an individual, including
but not limited to, education, financial
transactions, medical history and criminal
or employment history, and information that
can be used to distinguish or trace an
individual’s identity, such as his/her name,
Social Security number, date and place of
birth, mother’s maiden name, biometric
data, and including any other personal
information that is linked or linkable to a
specific individual.

Penalties for Violating the
Privacy Act
 A misdemeanor criminal charge
◦ $5000 for each offense
 Courts may also award civil
penalties
 Loss of employment

DOE Working Examples of PII (what is and what isn’t PII)
WHAT IS PII:
1. Social Security Numbers in any form are PII (includes using just the last four digits)
2. Place of birth associated to an individual
3. Date of birth associated with an individual
4. Mother's maiden name associated with an individual
5. Biometric record associated with an individual
a. Fingerprint
b. Iris scan
c. DNA
6. Medical history information associated with an individual
a. Medical conditions, including history of disease
b. Metric information, e.g., weight, height, blood pressure
7. Criminal history associated with an individual
8. Employment history and other employment information associated with an individual
a. Ratings
b. Disciplinary actions
c. Performance elements and standards (or work expectations) when they are so intertwined with
performance appraisals that their disclosure would reveal an individual's performance appraisal
9. Financial information associated with an individual
a. Credit card numbers
b. Bank account numbers
10. Security clearance history or related info (not including actual clearances held)
WHAT ISN'T PII:
1. Phone numbers (work, home, cell)
2. Street addresses (work and personal)
3. Email addresses (work or personal)
4. Digital pictures
5. Birthday cards or birthday emails
7. Medical information pertaining to work status (X is out sick today)
8. Employment information that is not PII even when associated with a name
a. Resumes, unless it includes SSN
b. Present and past position titles and occupational series
c. Present and past grades
d. Present and past annual salary rates (including performance awards or bonuses, incentive awards,
merit pay amount, Meritorious or Distinguished Executive Ranks, and allowances and differentials)
e. Present and past duty stations and organization of assignment (includes room and phone numbers,
shop designations, work e-mail address, or other identifying information regarding buildings or places

More Related Content

Viewers also liked

MDGs and Health in post 2015 Development Agenda
MDGs and Health in post 2015 Development AgendaMDGs and Health in post 2015 Development Agenda
MDGs and Health in post 2015 Development AgendaUsman Mushtaq
 
はてなブログにトラックバックLT
はてなブログにトラックバックLTはてなブログにトラックバックLT
はてなブログにトラックバックLTbulldra
 
Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?
Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?
Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?iMedia Connection
 

Viewers also liked (7)

MDGs and Health in post 2015 Development Agenda
MDGs and Health in post 2015 Development AgendaMDGs and Health in post 2015 Development Agenda
MDGs and Health in post 2015 Development Agenda
 
19
1919
19
 
はてなブログにトラックバックLT
はてなブログにトラックバックLTはてなブログにトラックバックLT
はてなブログにトラックバックLT
 
Начало работы
Начало работыНачало работы
Начало работы
 
Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?
Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?
Halt & Catch Fire: Is PII No Longer the Third-Rail of Digital Privacy?
 
PUBLIC RECORDS ON THE INTERNET
PUBLIC RECORDS ON THE INTERNETPUBLIC RECORDS ON THE INTERNET
PUBLIC RECORDS ON THE INTERNET
 
Small Business Tip Card
Small Business Tip CardSmall Business Tip Card
Small Business Tip Card
 

Similar to Protecting PII

20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdfSarahLopezMirasol
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copySandra (Sandy) Dunn
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoMegan Bell
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
ID Shield Services and Features
ID Shield Services and Features ID Shield Services and Features
ID Shield Services and Features Antonia McClammy
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policyCoi Xay
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationCatherine MacAllister
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Steve Werby
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseIpro Tech
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and FeaturesAntonio Muniz Olan
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 

Similar to Protecting PII (20)

20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
ID Shield Services and Features
ID Shield Services and Features ID Shield Services and Features
ID Shield Services and Features
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive Information
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident Response
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and Features
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
HIPAA Overview
HIPAA OverviewHIPAA Overview
HIPAA Overview
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Protecting PII

  • 1. Protecting PII  Ensure that all personal data is properly marked “OFFICIAL USE ONLY” or “PRIVACY ACT DATA”.  Immediately report any loss or suspected loss to Cyber Security.  Lock up PII records, notes, or materials that may contain personal data.  Log off or turn off your computer whenever you leave your desk  Determine the need-to-know prior to disclosing PII.  Always encrypt (Entrust) personal data sent by e-mail.  Destroy by approved methods (shredder) when personal data is not required to be retained.  Be conscious of your surroundings when discussing PII Privacy Act The Privacy Act of 1974 (5 U.S.C. 552a) establishes controls over what personal information is collected and maintained by the Executive Branch and how the information is used. “All DOE employees and contractors are subject to the Privacy Act and must comply with its provisions. Non-compliance with the Privacy Act carries criminal and civil penalties.” WEMS Security presents… It’s personal and private The information that we are protecting is personal and should be considered private. The loss of PII can lead to identity theft or result in adverse actions being taken against the employee who loses PII and ultimately erode confidence in the Government’s ability to protect personal information. Avoid unauthorized disclosures and report any confirmed or suspected breaches or misuse of PII immediately to Cyber Security at 740-897-3338 or 740-897-3853. If you have any questions concerning PII contact WEMS Security at 740-897-3853 or 740-897-2604 Protecting Personally Identifiable Information
  • 2. What is PII? DOE Order 206.1, Department of Energy Privacy Program, defines PII as any information collected or maintained by the Department about an individual, including but not limited to, education, financial transactions, medical history and criminal or employment history, and information that can be used to distinguish or trace an individual’s identity, such as his/her name, Social Security number, date and place of birth, mother’s maiden name, biometric data, and including any other personal information that is linked or linkable to a specific individual. Penalties for Violating the Privacy Act  A misdemeanor criminal charge ◦ $5000 for each offense  Courts may also award civil penalties  Loss of employment DOE Working Examples of PII (what is and what isn’t PII) WHAT IS PII: 1. Social Security Numbers in any form are PII (includes using just the last four digits) 2. Place of birth associated to an individual 3. Date of birth associated with an individual 4. Mother's maiden name associated with an individual 5. Biometric record associated with an individual a. Fingerprint b. Iris scan c. DNA 6. Medical history information associated with an individual a. Medical conditions, including history of disease b. Metric information, e.g., weight, height, blood pressure 7. Criminal history associated with an individual 8. Employment history and other employment information associated with an individual a. Ratings b. Disciplinary actions c. Performance elements and standards (or work expectations) when they are so intertwined with performance appraisals that their disclosure would reveal an individual's performance appraisal 9. Financial information associated with an individual a. Credit card numbers b. Bank account numbers 10. Security clearance history or related info (not including actual clearances held) WHAT ISN'T PII: 1. Phone numbers (work, home, cell) 2. Street addresses (work and personal) 3. Email addresses (work or personal) 4. Digital pictures 5. Birthday cards or birthday emails 7. Medical information pertaining to work status (X is out sick today) 8. Employment information that is not PII even when associated with a name a. Resumes, unless it includes SSN b. Present and past position titles and occupational series c. Present and past grades d. Present and past annual salary rates (including performance awards or bonuses, incentive awards, merit pay amount, Meritorious or Distinguished Executive Ranks, and allowances and differentials) e. Present and past duty stations and organization of assignment (includes room and phone numbers, shop designations, work e-mail address, or other identifying information regarding buildings or places