This lesson is to prepare HR Professionals to guide supervisors and employees covered under CES for transition to the new personnel system with an overview of compensation elements of the CES occupational structure. Some examples you may be familiar with: Personally Identifiable Information (PII) Sensitive Personally Identifiable Information (SPII) %%EOF They may also use it to commit fraud or other crimes. Which of the following must Privacy Impact Assessments (PIAs) do? We're available through e-mail, live chat and Facebook. 147 0 obj <> endobj Avoid compromise and tracking of sensitive locations. Damage to victims can affect their good name, credit, job opportunities, possibly result in criminal charges and arrest, as well as cause embarrassment and emotional stress. Retake Identifying and Safeguarding Personally Identifiable Information (PII). PII can include anything from a persons name and address to their biometric data, medical history, or financial transactions. Federal Information Security Modernization Act; OMB Circular A-130, Want updates about CSRC and our publications? PCI-DSS is a set of security standards created to protect cardholder data. The Freedom of Information Act (FOIA) is a federal law that gives individuals the right to access certain government records. Documentation Personally Identifiable Information (PII), Privacy Act System of Records Notice (SORN), Post Traumatic Stress Disorder (PTSD) Research, Office of the Administrative Assistant to the Secretary of the Army, Department of Defense Freedom of Information Act Handbook, AR 25-55 Freedom of Information Act Program, Federal Register, 32 CFR Part 518, The Freedom of Information Act Program; Final Rule, FOIA/PA Requester Service Centers and Public Liaison Officer. Think protection. Non-sensitive PII is information that can be used to identify an individual, but that is not likely to be used to harm them if it falls into the wrong hands. 203 0 obj <>stream This interactive training explains various types of social engineering, including phishing, spear phishing, whaling, smishing, and vishing. Or they may use it themselves without the victims knowledge. The launch training button will redirect you to JKO to take the course. Erode confidence in the governments ability to protect information. PII is any personal information which is linked or linkable to a specified individual. PII should be protected from inappropriate access, use, and disclosure. hb```f`` B,@Q\$,jLq `` V PII must only be accessible to those with an "official need to know.". SP 800-122, Guide to Protecting the Confidentiality of PII | CSRC - NIST In others, they may need a name, address, date of birth, Social Security number, or other information. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely. Guidance on the Protection of Personal Identifiable Information Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. The Leaders Orientation is an executive presentation (including a question and answer segment) that has been designed to familiarize DoD Leaders with core tenets of the DoD CES personnel system. Course Launch Page - Cyber Handbook for Safeguarding Sensitive Personally Identifiable Information. .paragraph--type--html-table .ts-cell-content {max-width: 100%;} Minimize the use, display or storage of Social Security Numbers (SSN) and all other PII. 136 0 obj <> endobj The document also suggests safeguards that may offer appropriate levels of protection for PII and provides recommendations for developing response plans for incidents involving PII. PPTX Safeguarding PIITraining Course - United States Army 200 Constitution AveNW PII stands for personally identifiable information. CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Developed to be used in conjunction with annual DoD cybersecurity awareness training, this course presents the additional cybersecurity responsibilities for DoD information system users with access privileges elevated above those of an authorized user. Major legal, federal, and DoD requirements for protecting PII are presented. The purpose of this lesson is to review the completed course work while reflecting on the role of HR Practitioners in CES organizations. It sets out the rules for the collection and processing of personally identifiable information (PII) by individuals, companies, or other organizations operating in the E.U. Unlock insights, bypass email authentication configuration issues including SPF and DKIM; and protect your domain from spoofing with strict DMARC enforcement, all autonomously with Skysnag. PII is a person's name, in combination with any of the following information: Mother's maiden name Driver's license number Bank account information Credit card information Relatives' names Postal address %PDF-1.4 % Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. In the event their DOL contract manager is not available, they are to immediately report the theft or loss to the DOL Computer Security Incident Response Capability (CSIRC) team at dolcsirc@dol.gov. .cd-main-content p, blockquote {margin-bottom:1em;} The document explains the importance of protecting the confidentiality of PII in the context of information security and explains its relationship to privacy using the the Fair Information Practices, which are the principles underlying most privacy laws and privacy best practices. Identifying and Safeguarding PII V4.0 (2022) 4.5 (2 reviews) Which of the following must Privacy Impact Assessments (PIAs) do? Companies are required to provide individuals with information about their rights under the GDPR and ensure that individuals can easily exercise those rights. The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student educational records. This includes companies based in the U.S. that process the data of E.U. It comprises a multitude of information. Any organization that processes, stores, or transmits cardholder data must comply with these standards. .h1 {font-family:'Merriweather';font-weight:700;} The CES DoD Workforce Orientation is a presentation (including a question and answer segment) that has been designed to familiarize the workforce with the core tenets of the DoD CES personnel system. Identifying and Safeguarding PII V4.0 (2022);TEST OUT Qs & Final Test 157 0 obj <>stream Company Registration Number: 61965243 The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. Safeguarding Personally Identifiable Information (PII) - United States Army How to Identify PII Loss, 1 of 2 How to Identify PII . PII is regulated by a number of laws and regulations, including the Gramm-Leach-Bliley Act, the Fair Credit Reporting Act, and the Health Insurance Portability and Accountability Act. The purpose of this course is to identify what Personally Identifiable Information (PII) is and why it is important to protect it. Whether youre supplementing your training in DCWF Orientation or coming back for a refresher, this learning game is designed to test your knowledge of the Defense Cyber Workforce Framework (DCWF). The Department of Energy defines PII as any information collected or maintained by the department about an individual that could be used to distinguish or trace their identity. 0000001061 00000 n .usa-footer .container {max-width:1440px!important;} 2 of 2 Reporting a PII Loss; Conclusion, 7 of 7 Conclusion. The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The Federal government requires the collection and maintenance of PII so as to govern efficiently. To be considered PII, the data must be able to be used to distinguish or trace an individuals identity. When collecting PII, organizations should have a plan in place for how the information will be used, stored, and protected. The following are some examples of information that can be considered PII: Several merchants, financial institutions, health organizations, and federal agencies, such as the Department of Homeland Security (DHS), have undergone data breaches that put individuals PII at risk, leaving them potentially vulnerable to identity theft. Identifying and Safeguarding Personally Identifiable Information (PII Knowledge Check, 1 of 3 Knowledge Check; Summary, 2 of 3 Summary; Finished, 3 of 3 Finished; Clear and return to menu . An official website of the United States government. This information can be maintained in either paper, electronic or other media. A lock () or https:// means you've safely connected to the .gov website. The document explains the importance of protecting the confidentiality of PII in the context of information security and explains its An official website of the United States government, Security Testing, Validation, and Measurement, National Cybersecurity Center of Excellence (NCCoE), National Initiative for Cybersecurity Education (NICE), Federal Information Security Modernization Act. Official websites use .gov The site is secure. Popular books. The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. law requires gov to safeguard pii privacy act senior military component offical for privacy DON CIO info stored on a computer data at rest scenario considered a breach -leaving document with pii in open area -attaching someone's medical info in a letter to the wrong recipient -posting truncated ssn in a public website SP 800-122 (DOI) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. PII can also include demographic, medical, and financial information, or any other information linked or linkable to a specific . The .gov means its official. This is information that can be used to identify an individual, such as their name, address, or Social Security number. `I&`q# ` i . In this module, you will learn about best practices for safeguarding personally identifiable information . The regulation applies to any company that processes the personal data of individuals in the E.U., regardless of whether the company is based inside or outside the E.U. This lesson is to prepare HR Professionals to guide supervisors and employees covered under CES for transition to the new personnel system with an overview of the background and history of the Cyber Excepted Service. @media only screen and (min-width: 0px){.agency-nav-container.nav-is-open {overflow-y: unset!important;}} 0 The Cyber Excepted Service (CES) Orientation is an eLearning course designed to familiarize learners with the core tenets of the DoD CES personnel system. IDENTIFYING & SAFEGUARDING PII Which of the following are risk associated with the misuse or improper disclosure of PII? (Answered) IDENTIFYING & SAFEGUARDING PII Test 2022|2023. COLLECTING PII. Identifying and safeguarding personally identifiable information In addition to the forgoing, if contract employees become aware of a theft or loss of PII, they are required to immediately inform their DOL contract manager. The course is designed to prepare DOD and other Federal employees to recognize the importance of PII, to identify what PII is, and why it is important to protect PII. Thieves can sell this information for a profit. Learning Objectives:This course is designed to enable students to: Target Audience:DOD information system users, including military members and other U.S. Government personnel and contractors within the National Industrial Security Program. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Joint Knowledge Online - jten.mil PHI is a valuable asset and is sold on the dark web for more money than any other data set, according to Ponemon Institute. <]/Prev 236104>> The act requires that federal agencies make their records available to the public unless the records are protected from disclosure by one of the acts exemptions. PII can be used to commit identity theft in several ways. Any information that can be used to determine one individual from another can be considered PII. FM0T3mRIr^wB`6cO}&HN 4$>`X4P\tF2HM|eL^C\RAl0) . Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. 2XXi:F>N #Xl42 s+s4f* l=@j+` tA( Within HIPAA are the privacy rule and the subsets, security rule, enforcement rule, and breach notification rule which all deal with various aspects of the protection of PHI. Handbook for Safeguarding Sensitive Personally Identifiable Information The definition of PII may vary from jurisdiction to jurisdiction but typically includes any information that can be used to identify an individual. Result in disciplinary actions. Secure .gov websites use HTTPS PDF Cyber Awareness Challenge 2022 Information Security Local Download, Supplemental Material: %PDF-1.5 % Captain Padlock: Personally Identifiable Information (PII) isinformation used to distinguish or trace an individual's identity, such as name, social security number, mother's maiden name, and biometric records. The course reviews the responsibilities of the Department of Defense (DoD) to safeguard PII, and explains individual responsibilities. In terms of the protection of PHI, HIPAA and the related Health Information Technology for Economic and Clinical Health Act (HITECH) offer guidelines for the protection of PHI. A full list of the 18 identifiers that make up PHI can be seen here. Share sensitive information only on official, secure websites. PII is information that can be used to identify or contact a person uniquely and reliably or can be traced back to a specific individual. Minimize the use, display or storage of Social Security Numbers (SSN) and all other PII. A .gov website belongs to an official government organization in the United States. The Information Security (INFOSEC) Program establishes policies, procedures, and requirements to protect classified and Controlled Unclassified Information (CUI) that, if disclosed, could cause damage to national security. (Answered) IDENTIFYING & SAFEGUARDING PII Test 2022|2023. The DoD ID number or other unique identifier should be used in place . PDF Personally Identifiable Information and Privacy Act Responsibilities Sensitive PII is information that can be utilized to identify an individual and that could potentially be used to harm them if it fell into the wrong hands. PII is any information which can be used to distinguish or trace an individuals identity. These attacks show how cybercriminals can use stolen PII to carry out additional attacks on organizations. Internet-based, self-paced training courses, Training videos, usually in 10 minutes or less, that allows you to refresh your knowledge of a critical topic or quickly access information needed to complete a job, Center for Development of Security Excellence, Defense Counterintelligence and Security Agency, Personally Identifiable Information (PII), My Certificates/Digital Badges/Transcripts, My Certificates of Completion for Courses, Controlled Unclassified Information (CUI) Training, Personally Identifiable Information (PII) Training, Identifying and Safeguarding Personally Identifiable Information (PII), Hosted by Defense Media Activity - WEB.mil. The U.S. General Services Administration notes that PII can become more sensitive when it is combined with other publicly available information. Identifying and Safeguarding Personally Identifiable Information (PII) Version: 5.0 Length: 1 Hour This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual . College Physics Raymond A. Serway, Chris Vuille. ), which was introduced to protect the rights of Europeans with respect to their personal data. eLearning Courses - CDSE .dol-alert-status-error .alert-status-container {display:inline;font-size:1.4em;color:#e31c3d;} Terms of Use The Office of Personnel Management and Anthem breaches are examples of this, where millions of pieces of PII were taken and then used to attack other organizations like the IRS. Terms of Use 0000001903 00000 n Everything's an Argument with 2016 MLA Update University Andrea A Lunsford, University John J Ruszkiewicz. Our Other Offices. The document explains the importance of protecting the confidentiality of PII in the context of information security and explains its relationship to privacy using the the Fair Information Practices, which are the principles . @media (max-width: 992px){.usa-js-mobile-nav--active, .usa-mobile_nav-active {overflow: auto!important;}} PII ultimately impacts all organizations, of all sizes and types. citizens, even if those citizens are not physically present in the E.U. Only individuals who have a "need to know" in their official capacity shall have access to such systems of records. This training is intended for DOD civilians, military members, and contractors using DOD information systems. Essential Environment: The Science Behind the Stories Jay H. Withgott, Matthew Laposata. You have JavaScript disabled. hb```> AX @Lt;8w$02:00H$iy0&1lcLo8y l ;SVn|=K Guidance on the Protection of Personal Identifiable Information [CDATA[/* >