Personally Identifiable Information (PII) - The 21st Century Threat
Personally Identifiable Information (PII) - The 21st Century Threat
Personally Identifiable Information (PII) - The 21st Century Threat
Ronald J. Veazie
evolution of cryptocurrencies, quantum computing, and new scientific discoveries to name a few.
Regardless of how advanced we get, the threat to obtain/steal our Personally Identifiable
Information (PII), continues to exist and appears to be a threat that is not going away anytime
soon.
PII is information that personally identifies you, i.e., Social Security Account Number (SSAN),
home address, drivers license number, medical data, etc. This paper will review and address the
United States Code (USC), 2 CFR 200.79 - Personally Identifiable Information (PII), defines PII
as, PII means information that can be used to distinguish or trace an individuals identity, either
alone or when combined with other personal or identifying information that is linked or linkable
sources such as telephone books, public Web sites, and university listings. This type of
information is considered to be Public PII and includes, for example, first and last name, address,
work telephone number, email address, home telephone number, and general educational
credentials. The definition of PII is not anchored to any single category of information or
can be identified. Non-PII can become PII whenever additional information is made publicly
available, in any medium and from any source, that, when combined with other available
The governments definition of PII is a good starting point to understand that PII can be a case-
by-case assessment due to how it is being utilized to ensure no laws are being broken and to
protects its citizens. PII is crucial to maintaining good credit, and being able to identify oneself
at various agencies, especially government agencies where services and benefits are determined
by correctly identifying a person. Its crucial for PII data to be codified so there can be laws
That leads to recognizing the different types of PII. Many people are not aware of the
various types of PII data that is kept on them by various agencies. Whether it be the federal
online stores/retailers, local shops, gyms, cable companies or your favorite restaurant, PII data is
maintained by probably too many agencies and many Americans freely give their PII data
without questioning the reason an agency needs this data. I remember once trying to get a quote
for DirectTV and they wanted my Social Security Number (SSN); I asked the lady if she really
needed the same number that I will one day use to claim my retirement benefits from the federal
government to get cable TV. She indicated she could use my address instead of my SSN.
Frequently we dont ask for alternatives when were asked for our PII data. Its important to
know what PII data is and when you are required to provide it. Just because an agency ask for
1
https://www.gpo.gov/fdsys/pkg/CFR-2014-title2-vol1/pdf/CFR-2014-title2-vol1-sec200-79.pdf (U.S. Government
Publishing Office (GPO))
Many agencies understand the importance of securing the PII data they maintain on their
customers and take the necessary precautions to properly protect this data. Knowing when to
provide the appropriate PII data and to which agency/organization can aid in preventing PII data
On June 4, 2015, the federal governments Office of Personnel and Management (OPM),
million people and leading to the resignation of the OPM director.3 It was later revealed that the
2
PII Chart source: http://www.onlinewebsitesecurity.com/wp-content/uploads/2016/08/PII-chart_FINAL.png
3
https://www.opm.gov/news/releases/2015/06/opm-to-notify-employees-of-cybersecurity-incident/
affected over 21 million people and the hack was the work of the Chinese government. The
threat of misuse of this hacked data cannot be underestimated. When a foreign government is
able to obtain the entire personnel history of a person, it can lead to blackmail and criminal use
of their data. Besides for foreign governments hacking PII data, individuals and criminal entities
are daily trying to obtain PII data for their own financial gain. Frequently there are news articles
indicating a major retailer had their servers hacked that contained the credit card data of their
customers. The threat of misusing PII data is a daily one that can devastate a person if their PII
Its one thing for a criminal to hack your PII data, its another to actually use your own
data against you. For your PII data to be used against you, your data must be hacked, as in the
OPM data hack where so much critical data is stored in one place, or your PII data can be
obtained through a process called Social Engineering. Symantec defines Social Engineering as,
a hackers clever manipulation of the natural human tendency to trust.4 Oftentimes PII is
obtained through Social Engineering where you participate in giving away your PII.
For example, if you sell items on line, be careful when responding using your personal email
address. Scammers will offer above your asking price when you respond via email and will then
ask for your address to mail a cashiers check to you or they might ask for your PAYPAL account
information. The scammer can take your email address and assume you have a PAYPAL account
and contact PAYPAL to reset your account based on the PII data they obtained from you and
empty your PAYPAL account. Once that type of information is provided, the criminal will then
try to get your bank account or PAYPAL account information and drain your accounts based on
information you initially provided. One solution you can utilize is to create an email account
4
https://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
your financial data. Another approach is to always have your antennae up for the, if it sounds
too good to be true, it probably is syndrome. While we never like to consider ourselves as
greed. Our PII data is crucial and can be used against us to destroy our credit while taking
months or years to recover. Our Protected Health Information (PHI)5, can also be used against us
by someone utilizing our medical benefits without our knowledge or authorization, thus
endangering our ability to use our own medical benefits in a timely manner. An organization
should ensure it is protecting PHI data in accordance with HIPAA privacy rules to protect its
patients.6 PII/PHI data can be used against a person to steal their financial and/or health data and
any other nefarious purposes the mind can imagine. The key is to protect oneself with preventive
There are various preventative methods to protect oneself in the case your PII data is
hacked or obtained through other methods. One of the best methods to employ is a monitoring
service that also provides repair/resolution services in case your PII is stolen. Companies such
Legal Shield, CSID, Experian and LifeLock provide constant monitoring and repair services for
these types of incidents. When OPM was hacked in 2015, my data was included in that hack.
OPM provided approximately 15-18 months of free monitoring by CSID. While these services
are not free, they are low-cost and provide excellent protection. In the case of Legal Shield,
5
http://ora.research.ucla.edu/OHRPP/Documents/Policy/6/PHI_PII.pdf
6
https://www.healthit.gov/providers-professionals/ehr-privacy-security/practice-integration
There are also free services provided by the three major credit monitoring bureaus, TransUnion,
Equifax and Experian. The federal government also provides a wealth of resources for citizens
crime/identity-theft)
The most important thing to remember is to have a preventative action plan in place in case you
are the victim of misuse/criminal activity of your PII data. Besides for individuals taking action,
agencies such as universities can play a crucial role in assisting to inform and protect its students.
7
http://www.lawshieldnow.com/
providing the proper funding and give that department the tools it needs to protect the PII data
under its care and ensure all laws and regulations are implemented. Universities can also play a
engineering threat and provide information on school websites such as the examples
below:
o UCLA - https://police.ucla.edu/prevention-education/identity-theft
o USC - https://ois.usc.edu/living-in-la/money/ssn/identity-theft-and-ssn/
- Partner with companies that provide monitoring services to offer low cost preventative
plans for their faculty, staff and students (bulk memberships usually result in decreased
costs)
The theft of PII data is a growing threat. It is imperative that universities recognize the
magnitude of this threat and take a leading role to help combat it. Because of research being
conducted at universities and other organizations, there is a glimmer of hope to combat this
threat.
The future of how PII will be protected and how to approach Social Engineering
problems appears to be bright. One of the threats mentioned previously is Social Engineering.
This is not only an online threat because many people are fooled into meeting a stranger in
person to sell an item via Craigslist. The Los Angeles Police Department (LAPD), has taken a
leading role by offering safe exchange zones8 for online sellers and buyers to meet and avoid a
harmful situation. So far the LAPD has established nine police stations for the purchase of
meeting to exchange money for property. Hopefully this approach will get adopted by other
8
http://abc7.com/news/lapd-sets-up-safe-zones-for-online-buyers-sellers/2156129/
e-commerce. On the technology front in the distant future, quantum computing might be able to
solve the ills of the theft of PII data. Quantum computing is a complex topic, but to keep it
simple, many scientists believe it will solve the problem of computer hacking. Some believe that
quantum computer will be 100 million times faster9 than current computers, making it virtually
scientist have recently made a breakthrough in quantum computing by setting a new teleportation
distance which reflects that quantum computers will be impossible to hack: Not only did the
team set a record for quantum teleportation distance, they also showed that one can build a
would be impossible to eavesdrop on without alerting the users, which would make online
communications much more secure.10 While quantum computing in everyday use is a long way
The PII threat is real and dangerous. According to the Bureau of Justice Statistics, over
17 million residents experienced some form of identity theft in 2014.11 That number represents
approximately seven percent of the United States was affected by identity theft. While we await
the promise quantum computing holds, practical applications available today can aid in
protecting PII data. Being careful of what websites are visited, questioning who PII data is
provided to and utilizing a fee or free monitoring service goes a long way to protect oneself from
9
http://www.securityweek.com/quantum-computings-threat-public-key-cryptosystems
10
https://www.space.com/37506-quantum-teleportation-record-shattered.html
11
https://www.bjs.gov/content/pub/press/vit14pr.cfm
https://www.gpo.gov/fdsys/pkg/CFR-2014-title2-vol1/pdf/CFR-2014-title2-vol1-sec200-79.pdf
(U.S. Government Publishing Office (GPO)