This course was created and produced by Mentor Source, Inc. We are pleased to host this training in our library.
- What is PII?
- Formal and informal capture
- Why is PII protected?
- Legal and regulatory influences
- High-profile PII breach cases: Medical, financial, and educational
- Global differences in PII use
- Protecting PII as an individual
- Best practices for organizations to protect PII
Skill Level Beginner
- [Jennifer] Welcome to this course on Identifying Personally Identifiable Information, or P-I-I. My name is Jennifer Kurtz. I lead graduate courses in Cybersecurity and Strategic Project Management for Healthcare Professionals at Regis University, in Denver, Colorado. Writing the chapter on Data Leakage Prevention, or D-L-P, Technology for the American Bar Association's Data Breach and Encryption Handbook, which was a best seller, led me to further exploration of privacy issues that I had started while doing graduate studies at Purdue University.
Being grandmother to digital natives, children who play online Pokemon games before they learn to play checkers, has encouraged even deeper questioning about how and why PII is captured by businesses and governments alike. Sometimes that PII capture is for a specific limited purpose. I can accept that. What I can't accept is that my PII is a commodity to be traded by others for profit or misuse. In this course, we will look at how PII is formed, what your PII is worth in the marketplace, who pays for it, and how to protect and even hide it.
I hope you find the material useful.