Many data privacy conversations circle around personally identifiable information. Learn some simple strategies to define PII in this video.
- So I define privacy and data protection … as the authorized processing of personally identifiable data … according to fair principles. … And we'll break all of that stuff down as we go along here, … but personally identifiable information, … identifying the asset under management, if you will, … is really crucial to success. … The standard definition … is information that can alone, … or, in combination with another data element, … describe a discrete individual. … Well there's a few analogies here … that are very helpful, I think. … So the name Michelle may or may not be private information, … it's just a name. … The name Michelle applied to this human carbon-based unit … is now intellectual property, it's private, … it's personally identifiable. … Now notice that I tell people all the time what my name is. … I share my business card, I'm on LinkedIn. … I do all those good things. … Secrecy is not central to the definition … of personally identifiable information. … That's a processing issue that we'll talk about later. …
Author
Updated
11/4/2019Released
10/2/2017- Relate the concept of data as intellectual property.
- Examine the ways in which moral, legal, and ethical concerns apply to data privacy.
- Explain how context applies to personal private information.
- Recognize the motivations of individuals accessing data they are not authorized to access.
- Define the implications of moral crumple zones.
Skill Level Intermediate
Duration
Views
Related Courses
-
Learning Data Governance
with Jonathan Reichental41m 4s Intermediate -
Data-Driven Network Security Essentials
with Jungwoo Ryoo1h 3m Intermediate -
Securing the IoT: Privacy
with Lisa Bock1h 59m Intermediate
-
Introduction
-
Welcome1m 1s
-
What you should know2m 4s
-
Privacy overview1m 55s
-
-
1. What Is Data Privacy?
-
Data tells a story2m 47s
-
Privacy vs. secrecy1m 27s
-
-
2. The Importance of Data Privacy
-
The individual's perspective1m 34s
-
Privacy is contextual1m 6s
-
Trust and integrity2m 55s
-
Consumer trust cliff2m 18s
-
Consumers want transparency2m 17s
-
-
3. What's at Stake?
-
Protecting the story4m 5s
-
Vulnerability to a system4m 42s
-
Data in the wrong hands2m 30s
-
React to privacy issues5m 24s
-
-
4. Privacy Solutions
-
Planning for data2m 5s
-
Privacy engineering2m 11s
-
Moral crumple zones4m 28s
-
Culture of privacy4m 10s
-
Innovation2m 40s
-
Conclusion
-
Emerging technologies3m 41s
-
Next steps1m 48s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Personally identifiable information