{"id":539,"date":"2018-08-29T19:24:19","date_gmt":"2018-08-29T23:24:19","guid":{"rendered":"http:\/\/joindeleteme.com\/help\/?post_type=ht_kb&amp;p=539"},"modified":"2018-08-29T19:24:19","modified_gmt":"2018-08-29T23:24:19","slug":"what-is-personally-identifiable-information","status":"publish","type":"post","link":"https:\/\/joindeleteme.com\/blog\/what-is-personally-identifiable-information\/","title":{"rendered":"What is Personally Identifiable Information (PII)?"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2018\/08\/understanding-piece_copy.png\" alt=\"personally identifiable information\"\/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Personally Identifiable Information (PII)<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Personally Identifiable Information, also known as PII, is any information that can be used to identify an individual. This kind of information can be used on its own, or in conjunction with other information that helps to identify an individual. Some examples of PII would be your full name, driver\u2019s license number, social security number, passport number, email address, vehicle registration number, biometric data (face, retinal, or fingerprint scans), birthdate, and telephone number. <\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Keep in mind that the above list is not \u201call-inclusive\u201d, and there are many other forms that PII can take, like your medical, employment, or financial histories. <\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><b>Why should I care about my PII?<\/b><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Your PII is just that &#8211; <\/span><b>yours<\/b><span style=\"font-weight: 400;\">. So, issues arise when PII is mistreated and ends up in the wrong hands. Most often, PII is referenced when speaking about identity theft, data breaches, or general online privacy and security issues. When a company experiences a data breach, any PII that is being stored by that company can end up being sold on the dark web with the intention to be used to commit identity theft.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Once your PII ends up on the dark web, it can be assembled by hackers and ID thieves to take over your identity. Typically, a single piece of PII is not enough for an ID thief to commit fraud, but by compiling a few pieces of PII from sources on the dark web or from <\/span><strong>data brokers<\/strong><span style=\"font-weight: 400;\">, an ID thief can begin strategizing against a potential target. <\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><b>Identity Theft is Real<\/b><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s important to emphasize that identity theft is very real, and should not be taken lightly &#8211; someone new is impacted by identity theft <\/span><a href=\"https:\/\/clark.com\/technology\/theres-a-new-victim-of-identity-theft-every-two-seconds-heres-the-best-way-to-protect-yourself-online\/\" target=\"_blank\" rel=\"noopener\"><b><i>every two seconds<\/i><\/b><\/a><b><i>.<\/i><\/b><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">According to <\/span><strong><a href=\"https:\/\/www.javelinstrategy.com\/press-release\/identity-fraud-hits-all-time-high-167-million-us-victims-2017-according-new-javelin\" target=\"_blank\" rel=\"noopener noreferrer\">Javelin Strategy &amp; Research<\/a><\/strong><span style=\"font-weight: 400;\"> in 2017: <\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b><span style=\"font-weight: 400;\">There was a record high 16.7 Million victims of Identity Fraud in the U.S.<\/span><\/b><\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">That\u2019s 6.6% of <\/span><b><i>all<\/i><\/b><span style=\"font-weight: 400;\"> American consumers &#8211; yikes!<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b><span style=\"font-weight: 400;\">30% of U.S. consumers were notified of a data breach in 2017<\/span><\/b><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">1.5 million victims of identity fraud had an intermediary account opened in their name<\/span><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><b>Your PII and You<\/b><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">PII serves at least one legitimate purpose online: to allow marketing companies to serve you better ads. By compiling general information like your email address, gender, age range and browsing tendencies, data mining companies can create profiles about you which are then sold to marketing companies who serve ads on your Facebook or Instagram feeds, or banner ads on that website you\u2019re visiting. <\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Unfortunately, there are <\/span><strong><a href=\"https:\/\/www.abine.com\/blog\/2017\/abine-plus-adam-tanner-medical-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">negative implications with data profiles<\/a><\/strong><span style=\"font-weight: 400;\"> like this being created. Medical records have been sold to data brokers since the introduction of <\/span><strong><a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/ocr\/privacy\/hipaa\/understanding\/consumers\/consumer_rights.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA<\/a><\/strong><span style=\"font-weight: 400;\"> (Health Insurance Portability and Accountability Act) in 1966 using \u201canonymized data\u201d (health records with unique identifiers removed like name, social security number, or address). Even though the data is mostly \u201canonymized\u201d, when cross-referenced against other databases, it can be used to build a health record about you, in-turn destroying the data\u2019s anonymity. <\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">These kinds of profiles open the doors to prejudice from health insurance providers or even potential employers &#8211; imagine a world where you\u2019re denied a job or health insurance because you did a Google search for \u201ccancer symptoms\u201d. <\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><b>Protecting Your PII<\/b><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Even in today\u2019s world of frequent data breaches, consumers are still forced to give out their personal information on a regular basis in order to use the products and services that they need. Because of this, it seems like an impossible task to try and protect your PII from getting into the wrong hands. <\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Thankfully, you\u2019re not helpless, and you can use these tips to protect your PII:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Be cautious of what you share on social media<\/span><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/joindeleteme.com\/blog\/opt-out-guides\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"font-weight: 400;\"><strong>Remove your personal information<\/strong><\/span><\/a><span style=\"font-weight: 400;\"> from data broker websites (or use <\/span><strong><a href=\"https:\/\/joindeleteme.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">DeleteMe<\/a><\/strong><span style=\"font-weight: 400;\">)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Use a <\/span><strong><a href=\"https:\/\/dnt.abine.com\/#feature\/masking\" target=\"_blank\" rel=\"noopener noreferrer\">Masked Email<\/a><\/strong><span style=\"font-weight: 400;\"> address when signing up for a new service or mailing list online<\/span><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Use a <\/span><strong><a href=\"https:\/\/dnt.abine.com\/#feature\/masking\" target=\"_blank\" rel=\"noopener noreferrer\">Masked Credit Card<\/a><\/strong><span style=\"font-weight: 400;\"> when asked for a credit card online <\/span><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.abine.com\/blog\/2016\/protect-your-identity-with-a-perfect-pair-blur-and-your-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\">Use a VPN<\/a><\/strong><span style=\"font-weight: 400;\"> to disguise your device\u2019s IP address and encrypt your browsing activities<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Request that your information be erased from a company\u2019s database if you no longer need their product or service<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">The simplest and best thing you can do to protect your PII is to stop giving it out whenever it\u2019s asked of you. Unfortunately, many times you\u2019re still required to provide your real information in order to access a product or service, and you\u2019re forced to trust the company you\u2019re giving it to. Still, there are many things you can do to protect your PII, and your safety should always be prioritized.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Personally Identifiable Information (PII) Personally Identifiable Information, also known as PII, is any information that can be used to identify an individual. This kind of information can be used on its own, or in conjunction with other information that helps to identify an individual. Some examples of PII would be your full name, driver\u2019s license [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":6287,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[27],"tags":[],"class_list":["post-539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-staying-private-online"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts\/539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/comments?post=539"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts\/539\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/6287"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/categories?post=539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/tags?post=539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}