It used to be that the telephone book was one of the only ways to gather personal information, such as phone numbers or addresses, about other people.
Today, the Internet has opened up new avenues. Nearly every shred of a person's personal details is on the Internet in some form or another.
In the wrong hands, such information can be used to steal someone's money or identity. With so much information out there, it can be difficult to know what you should be keeping a close eye on.
What is personally identifiable information?
Personally identifiable information (PII) is any information about an individual that can be used directly, or in connection with other data, to identify, contact or locate that person. Such information can include medical, educational, financial, legal and employment records.
Because personally identifiable information is so valuable, federal and state laws have been enacted to protect it in the United States. The laws, which apply to businesses, schools, medical facilities and government institutions, limit the distribution and accessibility of PII.
Examples of personally identifiable information
Personally identifiable information can be anything that identifies an individual, such as a full name, an address, a home, office or mobile telephone numbers, an email address, a Social Security number or other form of national ID number, an Internet Protocol address or a fingerprint or other biometric data.
Other types of PII include an individual's birthday, age, criminal record, gender, race and educational history. Vehicle registration numbers, property title information, taxpayer and patient IDs and passport numbers are also examples.
Protecting personally identifiable information
An organization that doesn't protect the personally identifiable information of its employees, members or customers risks incurring a significant financial cost, as well as a blow to its reputation, in the event of a data breach.
Well-run organizations employ numerous security protocols to ensure that personally identifiable information is safe and secure at all times.
It is critical that all organizations, including businesses both small and large, make sure they are following all the legal requirements that the state and federal government has set forth.
Protecting PII involves a combination of encryption, threat protection, data-loss prevention and policy compliance.
When handling PII, organizations must set rules regarding access to the data, how the data is received, stored and transmitted, what information can be sent within the organization and what can be passed along to third parties.
Consumers worried about their privacy can check with each organization they are considering doing business with to ensure the proper privacy protocols are in place.
Get the BEST of Tom’s Guide daily right in your inbox: Sign up now!
Upgrade your life with the Tom’s Guide newsletter. Subscribe now for a daily dose of the biggest tech news, lifestyle hacks and hottest deals. Elevate your everyday with our curated analysis and be the first to know about cutting-edge gadgets.