PII Flashcards 4.0
21 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which action requires an organization to carry out a Privacy Impact Assessment?

  • Storing paper-based records
  • Collecting PII to store in a new information system (correct)
  • Collecting PII to store in a National Security System
  • Collecting any CUI, including but not limited to PII

What is the purpose of a Privacy Impact Assessment (PIA)?

  • Determine whether Protected Health Information (PHI) is held by a covered entity
  • Determine whether the collection and maintenance of PII is worth the risk to individuals (correct)
  • Determine whether paper-based records are stored securely
  • Determine whether information must be disclosed according to the Freedom of Information Act (FOIA)

Information that can be combined with other information to link solely to an individual is considered PII.

True (A)

What guidance identifies federal information security controls?

<p>OMB Memorandum M-17-12: Preparing for and Responding to a Breach of Personally Identifiable Information (D)</p> Signup and view all the answers

An organization that fails to protect PII can face consequences including:

<p>All of the above (D)</p> Signup and view all the answers

If someone tampers with or steals an individual's PII, they could be exposed to which of the following?

<p>All of the above (D)</p> Signup and view all the answers

Which of the following is not an example of PII?

<p>Pet's nickname (D)</p> Signup and view all the answers

What law establishes the federal government's legal responsibility for safeguarding PII?

<p>The Privacy Act of 1974 (A)</p> Signup and view all the answers

An organization with an existing system of records decides to start using PII for a new purpose outside the 'routine use' defined in the System of Records Notice (SORN). Is this a permitted use?

<p>No (A)</p> Signup and view all the answers

Which of the following is responsible for the most recent PII data breaches?

<p>Phishing (A)</p> Signup and view all the answers

Which of the following is not an example of an administrative safeguard that organizations use to protect PII?

<p>List all potential future uses of PII in the System of Records Notice (SORN) (A)</p> Signup and view all the answers

Within what timeframe must DoD organizations report PII breaches to the United States Computer Emergency Readiness Team (US-CERT) once discovered?

<p>1 Hour (D)</p> Signup and view all the answers

Officials or employees who knowingly disclose PII to someone without a need-to-know may be subject to which of the following?

<p>Criminal penalties (D)</p> Signup and view all the answers

Your organization has a new requirement for annual security training. To track training completion, they are using employee Social Security Numbers as a record identification. Is this compliant with PII safeguarding procedures?

<p>No (B)</p> Signup and view all the answers

Identify if a PIA is required:

<p>B and D (F)</p> Signup and view all the answers

Which of the following is NOT included in a breach notification?

<p>Articles and other media reporting the breach. (A)</p> Signup and view all the answers

Misuse of PII can result in legal liability of the individual.

<p>True (A)</p> Signup and view all the answers

Which regulation governs the DoD Privacy Program?

<p>DoD 5400.11-R: DoD Privacy Program (C)</p> Signup and view all the answers

Using a Social Security Number to track individuals' training requirements is an acceptable use of PII.

<p>False (B)</p> Signup and view all the answers

Misuse of PII can result in legal liability of the organization.

<p>True (A)</p> Signup and view all the answers

Which type of safeguarding measure involves restricting PII access to people with a need-to-know?

<p>Administrative (A)</p> Signup and view all the answers

Flashcards

PIA Trigger

Collecting PII to store in a new information system

PIA Purpose

Determine if PII collection risk is worth it.

Combined Information = PII

True

Federal Security Controls Guidance

OMB Memorandum M-17-12

Signup and view all the flashcards

PII Breach Consequences

All of the above

Signup and view all the flashcards

PII Theft Exposure

All of the above

Signup and view all the flashcards

Not PII

Pet's nickname

Signup and view all the flashcards

PII Legal Responsibility

The Privacy Act of 1974

Signup and view all the flashcards

New PII Use Permitted?

No

Signup and view all the flashcards

Cause of PII breaches

Phishing

Signup and view all the flashcards

Not an administrative safeguard

List all potential future uses of PII in the System of Records Notice (SORN)

Signup and view all the flashcards

Report PII Breaches

1 Hour

Signup and view all the flashcards

Unauthorized PII Disclosure

Criminal penalties

Signup and view all the flashcards

SSN for Training Tracking?

No

Signup and view all the flashcards

PIA Required?

B and D

Signup and view all the flashcards

Breach Notification

Articles and other media reporting the breach.

Signup and view all the flashcards

Misuse of liable

True

Signup and view all the flashcards

DoD Privacy Program Regulation

DoD 5400.11-R

Signup and view all the flashcards

SSN for Training Acceptable

False

Signup and view all the flashcards

Misuse of PII Consequences

True

Signup and view all the flashcards

Need-to-Know Safeguarding

Administrative

Signup and view all the flashcards

Study Notes

Privacy Impact Assessment (PIA)

  • A PIA is required when collecting PII for a new information system.
  • The purpose of a PIA is to assess whether the risks of collecting and maintaining PII outweigh the potential harm to individuals.

Personally Identifiable Information (PII) Definitions

  • PII includes information that can be combined to identify an individual.
  • Pet's nickname is NOT considered PII.
  • Legal responsibility for safeguarding PII is established by the Privacy Act of 1974.

Consequences of Failing to Protect PII

  • Organizations face remediation costs, loss of trust, and legal liability due to improper PII management.

Data Breaches

  • Phishing is the leading cause of modern PII data breaches.
  • Breaches must be reported to the US-CERT within 1 hour of discovery.

Safeguarding PII

  • Administrative safeguards include conducting risk assessments and ensuring employee training.
  • Using Social Security Numbers to track employee training is non-compliant with PII safeguarding procedures.
  • Knowingly disclosing PII without a need-to-know can lead to criminal penalties.

Reporting and Compliance

  • A breach notification does not include media articles related to the breach.
  • Organizations must seek guidance from regulations like DoD 5400.11-R for privacy programs.
  • A PIA is required for converting paper PII records to electronic form or when puchasing a new PII storage system.

Important True/False Facts

  • Information misuse can result in legal liability for both individuals and organizations.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on Personally Identifiable Information (PII) with these flashcards. Each card presents a question related to privacy impact assessments and the handling of PII in various contexts. Perfect for anyone studying privacy regulations and practices.

More Like This

Use Quizgecko on...
Browser
Browser