WOT Wiki:Personally Identifiable Information (PII)

From WOT Wiki
Revision as of 20:12, 17 March 2011 by G7w (talk | contribs) (European Commission: Justice and Home affairs)
Jump to: navigation, search

The protection of PII is important to maintain public trust and confidence in an organization, to protect the reputation of an organization, and to protect against legal liability for an organization. Organizations have always considered trust, confidence, and reputation as motivating factors in protecting PII. Recently, organizations have become more concerned about the risk of legal liability due to the enactment of many US federal, state, and international privacy laws.

Examples of PII Data

The following list contains examples of information that may be considered PII.

  • Name, such as full name, maiden name, mother’s maiden name, or alias
  • Personal identification number (PIN), such as your Social Security Number (SSN), passport number, driver’s license number, taxpayer identification number, patient identification number, and financial account or credit card number.
  • Address information, such as street address or email address.
  • Asset information, such as Internet Protocol (IP) or Media Access Control (MAC) address or other host-specific persistent static identifier that consistently links to a particular person or small, well-defined group of people.
  • Telephone numbers, including mobile, business, and personal numbers.
  • Personal characteristics, including photographic image (especially of face or other distinguishing characteristic), x-rays, fingerprints, or other biometric image or template data (e.g., retina scans, voice signature, facial geometry).
  • Information identifying personally owned property, such as vehicle registration or identification number, and title numbers and related information.
  • Information about an individual that is linked or linkable to one of the above (e.g., date of birth, place of birth, race, religion, weight, activities, or employment, medical, education, or financial information).


Source

NIST Special Publication 800-122 PDF

Guide to Protecting the Confidentiality of Personally Identifiable Information (PII):
Recommendations of the National Institute of Standards and Technology
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8930
April 2010


Web forms / registrations

If your site has a simple web form to email script or simple forum / newsletter subscription registration most likely you are not gathering any personally identifiable information. If you request a name without requiring first and last names, any "name" can be given

Examples of non-PII

A simple Contact Us form requesting 
  • name
  • email
  • website
  • subject
  • message
Site / Forum registration requesting 
  • name
  • user name
  • password
  • date of birth (COPPA compliance)
  • email
Newsletter subscription 
  • email


Examples of PII

A Contact Us form requiring 
  • name
  • address
  • city / state / province
  • zip-code / postal code
  • phone / mobile number
  • email
  • website
  • subject
  • message
Site / Forum registration requiring 
  • first name
  • last name
  • User name
  • location / address (full or partial)
  • phone / mobile number
  • Password
  • Date of birth (COPPA compliance)
  • email


Australian Data Protection Act

[347=x-347-61940 Privacy International]

The Australian Senate on 6 December 2000 approved the Privacy Amendment (Private Sector) Bill which extends privacy protections to the private sector. The bill was strongly criticized by privacy advocates and the opposition political party as being far too weak. Commentary by privacy expert Roger Clarke who describes the bill as "the world's worst privacy legislation." The European Commission has also expressed concern that the law would not be adequate for trans-border data flows.

Advisory Report on the Privacy Amendment (Private Sector) Bill 2000

Also reference: Electronic Frontiers Australia Inc.


Canadian Personal Information Protection and Electronic Documents Act

Individual rights

  • know why an organization collects, uses or discloses their personal information;
  • more

Organizations requirements

  • obtain consent when they collect, use or disclose their personal information;
  • more

sources:


Dutch / Netherlands

supervises the fair and lawful use and security of your personal data, to ensure your privacy today and in the future.


European Union Data Protection Directive

officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data

The Data Protection Directive is a European Union directive which regulates the processing of personal data within the European Union.

source: Wikipedia entry

European Commission: Justice and Home affairs

Hungary Data Protection Bill


Finland / Sweden

Information security and protection of privacy in electronic communications.


Federative Republic of Brazil

Article 5 of the 1988 Constitution of Brazil provides that "the privacy, private life, honor and image of persons are inviolable, and the right to compensation for property or moral damages resulting from their violation is ensured."

Reference:

  • privacyinternational.org - visit


India Privacy Laws

No specific legislation pertaining to data protection and privacy has been enacted in India. The Indian government is currently considering the idea of enacting a detailed law on data protection under the initiative of the Ministry of Communication and Information Technology.

References:


UK Data Protection Act 1998

Data Protection Act 1998 (c. 29)
Wikipedia article

The Data Protection Act 1998 (DPA) is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. Although the Act itself does not mention privacy, it was enacted to bring UK law into line with the European Directive of 1995 which required Member States to protect people's fundamental rights and freedoms and in particular their right to privacy with respect to the processing of personal data. In practice it provides a way for individuals to control information about themselves.


United States

United States privacy law embodies several different legal concepts. One is the invasion of privacy, a tort based in common law allowing an aggrieved party to bring a lawsuit against an individual who unlawfully intrudes into his or her private affairs, discloses his or her private information, publicizes him or her in a false light, or appropriates his or her name for personal gain. Public figures have less privacy, and this is an evolving area of law as it relates to the media.

The essence of the law derives from a right to privacy, defined broadly as "the right to be let alone." It usually excludes personal matters or activities which may reasonably be of public interest, like those of celebrities or participants in newsworthy events. Invasion of the right to privacy can be the basis for a lawsuit for damages against the person or entity violating the right. These include the Fourth Amendment right to be free of unwarranted search or seizure, the First Amendment right to free assembly, and the Fourteenth Amendment due process right, recognized by the Supreme Court as protecting a general right to privacy within family, marriage, motherhood, procreation, and child rearing.

source: Wikipedia - Privacy laws of the United States

California's Online Privacy Protection Act

According to California's Online Privacy Protection Act (OPPA), all online businesses that "collects personally identifiable information through the Internet about individual consumers residing in California" must have a Privacy Policy on its website. If a website fails to add a Privacy Policy within 30 days of being notified to do so, then it is in violation of this Act. California Law Code

US Information Technology Law


Other countries - data protection


see also: Privacy Policy