With the increased focus on digital privacy and data protection regulations, data breaches are becoming prominent in the news. Data breaches happen due to the release of sensitive data to unauthorized parties and at times are the outcome of improper disposal of devices. This blog defines Personal Identifiable Information (PII), its breaches, and data disposal policy to ethically prevent PII breach.
PII shared by employees, consumers, stakeholders, and clients are vulnerable to data leakage and need special attention by organizations responsible for storing, retaining and even when disposing storage device that contains this information. They must follow secure PII data disposal policy apart from rightful recycling of IT assets at the end-of-life to bridge the security gaps. Inappropriate handling of old devices can cause PII breach that may subsequently result in high penalties of up to €20 Million or 4% of global business revenue as per EU-GDPR and other data protection laws. Therefore, organizations dealing with bulk volumes of data must ensure permanent data wiping beyond recovery before donating, recycling, or disposing of old devices.
Get familiar with the fundamentals of Personally Identifiable Information in order to take secure disposal measures and prevent PII breach.
Personally Identifiable Information (PII) is information that if used alone or in combination with other records can define or trace an individual. It comprises any factual or subjective information, directly or indirectly associated with the person. PII may contain direct identifiers such as social security number or quasi–identifiers such as race or date of birth or a combination of both to successfully identify an individual.
A wide array of sensitive and non-sensitive information that forms a part of personally identifiable information are listed as under:
A PII Breach occurs when an unauthorized party gets access to the sensitive, confidential information pertaining to the organization (employees, customers, or stakeholders) and discloses it. This unauthorized access of physical or electronic information due to illicit handling, exposure or control leads to PII Breach.
Lack of data security measures and inappropriate handling of IT Assets during their disposal is leading to major PII breaches in the recent times. Improper hard drive disposal and poor vendor selections have caused massive penalties and losses to organizations in the near past. Here are some eye-opening PII breach incidents highlighting the ramifications of inappropriate IT asset disposal at the end-of-life:
Company | Incident | Cost of Breach | PII Violation |
NHS Computers | Sensitive data remained unattended in the old computers sold on eBay | £200,000 | About 900 adults and 2000 children patient’s record, personal data, and HR data was breached. |
U.S. Department of Veterans Affairs | The devices enclosing personal data (PII) and other confidential military personnel data were stolen from the house of a Veteran Affairs employee who was liable for Unauthorized possession of office laptop and external hard disks. | Undisclosed | Personal information of 26.5 million veterans were compromised. |
Morgan Stanley | Lack of due diligence while decommissioning IT assets at the end-of-life. | $60 Million | Failure in protecting the PII of approximately 15 mn. current and former clients. |
HealthReach Community Health Centers | Improper disposal of hardware led to non-compliance to Maine Privacy law and HIPAA regulations. | Undisclosed | Over 100,000 Patients’ PII and PHI data has been compromised. |
These breaches reinforce the need to take due measures while handling and disposing of IT Assets in order to protect sensitive customer data (PII and PHI) from falling into wrong hands.
Regardless of the industry or size, the organizations are advised to protect the personal information of their customers, employees, and stakeholders from getting exposed to unauthorized entities. So, they must develop comprehensive policies and procedures to securely manage PII at all stages of the data lifecycle.
Here is a list of key measures that an organization must adhere to prevent PII breaches in future.
Unfortunately, the conventional methods of data protection and privacy measures were fundamentally flawed. When the major malicious attacks started rocking the world, different countries came up with a stringent set of data protection laws to guide organizations with the legitimate approach of PII collection, storage, and disposal.
Some fundamental principles outlined by these laws emphasize on not using personal information unless extremely critical. The regulatory guidelines also insist on data erasure of sensitive information once its purpose is fulfilled or it is no longer required in the future.
With an objective to protect the individuality of their citizens, the United States follow the National Institute of Standards and Technology (NIST) guidelines to safeguard the confidentiality of their citizens. Similarly, EU GDPR is one of the toughest data protection regulation effective across the European Union (EU).
Even the Government of Australia initiated a predominant data privacy law in the late 80s, known as the ‘Privacy Act 1988’. The Personal Information Protection and Electronic Documents Act (PIPEDA) empowers Canadian customers with the right to access their personal information gathered by organizations on their websites. The Japanese Act on the Protection of Personal Information, also known as APPI, aims to preserve the personal information of Japanese citizens. Organizations that ignores the regulatory laws suffer massive penalties from the legal and compliance regulators.
Responsible handling of personal information is critical for any organization. Data Collection, Processing and Management should be governed by the data protection, retention and disposal policies in order to meet compliance and mitigate risks. Maintain a meticulous approach to record, access, preserve, and dispose the Personally Identifiable Information after a specified duration. Even documents of PII records must be destroyed in line with the prevailing data protection laws. Failure in doing so can lead to non-compliance and risk organization goodwill.