Which of the following policies is implemented in order to minimize data loss or theft?
Chain of custody
Zero day exploits
Although the concept of PII is old, it has become much more important as information technology and the
Internet have made it easier to collect PII through breaches of internet security, network security and web
browser security, leading to a profitable market in collecting and reselling PII. PII can also be exploited by
criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts.
Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an
individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card
number, or patient record.
Thus, a PII handling policy can be used to protect data.