Personal Information

Personal Information

The information about an individual that can directly or indirectly distinguish or trace an individual’s identity, associate or link an individual to private information, distinguish one person from another, or could be used to re-identify anonymous data. Personal information may additionally include IP addresses, business identification information such as title, company business phone and address, etc., video surveillance images, and more. In the U.S., such information may be referred to as ‘personally identifiable information (PII),’ in the EU as ‘personal data,’ and other variations depending on the country or government agency.

    • Related Articles

    • Sensitive Personal Information/Data (High Risk Data)/Special Categories of Data

      (US) Sensitive personal information is generally synonymous with high risk data. The data, should it suffer loss of confidentiality, integrity, or availability, could have a significant detrimental or adverse impact to both the business (firm) and ...
    • Readiness

      Helps your business improve the way it handles personal information and will identify potential privacy or security deficiencies. It then provides a prioritized remediation schedule to fill the gaps in your privacy policies and practices.
    • Personal Data

      Any information relating to an identified or identifiable natural person 'data subject' by reference to an identifier such as a name, an identification number, location data, online identifier or to one or more factors specific to the physical, ...
    • Personal Data Breach

      A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. In other words, if any information relating to an individual ...
    • Information Security

      The protection of information for the purposes of preventing loss, unauthorized access and/or misuse. It is also the process of assessing threats and risks to information and the procedures and controls to preserve confidentiality, integrity and ...