Questions tagged [pii]

PII stands for Personally Identifiable Information -- that information which can uniquely identify an individual.

PII stands for Personally Identifiable Information -- that information which can uniquely identify an individual.

Some examples of PII include phone number, home address or (in the USA) social security number.

Some locations will have laws requiring information systems implementers to protect PII for users of their systems. Protecting PII (especially on the internet) has become more and more important as interests looking to discover PII have prevalent.

However, PII is a legal concept, not a technical concept. Because of the versatility and power of modern re-identification algorithms, the absence of PII data does not mean that the remaining data does not identify individuals. While some attributes may be uniquely identifying on their own, any attribute can be identifying in combination with others.

80 questions
0
votes
1 answer

Guidelines for PII data in use in cloud

There are guidelines on PII data in transit and at rest. What are the guidelines on using PII data in plain text in the logic? (in use at runtime)
user3760894
  • 267
  • 4
  • 13
0
votes
1 answer

web logic server Breach Help! How do Find Signs of what data if any was accessed?

A Weblogic server got hacked and the problem is now removed. I am looking through the infected VM's now in a sandbox and want to see what if any data was accessed on the application servers. the app servers were getting hammered with ssh requests…
0
votes
0 answers

Identify PII dataset in text file and encrypt it which could be decrypted later?

I have a chat text file which consists of PII dataset such as Name, identification number, phone no etc. I have to encrypt the PII information at source and decrypt it again at destination using Python 3.7. I used cryptography.fernet to convert but…
think-maths
  • 917
  • 2
  • 10
  • 28
0
votes
0 answers

Architecture of IoT with PII Protection Regulation (e.g. GDPR)

I have a hard time searching for a reference architecture for IoT that specifies a way of reaching PII Protection regulation compliance (e.g. GDPR). There are lots of articles with general suggestions like this or this, but what I am really seeking…
Dmitry
  • 3,028
  • 6
  • 44
  • 66
0
votes
1 answer

Google DLP takes a long time to process

I tried using Google DLP (in particular inspecting text - string of less than 80 characters) and I find that requests take over two seconds to fulfill. Is this normal? Is there a way to reduce the processing time?
0
votes
1 answer

Real-Time Personally Identifiable Information (PII) Detection

I have a project that involves free text user input (strings of less than 80 characters) and I need to detect PII within that string. This all needs to happen in real-time as we need to send a response to the user input (within 2 seconds or so)…
Andrew Xia
  • 365
  • 1
  • 11
0
votes
1 answer

How can you scrub PII from a URL when using GA via GTM?

It's supposed to be done, and in plain Google Universal Analytics, it should be a simple matter of setting the location: ga('set', 'location', sanitisedLocation); But in GTM, of course, there is no place in the code snippet where the ga variable…
Walf
  • 8,535
  • 2
  • 44
  • 59
0
votes
1 answer

Encryption Algorithms to Store UII & PII using Java Technologies

What type of algorithms (e.g. AES) are useful for encrypting / storing a user's personally identifiable information (PII) and uniquely identifiable information (UII) using Java technologies? e.g. What are the standard ways to encrypt / store Social…
PacificNW_Lover
  • 4,746
  • 31
  • 90
  • 144
0
votes
2 answers

PII violation emails even while its being fixed and shows no PII in reports

I used customTask in Universal Analytics tags via tag Manager to tackle PII. After that, I regularly monitored reports in Google Analytics and found all the hits were cleaned.(i.e. PII redacted) But I still get emails from…
0
votes
3 answers

What is risk of exposing PII information in dataLayer for GTM?

For logged-in users on my site, I want to expose customer email address and name in our dataLayer for each page so that GTM can push these variables to various third parties via their tags, such as Fullstory and Intercom. This will make it easier…
oridley
  • 1
  • 1
  • 1
0
votes
1 answer

How safe is storing a cryptographic hash of sensitive information?

Trying to find a way to reduce duplicate contact entries in a system. Names, email addresses, home addresses, and phone numbers can change, so those aren't 100% unique identifiers. However, date of birth and SSN do not change. I'm thinking about…
Dan L
  • 4,319
  • 5
  • 41
  • 74
0
votes
1 answer

I am getting PII on a Query string in Google Analytics - how can I find out the source of it?

I am getting personally identifiable information on pages which contain a query string of; www.examplesite.com/session?authenticity_token=EXAMPLE@EXAMPLEEMAIL.com Does anyone know what an authenticity token is and when they are commonly used?
Daniel Lee
  • 16
  • 6
0
votes
2 answers

Use Powershell to find SSN's in Word and Excell Documents

I am very noob to Powershell and have small amounts of Linux bash scripting experience. I have been looking for a way to get a list of files that have Social Security Numbers on a server. I found this in my research and it performed exactly as I…
Stephen Cochran
  • 691
  • 5
  • 5
0
votes
1 answer

With what key should personal information be encrypted?

I am making a website with PHP, and I need to store personal information about a user (name, address, phone number) in a MySQL database. The information will be shown to the user. I am planning to use AES encryption to encrypt the data. Using the…
FalconC
  • 1,358
  • 2
  • 14
  • 22
0
votes
1 answer

In WCF or at machine level, where can I found the list of Known Pii

To log known Personally identifiable information in windows one can configure machine.config file as below...
Milan Raval
  • 1,880
  • 1
  • 16
  • 33