Or they may use it themselves without the victims knowledge. [CDATA[/* >*/. Because DOL employees and contractors may have access to personal identifiable information concerning individuals and other sensitive data, we have a special responsibility to protect that information from loss and misuse. The course reviews the responsibilities of the Department of Defense (DoD) to safeguard PII, and explains individual responsibilities. Safeguarding Personally Identifiable Information (PII) - United States Army Unauthorized recipients may fraudulently use the information. The Cyber Excepted Service (CES) Orientation is an eLearning course designed to familiarize learners with the core tenets of the DoD CES personnel system. These attacks show how cybercriminals can use stolen PII to carry out additional attacks on organizations. In the event their DOL contract manager is not available, they are to immediately report the theft or loss to the DOL Computer Security Incident Response Capability (CSIRC) team at dolcsirc@dol.gov. Handbook for Safeguarding Sensitive Personally Identifiable Information. An official website of the United States government. PII is a person's name, in combination with any of the following information: Mother's maiden name Driver's license number Bank account information Credit card information Relatives' names Postal address Thieves can sell this information for a profit. Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and Accountability Act (HIPAA), 1995 Data Protection Directive (95/46/E.C. PII is any personal information which is linked or linkable to a specified individual. Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student educational records. SP 800-122 (EPUB) (txt), Document History: @media only screen and (min-width: 0px){.agency-nav-container.nav-is-open {overflow-y: unset!important;}} Privacy Statement, Stuvia is not sponsored or endorsed by any college or university, Pennsylvania State University - All Campuses, Rutgers University - New Brunswick/Piscataway, University Of Illinois - Urbana-Champaign, Essential Environment: The Science Behind the Stories, Everything's an Argument with 2016 MLA Update, Managerial Economics and Business Strategy, Primates of the World: An Illustrated Guide, The State of Texas: Government, Politics, and Policy, IELTS - International English Language Testing System, TOEFL - Test of English as a Foreign Language, USMLE - United States Medical Licensing Examination. 136 0 obj <> endobj PII/PHI Personally Identifiable Information (PII) is information that can be used to distinguish or trace an individual's identity, either alone or when combined with other information that is linked or linkable to a specific individual. Company Registration Number: 61965243 The launch training button will redirect you to JKO to take the course. COLLECTING PII. It sets out the rules for the collection and processing of personally identifiable information (PII) by individuals, companies, or other organizations operating in the E.U. Safeguard DOL information to which their employees have access at all times. Managing, safeguarding, and evaluating their systems of records Providing training resources to assure proper operation and maintenance of their system(s) Preparing public notices and report for new or changed systems ), Health Information Technology for Economic and Clinical Health Act (HITECH), Encrypting all PII data in transit and at rest, Restricting access to PII data to only those who need it, Ensuring that all PII data is accurate and up to date, Destroying PII data when it is no longer needed. Classification Conflicts and Evaluations IF110.06 Derivative Classification IF103.16 Guidance on the Protection of Personal Identifiable Information The Privacy Act of 1974 is a federal law that establishes rules for the collection, use, and disclosure of PII by federal agencies. or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. PII stands for personally identifiable information. Result in disciplinary actions. Dont Be Phished! Personally Identifiable Information (PII), Privacy Act System of Records Notice (SORN), Post Traumatic Stress Disorder (PTSD) Research, Office of the Administrative Assistant to the Secretary of the Army, Department of Defense Freedom of Information Act Handbook, AR 25-55 Freedom of Information Act Program, Federal Register, 32 CFR Part 518, The Freedom of Information Act Program; Final Rule, FOIA/PA Requester Service Centers and Public Liaison Officer. 0000000016 00000 n Security Awareness Hub - usalearning.gov Washington, DC 202101-866-4-USA-DOL1-866-487-2365www.dol.gov, Industry-Recognized Apprenticeship Programs (IRAP), Bureau of International Labor Affairs (ILAB), Employee Benefits Security Administration (EBSA), Employees' Compensation Appeals Board (ECAB), Employment and Training Administration (ETA), Mine Safety and Health Administration (MSHA), Occupational Safety and Health Administration (OSHA), Office of Administrative Law Judges (OALJ), Office of Congressional and Intergovernmental Affairs (OCIA), Office of Disability Employment Policy (ODEP), Office of Federal Contract Compliance Programs (OFCCP), Office of Labor-Management Standards (OLMS), Office of the Assistant Secretary for Administration and Management (OASAM), Office of the Assistant Secretary for Policy (OASP), Office of the Chief Financial Officer (OCFO), Office of Workers' Compensation Programs (OWCP), Ombudsman for the Energy Employees Occupational Illness Compensation Program (EEOMBD), Pension Benefit Guaranty Corporation (PBGC), Veterans' Employment and Training Service (VETS), Economic Data from the Department of Labor, Guidance on the Protection of Personal Identifiable Information. Before sharing sensitive information, make sure youre on a federal government site. The act requires that schools give parents and students the opportunity to inspect and correct their educational records and limits the disclosure of educational records without consent. 147 11 A lock () or https:// means you've safely connected to the .gov website. <]/Prev 236104>> CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. It comprises a multitude of information. 0000001061 00000 n startxref Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. Federal Information Security Modernization Act; OMB Circular A-130, Want updates about CSRC and our publications? The DoD ID number or other unique identifier should be used in place of the SSN whenever possible. Description:This course starts with an overview of Personally Identifiable Information (PII), and Protected Health Information (PHI), a significant subset of PII, and the significance of each, as well as the laws and policy that govern the maintenance and protection of PII and PHI. They may also use it to commit fraud or other crimes. 0000000516 00000 n DOD Mandatory Controlled Unclassified Information (CUI) Training This course explains the responsibilities for safeguarding PII and PHI on both the organizational and individual levels, examines the authorized and unauthorized use and disclosure of PII and PHI, and the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection. .table thead th {background-color:#f1f1f1;color:#222;} hb```> AX @Lt;8w$02:00H$iy0&1lcLo8y l ;SVn|=K This is information that can be used to identify an individual, such as their name, address, or Social Security number. This includes information like Social Security numbers, financial information, and medical records. The document explains the importance of protecting the confidentiality of PII in the context of information security and explains its An official website of the United States government, Security Testing, Validation, and Measurement, National Cybersecurity Center of Excellence (NCCoE), National Initiative for Cybersecurity Education (NICE), Federal Information Security Modernization Act. The purpose of this lesson is to review the completed course work while reflecting on the role of HR Practitioners in CES organizations. College Physics Raymond A. Serway, Chris Vuille. Secure .gov websites use HTTPS Training Catalog - DoD Cyber Exchange Identify the responsibilities for safeguarding PII and PHI on both the organizational and individual levels Identify use and disclosure of PII and PHI State the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection Delivery Method: eLearning Length: 1 hour This interactive exercise provides practical experience in the processes of cybersecurity risk assessment, resource allocation, and network security implementation. This interactive presentation reviews the definition of personally identifiable information (PII), why it is important to protect PII, the policies and procedures related to the use and disclosure of PII, and both the organization's and individual's responsibilities for safeguarding PII. The CES Operational eGuide is an online interactive resource developed specifically for HR practitioners to reference the following topics: History, Implementation, Occupational Structure, Compensation, Employment and Placement, Performance Management, Performance and Conduct Actions, Policies and Guidance. PII is any information that can be used to identify a person, such as your name, address, date of birth, social security number, and so on. %%EOF .usa-footer .grid-container {padding-left: 30px!important;} PII must only be accessible to those with an official need to know.. SP 800-122, Guide to Protecting the Confidentiality of PII | CSRC - NIST This course may also be used by other Federal Agencies. Handbook for Safeguarding Sensitive Personally Identifiable Information ), which was introduced to protect the rights of Europeans with respect to their personal data. #views-exposed-form-manual-cloud-search-manual-cloud-search-results .form-actions{display:block;flex:1;} #tfa-entry-form .form-actions {justify-content:flex-start;} #node-agency-pages-layout-builder-form .form-actions {display:block;} #tfa-entry-form input {height:55px;} .dol-alert-status-error .alert-status-container {display:inline;font-size:1.4em;color:#e31c3d;} The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely. With these responsibilities contractors should ensure that their employees: Contractors should ensure their contract employees are aware of their responsibilities regarding the protection of PII at the Department of Labor. Learning Objectives:This course is designed to enable students to: Target Audience:DOD information system users, including military members and other U.S. Government personnel and contractors within the National Industrial Security Program. Think OPSEC! Retake Identifying and Safeguarding Personally Identifiable Information (PII). It is vital to protect PII and only collect the essential information. The site is secure. Product Functionality Requirements: To meet technical functionality requirements, this product was developed to function with Windows operating systems (Windows 7 and 10, when configured correctly) using either Internet Explorer . The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Which of the following establishes Written for Institution Central Texas College Course All documents for this subject (1) The benefits of buying summaries with Stuvia: Guaranteed quality through customer reviews #block-googletagmanagerheader .field { padding-bottom:0 !important; } Non-sensitive PII is information that can be used to identify an individual, but that is not likely to be used to harm them if it falls into the wrong hands. Delete the information when no longer required. 2XXi:F>N #Xl42 s+s4f* l=@j+` tA( PDF Cyber Awareness Challenge 2022 Information Security Terms of Use Essential Environment: The Science Behind the Stories Jay H. Withgott, Matthew Laposata. Controlled Unclassified Information (CUI) Program Frequently Asked Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. #block-googletagmanagerfooter .field { padding-bottom:0 !important; } Terms of Use This is a potential security issue, you are being redirected to https://csrc.nist.gov. A full list of the 18 identifiers that make up PHI can be seen here.

What Should My Toe Look Like After Toenail Removal, Lafayette Band Competition, Premier League Fanzone Female Presenters, The Melancholy Mood Of "blood Count" Reflects Which Situation?, Ncaa Basketball Referee Directory, Articles I