Description
Course info
Rating
(20)
Level
Beginner
Updated
Dec 29, 2016
Duration
1h 24m
Description

As society becomes more and more reliant upon the Internet, more and more people are sharing Personally Identifiable Information (PII) across the web. This course, Cyber Security Awareness: Identifying Personally Identifiable Information (PII), will help you learn how to be more secure about the information you share. First, you will look at exactly what makes up PII. Then, you'll explore the legal and regulatory influences that determine what PII is protected. Finally, you'll dive into common PII breach situations and learn about remedies for when your PII has been breached. By the end of this course, you'll have a better understanding in how to protect your PII.

About the author
About the author

Jennifer promotes responsible technology use (25-plus years) as educator, project manager, and consultant with government, industry, and universities (Ball State, Purdue, Regis). Jennifer has led eGovernment and broadband initiatives as Indiana’s director of ecommerce, and wrote Hacking Wireless Access Points and the DLP chapter for best-seller, Data Breach and Encryption Handbook.

More from the author
Section Introduction Transcripts
Section Introduction Transcripts

Introduction
Welcome to this course on Identifying Personally Identifiable Infomration, or PII. My name is Jennifer Kurtz with Mentor Source. I lead graduate courses in cybersecurity and strategic project management for healthcare professionals at Regis University in Denver, Colorado. Writing the chapter on Data Leakage Prevention, or DLP, technology for the American Bar Association's Data Breach and Encryption Handbook, which was a bestseller, led me to further exploration of privacy issues that I had started while doing graduate studies at Purdue University. Being grandmother to digital natives, children who play online Pokemon games before they learn to play checkers, has encouraged even deeper questioning about how and why PII is captured by businesses and governments alike. Sometimes that PII capture is for a specific limited purpose. I can accept that, what I can't accept is that my PII is a commodity to be traded by others for profit or misuse. In this course we will look at how PII is formed, what your PII is worth in the marketplace, who pays for it, and how to protect and even hide it. I hope you find the material useful.