Organisation needs to control and collect the alternative for collecting the data and storing it with extensive security. However, PII needs to have the stronger protection and procedures of handling the secure data. Concerns regarding PII are being risen from past years as this is increasing the chance of being a loss of theft with securing the personal information in the charity.
It is necessary for an organisation to have the federal requirements in the form of developing, documenting and implementing programs that protect the information system. This policy is concerned with supporting the operations. This is effective to issue the guidance that is concerned with operating the information with unauthorised access, use and protection of the information Pentland et.al. (2016). Also, audit is needed to be kept regarding identifying the security breaches and develop policies against identifying these breaches.
PII should be identified on all the systems that include databases, shared network drivers and backup tapes. It must display the characteristics of having a domain name, personal identification number, and address information such as street address with the personal characteristics of securing with the person fingerprint, handwriting, biometric; etc to that’s the organisation is being offered access. In order to minimise the cause of breach, it is necessary for reviewing the current holdings of PII timely, reduce PII holdings to have the schedule of PII holdings and establishing the plan for using social security numbers (SSN).
Encryption: It is the well-known strategy for preventing the data loss that will protect the business from cybercriminals, assessing sensitive data and making mistake. Encryption is almost done regarding protection of intellectual property, maintaining financial records, customer data, etc. In outlook, email security can be selected within the setting and encryption is being done with the trust centre Arroyo et.al. (2015).
Figure 1: Email encryption
Avoid uploading a sensitive document to cloud: There are different cloud services such as Google drive, Box.com and icloud may be using automatic backups. It is necessary for an organisation to perform the audit of regarding backup of the data and what type of data is being backed up. Backups are the most overlooked steps for protecting the PII and sensitive data. This is needed to be used effectively by IT managers for backup and restore of organisational data.
Figure 2: Backing up data
Use firewall and antivirus: Firewall is also the wall against securing the data that act as the barrier between internet connection and the device. The firewall will protect PII that will examine the content and data packets where it should be sent. Antivirus is the solution that compiles a database that will obtain access to your device and sensitive data Sher-Jan et.al. (2017). Along with this malware support to create a layered defence with the security that will lead to multiple protections of the data and PII.
Holistic approach to PII protection
Consider ISO 27001 that is the information security management standard that helps in guidance to development, implementation and maintenance of the security management system. Data encryption, staff training, policies and procedures are concerned elements of the PII protection. It is necessary for an organisation to monitor where PII is being stored, know who sees the data, creating policies of data handling, educating users and having the encryption of desktop and mobile devices Holt and Malčić, (2015.).
Holding a PhD degree in Finance, Dr. John Adams is experienced in assisting students who are in dire need...
55 - Completed Orders
Canada, Toronto I have acquired my degree from Campion College at the University of Regina Occuption/Desi...
52 - Completed Orders
Even since I was a student in Italy I had a passion for languages, in fact I love teaching Italian, and I...
102 - Completed Orders
To work with an organization where I can optimally utilize my knowledge and skills for meeting challenges...
109 - Completed Orders
JOB OBJECTIVE Seeking entry level assignments in Marketing & Business Development with an organization...
202 - Completed Orders
Current work profile Project manager- The Researchers Hub (2nd Jan 2016 to presently working) Researc...
20 - Completed Orders
Sales Assistant, Mito Marina Assigned to the Stationery dept – assisted in merchandising, stock taking...
100 - Completed Orders