Loading...
You are here:  Home  >  'personally identifiable information'
Latest

Use Artificial Intelligence to Streamline GDPR Compliance

By   /  September 13, 2017  /  BI / Data Science Articles, BI / Data Science News, Articles, & Education, Data Articles | Data Science, Business Intelligence, & More, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Articles, Database Articles, Database News, Articles, & Education, Education Resources For Use & Management of Data, Enterprise Information Management, Information Management Articles, Smart Data Articles, Smart Data News, Articles, & Education  /  No Comments

It’s the morning of May 18, 2018 and you arrive at your desk to find a message from a former job applicant in Germany asking for an inventory of all Personally Identifiable Information (PII) you have for him, and a request to delete all his information. There’s also a notice from IT saying they have […]

Read More →
Latest

The Weakest Link in Personally Identifiable Information

By   /  March 9, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author Cathy Nolan. Most of you will be familiar with the famous line written by Walt Kelly for his comic strip “Pogo,” and reproduced many times, which states, “We have met the enemy and he is us.”  When it comes to personal data security, we can definitely say we […]

Read More →
Latest

PII – It’s Not a Greek Fraternity or a Math Symbol

By   /  July 17, 2015  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

by Cathy Nolan Buzzing around the fringes of Data Security and ready to sting your organization is the acronym, PII. According to Wikipedia, personally identifiable information (PII), or Sensitive Personal Information (SPI), are used in US privacy law and information security, and is information that can be used on its own, or with other information, to identify, contact, or […]

Read More →