Nonetheless, internet breach occurs routinely; further steps need to be taken.
Options for resolving these issues
Part of the issue revolves around ambivalent ways of defining PII as well as the fact that the constructs of identity are still in flux. PII, at one moment, can become non-PII during the next, and the reverse is the case, too. Moreover, computer science has shown that, in many instance, data that is consider non-PII and, therefore, not regulated, has been used to identify a person and that this data should, theorem, be called PII. The definition of PII, accordingly, transcends boundaries, and may be difficult to pin down. Given its malleability, some observers have even suggested altogether rejecting PII as the tool for defining privacy law.
The first issue, therefore (it seems to me) is to start off with a clear definition of PII and here we may adopt the approach of Schwartz and Solove (2011) who recommend that rather than PII being dropped, we adopt a new standard (not a rule) called "PII 2.0," that measures constructs of identity along a continuum. This would also, incidentally, work towards safeguarding more vulnerable individuals since data can be included / omitted at one's discretion. Moreover, this new construct, PII 2.0, would be divided into two categories. One category would be information that identifies the individual, whilst the other category would be information that could be traced back to the individual. Government and departments (as well as institutions) would know how to protect the individual depending on which of these two categories the information falls into.
The suggestion of Schwartz and Solove (2011) agrees with the findings of the OMB which decided that sensitivity of the case hinges on context. Not every case is sensitive (an HIV case for instance may be more sensitive than another). More so, the accumulation of data increases the sensitivity of the case. It may be, therefore, that in sensitive cases data can be retained to the essential minimum that, whilst helping the government and institution (such as medical institution, would also better protect the individual in question (Johnson III, 2007). or, one can use the proposal of Schwartz and Solove (2011) of dividing into two categories.
Conclusion
Personally Identifiable Information (PII)...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now