Whitepaper: Using Information Stewardship within Government to Protect PII - 71002

Report Details

Loss and theft of Personally Identifiable Information (PII) from government, military and defense organizations continues to be a significant problem. Given the amount of attention to this area and the wealth of standards and technology available – why do these leaks still occur? This document considers the sources of leakage and describes how better information stewardship based on information centric security is essential to manage these risks. 

According to the National Institute for Standards and Technology (NIST), examples of PII include, but are not limited to:

Name, such as full name, maiden name, mother‘s maiden name, or alias;

Personal identification number, such as social security number (SSN), passport number, driver‘s license number, taxpayer identification number, or financial account or credit card number;

Address information, such as street address or email address;

Personal characteristics, including photographic image (especially of face or other identifying characteristic), fingerprints, handwriting, or other biometric data (e.g., retina scan, voice signature, facial geometry);

Information about an individual that is linked or linkable to one of the above (e.g., date of birth, place of birth, race, religion, weight, activities, geographical indicators, employment information, medical information, education information, financial information)...

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Feb 25, 2013

Whitepaper: Using Information Stewardship within Government to Protect PII - 71002

Loss and theft of Personally Identifiable Information (PII) from government, military and defense organizations continues to be a significant problem. Given the amount of attention to this area and the wealth of standards and technology available – why do these leaks still occur? This…

€295.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Executive View

Executive View: Boldon James – Data Classification - 72508

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that…

Advisory Note

Advisory Note: Information Stewardship in the Age of Blockchain - 71602

Blockchain seems to be one of the most important basic technologies of emerging business models and countless entrepreneurial initiatives using it have been started in the recent past. This report provides insights and a closer look at how blockchain technology is most probably improving…

Executive View

Executive View: Big Data and Information Stewardship - 70744

Big Data provides many opportunities to solve emerging business challenges and Big Data technologies can create business value. However Big Data also creates security challenges that need to be considered by organizations adopting or using Big Data techniques and technologies. This paper…

Whitepaper

Whitepaper: Information Classification: Information Stewardship in Practice - 70740

Information stewardship uses good governance techniques to implement information centric security for all of your data. Information Stewardship involves the business as well as the IT services group. It creates a culture where the people in the organization understand the sensitivity of…

Advisory Note

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00