Personally identifiable information or PII is susceptible to several threats and risks. The cybercriminals and hackers mainly target the sensitive information that is present in the cloud storage of the organization. They can misuse the data. The data might also be lost because of their wrong activities. PII can be lost also because of lost hard drives, equipment as good documents along with cyber attacks. If PII is stolen or lost then it can cause financial loss and also harm the reputation of the organization. A data breach can harm the organization in several ways. Therefore, it can be said that it is essential to develop strong governance policies in the organization for protecting the personally identifiable information of the users. The governance of PII is a complex process and must be well planned and implemented. PII governance forms an essential and integral part of managing PII as well as digital identities. This also helps in social progress as well as economic development. PII foundation forms the basis for a secure organization as well as a cloud platform. The digital identity of the organization can be made effective by implementing strong governance policy for protecting the PII. Initially, the PII dealt with the telephone numbers of the people. With the growth of technology, people are able to access and process data at a faster speed. This has also led to the increase in loss of data and therefore the personally identifiable information is subjected to various risks and threats. The data loss can be divided into two categories called intentional and unintentional data loss. Accidental loss of data is not much harmful because there are no malicious intentions behind such loss. The data loss can be caused due to the carelessness of the employees and some kind of errors that are made by the employees. These employees do not have any wrong intention to harm the organization. Lack of strong security policies can also cause accidental loss of data. The other type of threat is the deliberate threat that can harm the organization in a severe manner. The exposure of this risk is high because there are malicious intentions behind such attacks. These attacks can be either external or internal. PII can contain sensitive information like name, address, phone numbers and financial details of the user. It can also contain health-related information and payroll information of the employees of the organization. Preventive measures must be taken in order to protect these valuable data from any types of attacks. There can be malware attacks like virus attacks, worms, phishing attacks and Trojan horse attacks as well. Spyware can enter the system and quietly steal data from the system. Data must be protected in a proper manner in order to protect the reputation of the company as well as the sensitive data of the users. Therefore, a proper strategy must be implemented for the governance of PII and for protecting the digital identity of users of My License portal. The governance plan is discussed below.
The governance plan or strategy for contractors is discussed below.
Schwartz, P. M., & Solove, D. J. (2014). Reconciling personal information in the United States and European Union. Cal. L. Rev., 102, 877.
Shatnawi, A. (2017). Estimating Accuracy of Personal Identifiable Information in Integrated Data Systems.
Tucker, C. E. (2014). Social networks, personalized advertising, and privacy controls. American Marketing Association.
Wu, D., & Shan, S. (2015). Meta-analysis of network information security and Web data mining techniques. In First International Conference on Information Sciences, Machinery, Materials and Energy (pp. 1974-1977). Atlantis Press.
Yang, Y. P. O., Shieh, H. M., & Tzeng, G. H. (2013). A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Information Sciences, 232, 482-500.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download