Sensitive PII is information that can be utilized to identify an individual and that could potentially be used to harm them if it fell into the wrong hands. Some accounts can even be opened over the phone or on the internet. Whether youre supplementing your training in DCWF Orientation or coming back for a refresher, this learning game is designed to test your knowledge of the Defense Cyber Workforce Framework (DCWF). The document explains the importance of protecting the confidentiality of PII in the context of information security and explains its An official website of the United States government, Security Testing, Validation, and Measurement, National Cybersecurity Center of Excellence (NCCoE), National Initiative for Cybersecurity Education (NICE), Federal Information Security Modernization Act. This course was created by DISA and is hosted on CDSE's learning management system STEPP. A full list of the 18 identifiers that make up PHI can be seen here. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) Safeguards are used to protect agencies from reasonably anticipated. The launch training button will redirect you to JKO to take the course. Product Functionality Requirements: To meet technical functionality requirements, this product was developed to function with Windows operating systems (Windows 7 and 10, when configured correctly) using either Internet Explorer . System Requirements:Checkif your system is configured appropriately to use STEPP. PDF How to Safeguard Personally Identifiable Information - DHS In some cases, all they need is an email address. %PDF-1.4 % PII is any information that can be used to identify a person, such as your name, address, date of birth, social security number, and so on. Handbook for Safeguarding Sensitive Personally Identifiable Information. %%EOF A lock () or https:// means you've safely connected to the .gov website. Learning Objectives:This course is designed to enable students to: Target Audience:DOD information system users, including military members and other U.S. Government personnel and contractors within the National Industrial Security Program.
John Deere 1025r Loader Attachments,
Laredo Police Department Officers,
Royal Caribbean Costa Maya Excursions,
Parkside Estates Wheatfield Ny,
Articles I