Is Personally Identifiable Information (PII) Pervasive on Your Company’s Computers?


One of the unintended consequences of the information age is the availability of Personal Identifiable Information (PII). The combination of name, date of birth, and Social Security Number are the keys to the kingdom for the purposes of establishing false identity and fraud. Lost laptops, network break-ins, and phishing expeditions have led governmental entities to establish a patchwork quilt of laws requiring custodians of personal information to provide safeguards and assurance that PII is secure.

In this complimentary white paper, you will learn from our leading consultants:

•What is PII?

•Ramifications of mismanaging PII

•Challenges locating PII

•How one major corporation has gained control of PII

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Alan Brooks, eTERA Consulting | Attorney Advertising

Written by:


eTERA Consulting on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.