Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
SPIIHandbook_cover_022012
dhsprivacy_safeguardingsensitivepiihandbook_march_2012
Introduction
1.0 The difference between PII and Sensitive PII
1.2 PII That Is Sensitive In Certain Contexts
1.3 Alien Files and Alien Numbers
1.2 PII That Is Sensitive In Certain Contexts
1.3 Alien Files and Alien Numbers
/2.0 Safeguarding Sensitive PII
2.1 Collect Sensitive PII Only as Authorized
2.2 Limit Use of Sensitive PII
2.4 Secure Sensitive PII
3.1 How to Report a Privacy Incident:
3.2 Do Not Further Compromise the Information
2.1 Collect Sensitive PII Only as Authorized
2.2 Limit Use of Sensitive PII
2.4 Secure Sensitive PII
3.1 How to Report a Privacy Incident:
3.2 Do Not Further Compromise the Information
Appendix A: Encrypting a File
/Appendix B: Frequently Asked Questions
These FAQs provide guidelines on how to protect Sensitive PII. You may also consult Appendix C for the Safeguarding Sensitive PII Factsheet, which summarizes these rules.
1. How can I protect Sensitive PII . . .
A. In the office?
B. While traveling?
C. While teleworking?
D. In email or other electronic transfer?/
E. When sending via facsimile (fax)?
F. In the interoffice mail?
G. In the outgoing mail?
H. When mailing overseas?
I. On my office shared drive, SharePoint site, intranet, or public websites?
2. How can I minimize my use of Sensitive PII?
3. Why shouldn’t I store Sensitive PII on unauthorized equipment?
4. How do I secure Sensitive PII that cannot be encrypted, such as paper copies or some external media?
5. What are my responsibilities when requesting or receiving Sensitive PII?
6. When and how should I destroy materials containing Sensitive PII?
These FAQs provide guidelines on how to protect Sensitive PII. You may also consult Appendix C for the Safeguarding Sensitive PII Factsheet, which summarizes these rules.
1. How can I protect Sensitive PII . . .
A. In the office?
B. While traveling?
C. While teleworking?
D. In email or other electronic transfer?/
E. When sending via facsimile (fax)?
F. In the interoffice mail?
G. In the outgoing mail?
H. When mailing overseas?
I. On my office shared drive, SharePoint site, intranet, or public websites?
2. How can I minimize my use of Sensitive PII?
3. Why shouldn’t I store Sensitive PII on unauthorized equipment?
4. How do I secure Sensitive PII that cannot be encrypted, such as paper copies or some external media?
5. What are my responsibilities when requesting or receiving Sensitive PII?
6. When and how should I destroy materials containing Sensitive PII?
Introduction
1.0 The difference between PII and Sensitive PII
1.2 PII That Is Sensitive In Certain Contexts
1.3 Alien Files and Alien Numbers
1.2 PII That Is Sensitive In Certain Contexts
1.3 Alien Files and Alien Numbers
/2.0 Safeguarding Sensitive PII
2.1 Collect Sensitive PII Only as Authorized
2.2 Limit Use of Sensitive PII
2.4 Secure Sensitive PII
3.1 How to Report a Privacy Incident:
3.2 Do Not Further Compromise the Information
2.1 Collect Sensitive PII Only as Authorized
2.2 Limit Use of Sensitive PII
2.4 Secure Sensitive PII
3.1 How to Report a Privacy Incident:
3.2 Do Not Further Compromise the Information
Appendix A: Encrypting a File
/Appendix B: Frequently Asked Questions
These FAQs provide guidelines on how to protect Sensitive PII. You may also consult Appendix C for the Safeguarding Sensitive PII Factsheet, which summarizes these rules.
1. How can I protect Sensitive PII . . .
A. In the office?
B. While traveling?
C. While teleworking?
D. In email or other electronic transfer?/
E. When sending via facsimile (fax)?
F. In the interoffice mail?
G. In the outgoing mail?
H. When mailing overseas?
I. On my office shared drive, SharePoint site, intranet, or public websites?
2. How can I minimize my use of Sensitive PII?
3. Why shouldn’t I store Sensitive PII on unauthorized equipment?
4. How do I secure Sensitive PII that cannot be encrypted, such as paper copies or some external media?
5. What are my responsibilities when requesting or receiving Sensitive PII?
6. When and how should I destroy materials containing Sensitive PII?
These FAQs provide guidelines on how to protect Sensitive PII. You may also consult Appendix C for the Safeguarding Sensitive PII Factsheet, which summarizes these rules.
1. How can I protect Sensitive PII . . .
A. In the office?
B. While traveling?
C. While teleworking?
D. In email or other electronic transfer?/
E. When sending via facsimile (fax)?
F. In the interoffice mail?
G. In the outgoing mail?
H. When mailing overseas?
I. On my office shared drive, SharePoint site, intranet, or public websites?
2. How can I minimize my use of Sensitive PII?
3. Why shouldn’t I store Sensitive PII on unauthorized equipment?
4. How do I secure Sensitive PII that cannot be encrypted, such as paper copies or some external media?
5. What are my responsibilities when requesting or receiving Sensitive PII?
6. When and how should I destroy materials containing Sensitive PII?
Safeguarding Sensitive PII Factsheet_OCT2012
teleworkbestpractices
controllingaccesstotheshareddrive_DHS
← Prev
Back
Next →
← Prev
Back
Next →