Man working with confidential information on pc
101 Guide
4 min

What Is Personally Identifiable Data? Risks and Vulnerabilities

Posted by Picture of Huw Thomas Huw Thomas

To fully assess an organisation’s risks and vulnerabilities in the management and handling of Personally Identifiable Data, a clear understanding of what constitutes this important clause of EU and now UK GDPR is essential.

It would be fair to say that many organisations are likely to underestimate how much personal data they manage and the risks associated with this.

So What Is Personal Data?

Personal data can be considered any piece of information that someone could use to identify a living person.

Any of the following can be considered personal data:

  • Identity: This includes forename and surname, date of birth or birthday, signature, and gender.
  • Contact Info: This includes personal or work address details, phone number, and email address.
    Personal: This includes bank and or credit card details, passport or driving licence.
  • Professional: This includes details of job title, employment details, salary etc.
  • IT: This includes an individual’s IP address, browsing history, and cookie preferences.

Personal data can also be physical such as a photo, a CCTV image, and fingerprints.

Multiple Data Points And Vulnerability

Colleagues in office discussing solutions to cybersecurity issues

Many organisations will often collect, use, share and store single pieces of information unprotected, which could easily, with the right tools, and with information from other sources, be put together to identify an individual customer or employee.

For such an organisation, Personally Identifiable Information (PII) leakage should be considered a significant information security vulnerability. This vulnerability could be considered critical if any of the information could be used to track, identify or contact a particular individual. This could be any combination or component of the above list.

There is also a sub-category of personal data termed “sensitive data”, this being data requiring greater protection and includes data on an individual’s ethnicity, sexual orientation, medical history etc.

There is often confusion that non-sensitive PII does not need to be secured. As can be seen from the description above, any non-sensitive data could be linked to information from other sources or databases to reveal much more than intended.

46% of organisations suffer damage to their reputations and brand value as a result of a data breach.

— Forbes, 2014

Any organisation which processes Personally Identifiable data must consider the risks of doing so and must have a good understanding of the risks that arise when failing to keep all aspects of PII secure.

As well as the potential financial implications from regulatory bodies, such as the Information Commissioner's Office (ICO), for not securing PII for their customers in breach of GDPR, the reputational damage could be far more damaging to any organisation.

Woman receiving email in kitchen with laptop

It is therefore essential to consider what security measures are in place, particularly in the sending and delivery of such information, to ensure they maintain the confidentiality, integrity and availability of the data they are processing. Protecting this data from hackers and cybercriminals should be integral to any organisation’s customer data and information security management.

Mitigating The Risk

ℹ️ Optimise your data storage and retention strategy by regularly reviewing and purging unnecessary information.

ℹ️ If you need to handle PII within your organisation, it is safest to treat all information as actual or potential sensitive data, ensuring it is secured in transit and at rest.

ℹ️ Implement strict protocols for handling sensitive data, including secure transmission and end-to-end encryption capabilities. Remember - only one piece of information in the hands of a sophisticated hacker can be dangerous. 

ℹ️ Data is particularly vulnerable during transmission - The ICO recommends recipient identification, such as two-factor authentication, as a minimum standard before you permit access to a secured email.

Summary

Professional man on phone in office in front of desktop

While UK GDPR and ICO guidelines are important, they are not the only pieces of legislation that need to be adhered to within your business.

GDPR

Allows data transfer whilst providing safeguards to protect personal data. Empowers the Information Commissioner to levy fines of up to £17m or 4% of global turnover for serious breaches.

Information Commissioner's Office

The ICO is explicit in its warning – ‘Without additional encryption methods in place, the email body and any attachments will also be accessible to any unintended recipient or third party who intercepts the communication.’

It goes on to provide significant ‘best practice’ guidance on encryption - ‘A common type of personal data disclosure occurs when an email is sent to an incorrect recipient.

Data controllers should be aware that encryption will only provide protection to personal data sent by email if the incorrect recipient does not have the means to decrypt the data [e.g., does not have the decryption key]’.

Senior Managers & Certification Regime (SMCR)

Aims to drive personal accountability by promoting improved corporate culture, governance and transparency. Makes senior managers personally accountable for any form of misconduct.

Financial Conduct Authority (FCA)

Uses SMCR and personal accountability of senior management to ensure a code of conduct for all staff in financial services firms [big and small].

National Cyber Security Centre (NCSC)

As part of GCHQ, the NCSC publishes advice on the latest vulnerabilities and risks as well as advice on what security professionals should be doing to protect their organisations & customers.

Implementing protection measures not only helps in saving costs and reducing anxiety, but also often results in savings that surpass the cost of the protection itself.

 

Additionally, these measures often have a positive impact on environmental, social, and governance (ESG) factors, making them an ideal addition to a company's Net Zero goals or corporate social responsibility strategy and messaging.

⬇️ Download the PDF

Further Reading

 

Originally posted on 17 02 23
Last updated on December 21, 2023

Posted by: Huw Thomas

Dr. Huw Thomas is Beyond Encryption's resident data and compliance expert. He is key to our information security decisions and procedures, both for our products and in our daily operations as a company.

Return to listing