skip to main content
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)April 2010
2010 Technical Report
Publisher:
  • National Institute of Standards & Technology
  • Gaithersburg
  • MD
  • United States
Published:01 April 2010
Bibliometrics
Skip Abstract Section
Abstract

The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the context of information security and explains its relationship to privacy using the the Fair Information Practices, which are the principles underlying most privacy laws and privacy best practices. PII should be protected from inappropriate access, use, and disclosure. This document provides practical, context-based guidance for identifying PII and determining what level of protection is appropriate for each instance of PII. The document also suggests safeguards that may offer appropriate levels of protection for PII and provides recommendations for developing response plans for incidents involving PII. Organizations are encouraged to tailor the recommendations to meet their specific requirements.

Cited By

  1. ACM
    Vishwamitra N, Li Y, Hu H, Caine K, Cheng L, Zhao Z and Ahn G Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, (65-76)
  2. ACM
    Baron B and Musolesi M (2020). Where You Go Matters, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4:4, (1-32), Online publication date: 17-Dec-2020.
  3. ACM
    Tonge A and Caragea C (2020). Image Privacy Prediction Using Deep Neural Networks, ACM Transactions on the Web, 14:2, (1-32), Online publication date: 19-Apr-2020.
  4. ACM
    Reaves B, Vargas L, Scaife N, Tian D, Blue L, Traynor P and Butler K (2018). Characterizing the Security of the SMS Ecosystem with Public Gateways, ACM Transactions on Privacy and Security, 22:1, (1-31), Online publication date: 23-Jan-2019.
  5. Liu Y, Song T and Liao L (2019). TPII: tracking personally identifiable information via user behaviors in HTTP traffic, Frontiers of Computer Science: Selected Publications from Chinese Universities, 14:3, Online publication date: 19-Dec-2019.
  6. ACM
    Baudart G, Dolby J, Duesterwald E, Hirzel M and Shinnar A Protecting chatbots from toxic content Proceedings of the 2018 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, (99-110)
  7. ACM
    Xu M, Qian F, Mei Q, Huang K and Liu X (2018). DeepType, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2:4, (1-26), Online publication date: 27-Dec-2018.
  8. Bennett J (2017). The Meanings in the Machine, Computer, 50:9, (112-112), Online publication date: 1-Jan-2017.
  9. Rakos K, Ruffino A, Li C, Mao K, McBee L, McBee R, Molo M, Shah S, Sibley I and Stagge T (2017). Purdue University Team Tackles Global Underwater-Vehicle Competition, Computer, 50:9, (106-110), Online publication date: 1-Jan-2017.
  10. Chung H, Iorga M, Voas J and Lee S (2017). “Alexa, Can I Trust You?”, Computer, 50:9, (100-104), Online publication date: 1-Jan-2017.
  11. ACM
    de Freitas A, Nebeling M, Ranithangam A, Yang J and Dey A Bluewave Proceedings of the 8th ACM SIGCHI Symposium on Engineering Interactive Computing Systems, (38-49)
  12. ACM
    Wang D, Zhang Z, Wang P, Yan J and Huang X Targeted Online Password Guessing Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1242-1254)
  13. Backes M, Berrang P and Manoharan P From Zoos to Safaris--From Closed-World Enforcement to Open-World Assessment of Privacy Tutorial Lectures on Foundations of Security Analysis and Design VIII - Volume 9808, (87-138)
  14. ACM
    Zhang F, Shih F and Weitzner D No surprises Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, (291-296)
  15. ACM
    Malheiros M, Jennett C, Patel S, Brostoff S and Sasse M Too close for comfort Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (579-588)
  16. Halpin H and Cook B Federated Identity as Capabilities Revised Selected Papers of the First Annual Privacy Forum on Privacy Technologies and Policy - Volume 8319, (125-139)
  17. ACM
    Krishnamurthy B and Wills C (2010). On the leakage of personally identifiable information via online social networks, ACM SIGCOMM Computer Communication Review, 40:1, (112-117), Online publication date: 7-Jan-2010.
  18. ACM
    Krishnamurthy B and Wills C On the leakage of personally identifiable information via online social networks Proceedings of the 2nd ACM workshop on Online social networks, (7-12)
  19. ACM
    Layng K Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track Proceedings of the 37th annual ACM SIGUCCS fall conference: communication and collaboration, (223-228)
Contributors
  • National Institute of Standards and Technology
  • National Institute of Standards and Technology
  • National Institute of Standards and Technology

Recommendations