Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information

Author: Erika McCallister

Publisher: DIANE Publishing

Published: 2010-09

Total Pages: 59

ISBN-13: 1437934889

DOWNLOAD EBOOK

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.


Information Security

Information Security

Author: Nancy R. Kingsbury

Publisher: DIANE Publishing

Published: 2010-08

Total Pages: 30

ISBN-13: 1437931049

DOWNLOAD EBOOK

The IRS relies extensively on computerized systems to carry out its demanding responsibilities to collect taxes, process tax returns, and enforce the nation's tax laws. Effective information security (IS) controls are essential to protect financial and taxpayer info. from inadvertent or deliberate misuse, improper disclosure, or destruction. As part of an audit of IRS's FY 2009 and 2008 financial statements, this report assessed: (1) the status of IRS's actions to correct or mitigate previously reported IS weaknesses; and (2) whether controls over key financial and tax processing systems are effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer info. Includes recommendations. Charts and tables.