Personally Identifiable Information (PII)
Internet-based, self-paced training courses
and Safeguarding Personally Identifiable Information (PII)
This course starts with an overview of Personally Identifiable Information (PII), and protected health information (PHI), a significant subset of PII, and the significance of each, as well as the laws and policy that govern the maintenance and protection of PII and PHI. The course is designed to prepare DoD and other Federal employees to recognize the importance of PII, to identify what PII is, and why it is important to protect PII. The Federal government requires the collection and maintenance of PII so as to govern efficiently. However, because PII is sensitive, the government must take care to protect PII, as the unauthorized release or abuse of PII could result in potentially grave repercussions for the individual whose PII has been compromised, as well as for the federal entity entrusted with safeguarding the PII. This course explains the responsibilities for safeguarding PII and PHI on both the organizational and individual levels, examines the authorized and unauthorized use and disclosure of PII and PHI, and the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection. This training is intended for DoD civilians, military members, and contractors using DoD information systems. This course may also be used by other Federal Agencies.
Training videos, usually in 10 minutes or less, that allows you to refresh your knowledge of a critical topic or quickly access information needed to complete a job
Phishers are looking to lure you with bogus emails and pop-ups that seem safe. Will you take the bait or live to swim another day?
Case of the Cyber Criminal
Learn how to protect yourself and your personal information online.
This interactive presentation provides an introduction to social networking for Department of Defense (DoD) information system users. The presentation acknowledges the positive aspects of social networking, but also familiarizes users with some of the risks associated with social networking services, especially as military, civilian, or contractor members of the DoD.
Protect your computer from spyware and viruses that can cause it to run slowly or give fraudsters access to your personal information.
Provides an opportunity to practice identifying what constitutes a suspicious email, while increasing awareness about the importance of reporting suspicious contacts.
Repositories of role-based resources that serve as one-stop shops for security essentials
This toolkit will quickly point you in the direction of resources to help protect your identity.