Mishandling PII: The Risks and Consequences

Cole PrudenData Protection, GDPR, In-House Protection Software, Personal Data Protection, PII, Security, Sensitive Data Protection

a title image for a blog post mishandling PII the risks and consequences by PII Tools

Fines, penalties, fees… Oh my! But by mismanaging PII, we stand to lose more than just money. It’s time to look at what’s at stake and learn how to avoid these numerous pitfalls. It’s All About the Money Unfortunately, for many people and companies, the only time they actually start to care is the moment their wallet gets involved. Taking … Read More

How to: Protecting ePHI

Cole PrudenPII, Sensitive Data, Sensitive Data Discovery

title image for blog post Protecting ePHI by PII Tools

The average healthcare breach exposes 3+ million private patient records. What are you doing to discover, store, and protect ePHI? Why the ‘e’ in ‘ePHI’? HIPAA, PHI, PII, GDPR, ePHI… Where would we be without our acronyms? If you’re interested in protecting ePHI, it’s safe to say none of these are entirely new to you. The most important to our … Read More

How To: Understanding RoPA and Achieving Compliance

Cole PrudenData Discovery, GDPR, GDPR Compliance, Private Data

an infographic for GDPR for PII Tools

Did you know the GDPR has 99 different articles and over 250 pages? You’ll likely never know each provision individually, but there’s at least one article worth paying extra attention to. Meet Article 30: RoPA. The GDPR If you’re the kind of person interested in articles about sensitive data and compliance, we sure hope you’re already well aware of the … Read More

PII Examples

Cole PrudenPersonal Data, PII, PII Examples

An illustrative image of PII examples by PII Tools

Below you’ll find a list of made up PII examples to help you better understand what PII looks like in the real world. You’ll also find a downloadable file attached to each point with specified (fake) PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, First name, … Read More

The Complete Guide to PII

Cole PrudenPersonal Data, PII, PII Examples

An example of PII data by PII Tools

Ever wondered what’s the difference between PII and personal data? Maybe you wanted to see a list of PII types and its examples? Not sure when regular information turns into PII? Read on to find all the answers and more. PII… Ever Heard of It? To start, let’s get the definition out of the way. PII stands for Personally Identifiable … Read More

How To: Understanding HIPAA Compliance

Cole PrudenHIPAA Compliance, PHI, PII

An illustrative picture with a hippo for HIPAA by PII Tools

For many readers, when they hear the words “the Health Insurance Portability and Accountability Act (HIPAA)”, their eyelids immediately start to droop. But I’m sure getting slapped with an annual $1.5 million fine would wake them up! Whether you’re the one handling the data or the actual patient looking to protect your rights, it’s time to become a HIPAA expert … Read More

How to Identify Leaked Data

Cole PrudenData Leak, Leak Management, Sensitive Data Discovery

An illustrative picture for phishing attacks by PII Tools

A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More