Close

What is Personally Identifiable Information (PII)

 

 

 

Get Tax Account Monitoring, Audit/Tax Problem Protection and

 

 

SO MUCH More with Audit Alarm

What is Personally Identifiable Information (PII)

 

You often see the acronym PII used when discussing security, privacy, and data breaches.  It stands for Personally Identifiable Information.  This is personal data that can be used to uniquely identify a specific individual.  

The National Institute of Standards and Technology (NIST) defines PII as information that can be used to distinguish or trace the identity of an individual (e.g., date and place of birth, mother’s maiden name, etc.).  This can be done either directly or in combined with other personal or identifying information that is linkable to a specific individual

If you’ve been following the news about identity theft, data breaches, ransomware attacks, and personal or online privacy, you probably noticed personally identifiable information is often discussed.  While this term might seem simple, it’s more complicated than you think.  The compromise of your PII can significantly harm your personal and financial profile.

PII is significant because it is how identity thieves perpetrate their crimes.  Whether your data is lost, stolen, or simply exposed, it is gold to identity thieves.  Some PII is considered more valuable.  Sometimes all that is needed is one or two pieces of information to steal a person’s identity.

The following are the data usually sought by fraudsters;

  • Social Security number
  • Bank account number
  • Driver’s license number
  • Physical address
  • Full name
  • Date of birth.

These thieves also look for medical, educational, financial, employment, and other information that can be used to identify you or when combined with additional information.  The list is not exhaustive.

 

What Type of Information is Considered Personal Identifiable Information?

Some bit of information are unique to you and you alone.  This type of PII, is often referred to as “sensitive.”  This sensitive data are what identity thieves are most interested in capturing.

Sensitive data includes:

  • Personal identification numbers: These are items like Social Security number (SSN), driver’s license number, passport number, taxpayer identification number, patient identification number, financial account number, or credit card number
  • Personal address information: street address or email address
  • Personal telephone numbers: home phones or mobile phones
  • Protected health information (PHI): medical record numbers, medical histories, test results, health insurance beneficiary numbers, or payment information for healthcare services
  • Payment Card Industry (PCI) Data: credit card numbers, bank card numbers or financial account numbers
  • Personal characteristics: These are photographic images (particularly of face or other identifying characteristics) or handwriting
  • Biometric data:  These are items such as fingerprints, retina scans, voice signatures, or facial geometry
  • Information identifying personally owned property: These are items such as Vehicle Identification Number (VIN) or vehicle title number
  • Asset information: Internet Protocol (IP) address or Media Access Control (MAC) ID are typically link to a specific person

Other pieces of data by themselves aren’t considered PII but when combine with other information can be significant.  This information has become known as “linkable information.” Combining them or linking them to one of the above examples can be equally appealing to fraudsters…and equally harmful if exposed.  This type of PII may include your:

  • Place of birth
  • Date of birth
  • Race
  • Religion
  • Medical information
  • Education information
  • Financial information
  • Geographical indicators
  • Employment information
  • Business telephone number
  • Business mailing or email address

What Do Criminals Do with PII?

There are many malicious ways that cybercriminals and identity thieves use your PII.  First, they can use your information to apply for loans, or make froaudulent purchases using your credit cards information, steal your tax refunds, drain your financial accounts, or more.

Another way that Personally Identifable Information may be used is to commit synthetic identity theft.  .  According to the FBI, synthetic identity theft is the fastest-growing financial crime in the U.S.  Fraudsters create a Synthetic identity by combining one person’s Personally Identifiable Information with the fake details and/or personal information from another individuals data.  Here is an example, one individual’s Social Security number might be combined with a phony name and address as well as a third persons real person’s driver’s license to create a completely new identity

The third-way criminals may use PII is by selling your stolen data on the Dark Web.  Items marketable on the Dark Web are items such as your social media credentials, credit card numbers, medical records and Netflix passwords, can all be sold by bad actors.  These fraudsters can make a pretty penny by capturing and selling our data.

 

How does Audit Alarm Protect My Tax Account and Help Prevent Tax-Related Identity Theft

Audit Alarm is a modern Tax Account Monitoring and tax-related identity theft protection company.  Since 2005, Legacy Tax & Resolution Services has been a leading provider of proactive tax account monitoring and consumer identity theft protection services.  We leverage unique data, science, and patented technology and provide tax identity threat detection, proactive tax account alerts, and comprehensive resolution services.

 

Learn More

 

Complete Credit & Consumer Identity Protection, also available (not included)

 

See

Audit Alarm Terms of Sale

Audit Alarm Privacy Policy

Audit Alarm Service Terms & Conditions

Audit Alarm Cancellation, Return, and Refund Policy

Audit Alarm Legal Information and Resources

Audit Alarm Privacy Center

 

Find Out More

Audit Alarm FAQs

Audit Alarm | IRS Tax Account Monitoring | IRS Transcript Monitoring | Tax Identity Theft Protection | Tax Audit Protection

Audit Alarm Plans and Pricing

Audit Alarm Disclosures and Limit of Service

Tax Audit Protection  |  Tax Problem Protection

Dependent Tax Account Monitoring | Dependent IRS Transcript Monitor | Dependent Tax ID Theft Protection

Senior Tax Account Monitoring  |  Senior IRS Transcript Monitoring  |  Senior Tax ID Theft Protection  |  Senior Tax Audit Protection

Tax-Related Identity Theft Prevention  |  Tax Scam Avoidance

Payroll Tax Fraud – How to Minimize the Threat for Business Owners

Audit Alarm Services Comparison to the Competition

Audit Alarm Enroll Now

 

What is Identity Theft

When Should You File an Identity Theft Affidavit

How Do I Obtain an IRS Identity Protection Pin

Identity Theft Reports by State and Metropolitan Area

Early Warning Signs of Tax Identity Theft and What You Should Do to Protect Yourself

7 Tips to Reduce the Risk of Tax Identity Theft

Identity Protection and Credit Monitoring

Identity Protection and Credit Monitoring- Plans and Pricing

Identity Protection and Credit Monitoring- Plan Features Explained

 

What is Identity Theft

When Should You File an Identity Theft Affidavit

How Do I Obtain an IRS Identity Protection Pin

Identity Theft Reports by State and Metropolitan Area

Early Warning Signs of Tax Identity Theft and What You Should Do to Protect Yourself

7 Tips to Reduce the Risk of Tax Identity Theft

Identity Protection and Credit Monitoring

Identity Protection and Credit Monitoring- Plans and Pricing

Identity Protection and Credit Monitoring- Plan Features Explained

 

 

 

Track Your Refund

 
Track Federal Refund Check Federal Amended Return Refund

Check your State Refund

Client Login

 

Refer a Friend

.