Personally Identifiable Information (PII) Protection

Personally Identifiable Information (PII) sits at the center of US data protection law, regulatory enforcement, and organizational security practice. This page covers the legal definition of PII, the technical and administrative controls that govern its handling, the sector-specific contexts where PII protection requirements differ materially, and the boundary decisions organizations face when classifying data for protection purposes. The scope spans federal and state regulatory frameworks, applicable standards bodies, and the operational structure of PII security programs as documented in the Data Security Providers.

Definition and scope

The National Institute of Standards and Technology (NIST) defines PII in NIST Special Publication 800-122 as "any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any information that is linked or linkable to an individual, such as medical, educational, financial, and employment information."

Two distinct categories structure most classification frameworks:

The distinction is operationally significant. Directly identifying PII triggers the most stringent handling controls across federal frameworks including the Privacy Act of 1974 (5 U.S.C. § 552a), while linkable data classification depends on contextual analysis and the aggregation risk — the degree to which combining fields raises re-identification probability.

Federal sector-specific frameworks impose additional definitional layers. The Health Insurance Portability and Accountability Act (HIPAA) defines Protected Health Information (PHI) across 18 enumerated identifiers under 45 CFR § 164.514. The Gramm-Leach-Bliley Act (GLBA) governs "nonpublic personal information" (NPI) for financial institutions under 16 CFR Part 313. State law adds further scope variation: the California Consumer Privacy Act (CCPA), codified at Cal. Civ. Code § 1798.100, extends protection to households and devices in addition to natural persons — a broader scope than most federal definitions.

How it works

PII protection programs operate across four discrete phases:

  1. Data inventory and classification — Identifying where PII resides across systems, databases, cloud environments, and physical records. NIST SP 800-122 recommends a formal PII inventory as the foundation for all subsequent risk management. Classification assigns sensitivity tiers based on re-identification risk, regulatory category, and potential harm from unauthorized disclosure.

  2. Risk assessment — Evaluating threats and vulnerabilities specific to each PII category. The NIST Privacy Framework (Version 1.0) provides a structured approach through its Identify-Govern-Control-Communicate-Protect function model, which maps organizational privacy risk to specific control requirements.

  3. Control implementation — Applying technical, administrative, and physical safeguards calibrated to PII sensitivity. Technical controls include encryption at rest (AES-256 is the standard specified in FIPS 197), access control enforcement, data masking, and tokenization. Administrative controls include data minimization policies, purpose limitation, retention schedules, and workforce training. Physical controls cover secure storage, media sanitization per NIST SP 800-88, and facility access restrictions.

  4. Monitoring, incident response, and reporting — Continuous monitoring for unauthorized access or exfiltration, supported by logging and alerting. Breach notification obligations under laws including the FTC's Health Breach Notification Rule (16 CFR Part 318) and state breach notification statutes — all 50 US states maintain such statutes — establish mandatory timelines and scope for notifying affected individuals and regulators.

Common scenarios

PII protection requirements manifest differently across industries and operational contexts. The provides additional framing for how these sectors are catalogued.

Healthcare — Covered entities and business associates under HIPAA must implement the Security Rule's administrative, physical, and technical safeguard requirements for electronic PHI (ePHI). The HHS Office for Civil Rights (OCR) enforces HIPAA; civil monetary penalties can reach $1.9 million per violation category per year (HHS OCR Civil Money Penalties).

Financial services — GLBA-covered institutions must deliver annual privacy notices, honor opt-out rights for information sharing, and implement a formal information security program under the GLBA Safeguards Rule (16 CFR Part 314). The FTC enforces Safeguards Rule compliance for non-bank financial institutions.

Federal agencies — The Privacy Act of 1974 and the E-Government Act of 2002 require System of Records Notices (SORNs) for any federal system maintaining PII, along with Privacy Impact Assessments (PIAs) for new or substantially modified systems. OMB Circular A-130 establishes the governance framework for federal PII management.

Consumer-facing businesses — CCPA grants California residents the right to know, delete, and opt out of the sale of personal information. Virginia's Consumer Data Protection Act (CDPA), effective January 2023, and Colorado's Privacy Act (CPA) add comparable rights frameworks with distinct enforcement structures.

Decision boundaries

Classification decisions at the PII boundary involve three recurring judgment points:

Aggregation threshold — Two individually non-sensitive fields can constitute high-risk PII when combined. A ZIP code alone is not PII; a ZIP code paired with birth date and sex can re-identify individuals with statistically high confidence, a finding documented in research cited by NIST SP 800-188 on de-identification. Organizations must evaluate field combinations, not isolated data elements.

Pseudonymization vs. anonymization — Pseudonymized data (tokenized or key-coded so the original identity can be restored with a separate key) remains PII under GDPR (Article 4(5), EUR-Lex) and is generally treated as PII under US frameworks unless full de-identification meets the statistical standards in NIST SP 800-188 or HIPAA's Safe Harbor method under 45 CFR § 164.514(b). Truly anonymized data — where re-identification risk is negligible — falls outside PII protection scope, but the burden of demonstrating that standard is high.

Business associate and third-party scope — PII obligations extend to vendors, contractors, and processors who receive PII. Under HIPAA, Business Associate Agreements (BAAs) are legally required before PHI is shared with a third party. Under the GLBA Safeguards Rule, covered institutions must contractually require service providers to implement appropriate safeguards. These obligations are documented in detail through the resource structure described here.

The operational distinction between a data controller (the entity that determines the purpose and means of processing) and a data processor (the entity that processes on behalf of a controller) — a classification central to GDPR and increasingly adopted in US state privacy law — determines which party bears primary regulatory liability when PII is mishandled.

References

 ·   ·