Data Privacy and Security: What’s the Difference?
Information has always been a form of currency in society—from buying...
Read NowGet an overview of the simple, all-in-one data privacy platform
Manage consent for data privacy laws in 50+ countries
Streamline and automate the DSAR workflow
Efficiently manage assessment workflows using custom or pre-built templates
Streamline consent, utilize non-cookie data, and enhance customer trust
Automate and visualize data store discovery and classification
Ensure your customers’ data is in good hands
Key Features & Integrations
Discover how Osano supports CPRA compliance
Learn about the CCPA and how Osano can help
Achieve compliance with one of the world’s most comprehensive data privacy laws
Key resources on all things data privacy
Expert insights on all things privacy
Key resources to further your data privacy education
Meet some of the 5,000+ leaders using Osano to transform their privacy programs
A guide to data privacy in the U.S.
What's the latest from Osano?
Data privacy is complex but you're not alone
Join our weekly newsletter with over 35,000 subscribers
Global experts share insights and compelling personal stories about the critical importance of data privacy
Osano CEO, Arlo Gilbert, covers the history of data privacy and how companies can start a privacy program
Upcoming webinars and in-person events designed for privacy professionals
The Osano story
Become an Osanian and help us build the future of privacy!
We’re eager to hear from you
Updated: September 23, 2024
Published: March 26, 2024
In the complicated web that is data privacy law, there are a lot of acronyms. There are acronyms for everything from laws and regulations to types of data, roles, frameworks, and more.
Unpacking the meaning of similar concepts—such as personal information (PI) and personally identifiable information (PII)—may seem burdensome, but for businesses tasked with complying with a growing number of regulations, sifting through the nuances is critical to staying compliant.
This blog focuses on PII, its role in the context of data privacy, as well as differences between PII and PI, its relation to various regulations, and how to remain compliant.
As you’ll learn in this blog, different laws define PII differently, but in general, PII is defined as information that can be used to identify a person or trace an individual’s status or activities. These can include data such as:
Let’s look at a common, everyday PII data example: applying for a credit card online. For the credit card issuer to assess your creditworthiness, the application requires a host of information, from your full legal name and address to your social security number, employment details, annual income, and other details. These details are prime examples of PII, as they directly identify you and distinguish you from another individual.
PII is collected by organizations in the course of most activities, from visiting the doctor to shopping, for financial transactions, banking, checking into the gym, and so on.
PII is at the core of data privacy. If PII is lost by an organization, it could cause substantial harm, including identity theft, fraudulent use of the information, or other attacks. Protecting personally identifiable information is critical for preserving Individuals' privacy, retaining their trust, and avoiding painful fines and penalties.
According to the Pew Research Center:
While breaches of PII can have significant impacts on consumers, a breach could also have far-reaching impacts on companies—primarily with hefty fines and reputational damage. To date, the largest fine on record was issued by China’s cybersecurity regulator to a Chinese ride-hailing company for $1.2 billion. In the EU, Meta was fined €1.2 billion for improperly transferring data (including PII) out of the EU. And in the U.S., Sephora was fined $1.2 million for selling/sharing its consumers’ PII without informing them or giving them the opportunity to opt out.
By now, you may be thinking, “But wait, you mentioned PI. What’s the difference?”
Commonly confused, personal information, or PI, is “information that identifies, relates to, describes, is capable of being associated with, or could be reasonably linked (directly or indirectly) with a particular person.” If that definition sounds a lot like the definition of PII data, that’s because there is a significant overlap between the two.
The California Privacy Protection Act (CCPA) uses the term “personal information,” to include other data, such as IP addresses; biometric, location, or audio information; and personal device identifiers. Furthermore, personal information could include data that, when combined with other information, could become PII. As an example, the name “John” is personal information, but is only indirectly linked to a specific individual. There are many Johns out there, after all. Combined with an address or a last name, that PI suddenly becomes PII. It’s not just personal information, it’s personally identifiable information—i.e., information that can be used to identify an individual person.
Like most privacy laws, the GDPR has extraterritorial reach—meaning, if your company operates in the United States and stores or processes PII data of European citizens, it must comply with the GDPR.
The GDPR defines personal data as: "any information relating to an identified or identifiable natural person ("data subject"); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. Note that this definition of personal data is broader than strictly PII.
If personal data is made anonymous (by removing direct and indirect personal identifiers) and cannot be used to identify an individual, it’s no longer considered “personal” under the GDPR. However, even if data has been encrypted and de-identified, if it could later be used to re-identify a person, it is still considered personal data.
GDPR also references “pseudonymization,” or processing personal data in a way in which the data can no longer be attributed to a specific data subject without the use of additional information. Because pseudonymization can eventually be linked back to an individual with the addition of further information, it is considered personal data under the GDPR.
Mirroring the GDPR in many aspects, the California Consumer Privacy Act (as amended by the CPRA) is the most stringent US data privacy law. The CPRA defines personal information as information that “identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.” Adding “household” to its definition is unique to California. Again, this definition of personal information is broader than PII.
Some examples of personal information under the CPRA include:
Publicly available information or lawfully obtained, truthful information that is a matter of public concern and deidentified or aggregate consumer information is not considered personal information.
SPI is a subset of personal information that reveals what the law considers more likely to cause harm if it’s misused, which is why CPRA gives consumers the right to limit the use of their sensitive personal information.
To comply with PII data privacy requirements, organizations that collect personal data about consumers must understand the information they collect; applicable regulations, such as the CCPA, CPRA, GDPR, and others; and how each impacts their operations.
Data mapping helps you understand what PII you have, where it lives, and determine how to best secure data to meet regulations. Organizations must also implement robust measures to safeguard PII, along with a compliance policy and PII security measures, which are all critical to maintaining PII regulation compliance.
We get it. PII is complicated. Software such as Osano’s data discovery tools, PII tracking API and data mapping can help make it less stressful.
Need to track down PII at your organization? Then you need data mapping. Our checklist walks you through all the basics to understand how best to map your organization's data/
Download Now
Osano Staff is pseudonym used by team members when authorship may not be relevant. Osanians are a diverse team of free thinkers who enjoy working as part of a distributed team with the common goal of working to make a more transparent internet.
Osano is used by the world's most innovative and forward-thinking companies to easily manage and monitor their privacy compliance.
With Osano, building, managing, and scaling your privacy program becomes simple. Schedule a demo or try a free 30-day trial today.