Privacy Ref Blog

How easy are you to find using limited personal information?

This weekend I was involved in an event that allowed me to see just how easy it is to find an individual given a minimum of personal information. I knew it would be easy, but how easy was the surprise.

A Friday evening visitor

It began Friday evening during a religious service when an individual approached a house of worship but did not enter. Dressed in fatigues, combat boots, and a military style jacket he was carrying half a loaf of bread; his overall appearance caused some fear to run through the gathered congregation.

A congregational leader went outside and spoke to the visitor to understand why he was there and how we could help. Suffice it to say it was a strange discussion leaving the leader uneasy. However the leader had  gotten a name, email address, telephone number, and town of residence from the visitor during the discussion.

The whole event was suspicious so, as the visitor left the area, the local police were called.

The police response

Given simply the visitor’s name and town, a picture of our visitor was displayed on the police officer’s laptop in minutes. Our local towns have one zip code each, so to me this shows how valuable name and zip code alone can be for marketing purposes.

A few hours later we received a call from the responding officer. He had contacted nearby towns’ police to gather more information and then the visitor himself to successfully close out the event. To me this was just a standard investigation that the police would do without the need  to rely on additional electronic records.

The amateur sleuths find more personal information

Since Friday night some of our congregants have undertaken to learn more about our visitor. Since there is a limit to what the police can share, the congregants wanted to feel safe by gaining more information. Using just the name and town as a starting pointing for their search, the congregants have collected My Space pages, pictures, news items, and other information with each find giving another starting point for the next set of searches. The congregation now has a pretty good understanding of the visitor in case he decides to come to visit again.

Some observations

The information used by the police to find, understand, and communicate with the visitor was no different than that which would have been done 20, 30, or even 50 years ago. The only difference was how the information was stored and accessed thereby making the process much faster.

However, the search for information by congregants was certainly aided by technology. More importantly, the technology itself enabled the visitor to provide the information himself, have his friends and acquaintances provide the information (with or without his permission), and allowed businesses to provide information as well.

Self disclosure is an individual decision and each of us needs to decide how comfortable we are with sharing personal information. However, a business  must decide how much it wants to contribute to the public profile of its customers, employees, and other stakeholders.

It is critical for a business to determine a policy on this subject then do an inventory of personal information used in the business. This inventory should determine when the personal information is collected, how it is processed, how it is stored, how it is transmitted, how it is protected, and who (both internally and externally) has access to the personal information.

The defined policy and the findings of the inventory should be reflected in the business’s privacy notice and, if necessary, used as a platform to begin an improvement plan.

  • author's avatar

    By: Bob Siegel

    Bob Siegel, the founder and President of Privacy Ref, Inc., has extensive professional experience in the development and improvement of privacy policies and procedures, the definition of performance metrics to evaluate privacy maturity, and the evaluation of compliance. He utilizes a combination of alignment, adaptability, and accountability strategies to guide organizations in achieving their privacy goals.

    He is a Fellow of Information Privacy (FIP) and a Certified Information Privacy Professional, awarded from the International Association of Privacy Professionals, with concentrations in U.S. private-sector law (CIPP/US), US public sector law (CIPP/G), European law (CIPP/E), and Canadian law (CIPP/C). He is also a Certified Information Privacy Manager (CIPM) and Privacy Technologist (CIPT).

    Siegel is a member of the IAPP faculty, has served on the Certification Advisory Board for the CIPM program the Publications Advisory Board.

    Siegel also writes the blog “Operational Privacy” on CSOonline.com

  • author's avatar

  • author's avatar

    In praise of a privacy compliance program
    Looking to 2019 Privacy Plans
    Preparing your customer-facing staff
    Automation for Privacy
    Don’t Forget Basic Communication

    See all this author’s posts

Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at info@privacyref.com

Posted on May 5, 2013 by Bob Siegel
Tags: , , , ,

« »

No Responses

Comments are closed.


« »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

April 16, 2018

IAPP Training Classes
Privacy Ref is proud to announce that we are an official training partner of the IAPP. You now have the opportunity to learn from one of our knowledgeable privacy professionals using the most respected training content in the industry. The robust interactive training offered, aids in the understanding of critical privacy concepts. The contents of the courses are integral to obtaining your privacy certifications and to educate your new team. Learn more here.

Latest Blog Posts

February 1, 2019

In praise of a privacy compliance program

Opening my newsfeed this morning I was not surprised to find an article about another data breach. Over the coming days I am sure we will discover that the organization's policies were well defined, that training and awareness had taken place, and it was just that the procedures weren't followed by one individual. The skeptic in me would say that if one person isn't following procedures, there are probably others. To prevent situations like these, an organization must establish a privacy compliance regimen. Continue reading this post...

December 19, 2018

Political Campaigns Need Privacy Policies and Training
When I made the transition from working in American Politics to learning about Privacy, the first tidbit of information I was given was that there was a difference in terminology between the American  and the European practice. In America, we use the term Privacy but in Europe they use the term Data Protection. As I continued my journey in “Privacy” and I considered how my new-found training would have impacted my career in politics, I have come to feel that the term data protection is more applicable to the needs of political campaigns. If I were to review the numerous political campaigns that I have managed, marketed, and organized, data protection has always been woefully inadequate throughout them all. Continue reading this post...

Other Recent Posts

PRIVACY REF