DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Air Force Network: Serious consequences for mishandling personal ID info

Posted on December 27, 2013 by Dissent

by Airman 1st Class Joshua Eikren
375th Air Mobility Wing Public Affairs

12/18/2013 – SCOTT AIR FORCE BASE, Ill. — Individuals who inappropriately store and transmit Personally Identifiable Information, or PII, over the Air Force Network will now have their accounts locked in response to the violation.

Patricia Feist, 375th Communications Squadron base records manager, said, “Personally Identifiable Information is information which can be used to distinguish or trace an individual’s identity, such as their name, Social Security Number, or biometric records, including any other personal information that is linked or linkable to a specific individual.”

A PII breach is defined as “a loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access or any similar term referring to situations where persons other than authorized users and for other than authorized purpose have access or potential access to PII, whether physical or electronic.”

Air Force Space Command spokeswoman, Capt. Christina Sukach, said, “These breaches can range from one individual sending a performance report containing a Social Security Number to another military account without encryption, to sending a personnel roster with thousands of pieces of PII to a personal email account, outside of the Air Force Network. These breaches do not necessarily translate to stolen identities or other malicious uses of personal information, but they do increase the risks to individuals and to the Air Force Network.

All DoD personnel are responsible for protecting PII. These new actions are in addition to, and do not circumvent or replace, the normal Privacy Act notification process which is already in place throughout the Air Force. Air Force Instruction 33-332 governs the PII breach reporting process as well as the consequences for PII violations.

“An individual who willingly releases PII can be given remedial actions. Civil remedies include payment of damages, court costs, and attorney fees in some cases. In addition, misdemeanor criminal charges and a fine of up to $5,000 may be imposed, as well as loss of employment,” said Feist.

The abuse of such information not only affects individuals, but also poses a threat to the entire Air Force. In many cases in which PII has been compromised, information is released that can be used to steal someone’s identity. It is vital for every individual to understand how to properly safeguard their personal information and the information of others.

Feist said, “If you are going to collect PII, you must have an authority to collect the information and should have System of Records Notice listed in the Federal registry. It is of the utmost importance you must protect that information. Identity theft is big.”

Encrypting PII allows secure transmission. Additional information on protecting PII can be found on the Air Force Portal under the Cyber Threats and Information tab as well as at http://dpclo.defense.gov/privacy.

Protecting Personally Identifiable Information

Email: ensure there is an official need for the recipient(s) to receive the information. If email is used place FOUO in the subject line, the Privacy act statement “This e-mail contains FOR OFFICIAL USE ONLY (FOUO) information which must be protected under the Freedom of Information Act (5 U.S.C 552) and/or the Privacy Act of 1974 (5 U.S.C. 552a). Unauthorized disclosure or misuse of this PERSONAL INFORMATION may result in disciplinary action, criminal and/or civil penalties. Further distribution is prohibited without the approval of the author of this message unless the recipient has a need to know in the performance of official duties. If you have received this message in error, please notify the sender and delete all copies of this message.” Encrypt and digitally sign the email.

Use the Army Missile Research Development and Engineering Center Safe Access File Exchange as an alternate means of transmitting PII.

Ensure personal information stored on EIM or a shared drive is only accessible to individuals who have an official, valid “need-to-know” and is required for day-to-day operations.

Remove personal information maintained within SharePoint or equivalent software programs when no longer needed for daily operations.

If faxing information, use a coversheet and have the person receiving the fax be waiting by the machine.

Paper documents and printed materials that contain PII shall be covered with the AF Form 3227, Privacy Act Cover Sheet or DD Form 2923, Privacy Act Data Cover Sheet when removed from a System of Record.

Don’t send sensitive PII on CDs, DVDs, hard drives, flash drives, floppy disks or other removable media by mail or courier sensitive PII unless the data is encrypted (see AFI 33-200, Information Assurance Management).

Don’t leave personal information in unsecured vehicles, unattended workspaces, unsecured file drawers, or in checked baggage.

Don’t store personal information on personal media.

SOURCE: Scott Air Force Base

Category: Uncategorized

Post navigation

← This doesn't bode well… (UPDATED)
Colorado notifies 1,918 Medicaid clients of HIPAA breach by contractor's employee →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.