DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Air Force Network: Serious consequences for mishandling personal ID info

Posted on December 27, 2013 by Dissent

by Airman 1st Class Joshua Eikren
375th Air Mobility Wing Public Affairs

12/18/2013 – SCOTT AIR FORCE BASE, Ill. — Individuals who inappropriately store and transmit Personally Identifiable Information, or PII, over the Air Force Network will now have their accounts locked in response to the violation.

Patricia Feist, 375th Communications Squadron base records manager, said, “Personally Identifiable Information is information which can be used to distinguish or trace an individual’s identity, such as their name, Social Security Number, or biometric records, including any other personal information that is linked or linkable to a specific individual.”

A PII breach is defined as “a loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access or any similar term referring to situations where persons other than authorized users and for other than authorized purpose have access or potential access to PII, whether physical or electronic.”

Air Force Space Command spokeswoman, Capt. Christina Sukach, said, “These breaches can range from one individual sending a performance report containing a Social Security Number to another military account without encryption, to sending a personnel roster with thousands of pieces of PII to a personal email account, outside of the Air Force Network. These breaches do not necessarily translate to stolen identities or other malicious uses of personal information, but they do increase the risks to individuals and to the Air Force Network.

All DoD personnel are responsible for protecting PII. These new actions are in addition to, and do not circumvent or replace, the normal Privacy Act notification process which is already in place throughout the Air Force. Air Force Instruction 33-332 governs the PII breach reporting process as well as the consequences for PII violations.

“An individual who willingly releases PII can be given remedial actions. Civil remedies include payment of damages, court costs, and attorney fees in some cases. In addition, misdemeanor criminal charges and a fine of up to $5,000 may be imposed, as well as loss of employment,” said Feist.

The abuse of such information not only affects individuals, but also poses a threat to the entire Air Force. In many cases in which PII has been compromised, information is released that can be used to steal someone’s identity. It is vital for every individual to understand how to properly safeguard their personal information and the information of others.

Feist said, “If you are going to collect PII, you must have an authority to collect the information and should have System of Records Notice listed in the Federal registry. It is of the utmost importance you must protect that information. Identity theft is big.”

Encrypting PII allows secure transmission. Additional information on protecting PII can be found on the Air Force Portal under the Cyber Threats and Information tab as well as at http://dpclo.defense.gov/privacy.

Protecting Personally Identifiable Information

Email: ensure there is an official need for the recipient(s) to receive the information. If email is used place FOUO in the subject line, the Privacy act statement “This e-mail contains FOR OFFICIAL USE ONLY (FOUO) information which must be protected under the Freedom of Information Act (5 U.S.C 552) and/or the Privacy Act of 1974 (5 U.S.C. 552a). Unauthorized disclosure or misuse of this PERSONAL INFORMATION may result in disciplinary action, criminal and/or civil penalties. Further distribution is prohibited without the approval of the author of this message unless the recipient has a need to know in the performance of official duties. If you have received this message in error, please notify the sender and delete all copies of this message.” Encrypt and digitally sign the email.

Use the Army Missile Research Development and Engineering Center Safe Access File Exchange as an alternate means of transmitting PII.

Ensure personal information stored on EIM or a shared drive is only accessible to individuals who have an official, valid “need-to-know” and is required for day-to-day operations.

Remove personal information maintained within SharePoint or equivalent software programs when no longer needed for daily operations.

If faxing information, use a coversheet and have the person receiving the fax be waiting by the machine.

Paper documents and printed materials that contain PII shall be covered with the AF Form 3227, Privacy Act Cover Sheet or DD Form 2923, Privacy Act Data Cover Sheet when removed from a System of Record.

Don’t send sensitive PII on CDs, DVDs, hard drives, flash drives, floppy disks or other removable media by mail or courier sensitive PII unless the data is encrypted (see AFI 33-200, Information Assurance Management).

Don’t leave personal information in unsecured vehicles, unattended workspaces, unsecured file drawers, or in checked baggage.

Don’t store personal information on personal media.

SOURCE: Scott Air Force Base


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
  • "Pompompurin" taken into custody after violating conditions of pre-sentencing release on bond (1)
Category: Uncategorized

Post navigation

← This doesn't bode well… (UPDATED)
Colorado notifies 1,918 Medicaid clients of HIPAA breach by contractor's employee →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.