Due to exposure for jail-related death claims, it is important to remember a few basic guidelines regarding jail intake and suicide prevention. MINIMUM RECOMMENDED RULES ON JAIL INTAKE SUICIDE PREVENTION […]
In today’s digital age, cybersecurity is a critical concern for counties of all sizes. As cyber threats become increasingly sophisticated, counties must stay vigilant and proactive in protecting their sensitive data. CTSI stays informed of evolving threats and provides quarterly cybersecurity updates on the latest concerns, best practices, and security protocols. This knowledge can significantly reduce the risk of a successful cyber attack and promote a security-first culture.
Sensitive information is considered privileged when its compromise—through alteration, corruption, loss, misuse, or unauthorized disclosure—could seriously harm an individual or organization. The highest level of protection must be provided to such information to mitigate risks and safeguard trust.
For data protection purposes, Personally Identifiable Information (PII) is any instance of an individual’s first name (or first initial), last name, and any of 29 additional confidential items. These items are non-public and can be used to identify a specific individual uniquely.
Examples of Additional Confidential Items
The guiding principle is simple: if a combination of data can uniquely identify an individual and includes non-public details, it qualifies as PII. It must be treated with utmost care and security.
Examples of PII in Practice
Consider the following scenario:
John Smith was born on January 1, 1965. Which of the following examples contains PII?
A. John Smith – DOB 1/1/1965
B. John S. – DOB 1/1/1965
C. John Smith – DOB 1/1/xxxx
The correct answer is A. While "John S." or a partial date of birth may not individually identify someone, the full name and complete birthdate do, making it classified as PII.
Failing to safeguard sensitive information can have severe consequences, including:
Every employee has a role to play in safeguarding PII. Here are some best practices to follow:
Regular cybersecurity updates are vital to an effective security strategy. They help keep counties informed, vigilant, and prepared to respond to threats. CTSI recommends counties implement these essential cybersecurity controls to help manage their cyber exposures. This will safeguard and reduce digital vulnerabilities at the county level and assist in obtaining coverage with higher limits and lower premiums for CAPP. For more information, contact CTSI at (303) 861-0507.
Due to exposure for jail-related death claims, it is important to remember a few basic guidelines regarding jail intake and suicide prevention. MINIMUM RECOMMENDED RULES ON JAIL INTAKE SUICIDE PREVENTION […]
County Technical Services, Inc. (CTSI) has served Colorado counties for 40 years. County commissioners first envisioned CTSI as a way to empower counties by creating a collective purchasing pool. The […]
In today’s digital age, cybersecurity is a critical concern for counties of all sizes. As cyber threats become increasingly sophisticated, counties must stay vigilant and proactive in protecting their sensitive […]
The U.S. Department of Labor (DOL) and the State of Colorado require workplaces, including local governments, to provide employees with posted notices. Lists of notices can be found online and […]