yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Personally Identifiable Information (PII) | Internet safety | Khan Academy


2m read
·Nov 10, 2024

Hi everyone, Sal Khan here from Khan Academy. My social security number is eight five seven three two five five six seven. No, it's not! I wouldn't tell you my social security number like that, and that's because it is personally identifiable information, or PII.

There's a reason why you want to keep that to yourself, or at least limit who has access to PII. If someone has access, they can expose your privacy, tell the world where you live, track you, and they could tell the world what you've been up to. Maybe when you should be working, what websites you're visiting, or even worse, potentially they could steal your identity.

They could take money out of your bank account, take a credit card in your name, do some other form of identity theft that could be embarrassing or super costly. So, if you have some type of service, either online or otherwise, that's asking for something like your social security number or your birthday, which might be a little bit more indirect, or your email address, or your phone number, you might ask why.

Sometimes, there's a legitimate reason why they need to know these things, but many times, I'd argue even most of the time, there might not be a legitimate reason. You need to ask yourself, well, what are they going to do with it? And if you don't feel comfortable giving that information, ask yourself, do you really need that service?

So, think seriously about your PII. Unfortunately, bad actors on the internet are coming up with new ways of leveraging both direct PII, personally identifiable information, like social security numbers, even biometrics, even your name, and indirect measures or indirect pieces of PII, like your birthday, your address, your email address, or your phone number.

These can be put together to do shady things with your identity, so be very careful.

More Articles

View All
How a 2x Shark Tank REJECT Survived & Made MILLIONS | Ask Mr. Wonderful #15 Kevin O'Leary & Alpha M
[Music] Hey Mr. Wonderful here with a really unique episode. I’ve asked Mr. Wonderful, you know, because we talk about entrepreneurship so much in the journey and the town the challenge of doing it. I thought we’d bring on someone who’s actually been on …
Chad Rigetti at Startup School SV 2016
Everybody, our next speaker is Chad Retti from Retti Quantum Computing. Retti Quantum Computing went through YC in the summer of 2014. Um, at that point they had nothing. Uh, they are now one of the leading Quantum Computing companies in the world. And ne…
The Hole Where King Tut’s Heart Used to Be | Overheard at National Geographic
Foreign [Music] When I heard the news of this year’s big show with the National Geographic Museum, which is on the first floor of headquarters, I couldn’t wait to see it. It was going to focus on the world’s most famous Pharaoh, King Tut, in honor of the …
Determining sample size based on confidence and margin of error | AP Statistics | Khan Academy
We’re told Della wants to make a one-sample z-interval to estimate what proportion of her community members favor a tax increase for more local school funding. She wants her margin of error to be no more than plus or minus two percent at the 95% confidenc…
THE 6 BEST CREDIT CARDS YOU NEED IN 2020
What’s up guys, it’s Graham here! So, as I’m sure many of you are aware, the one thing I love more than anything, even more so than finding really creative ways to ask you to smash the like button for the YouTube algorithm, would be credit cards. That’s …
Estimating limits from tables | Limits and continuity | AP Calculus AB | Khan Academy
The function g is defined over the real numbers. This table gives select values of g. What is a reasonable estimate for the limit as x approaches 5 of g of x? So pause this video, look at this table. It gives us the x values as we approach five from value…