Private Information Management Initiative (PIMI) FAQ
What is the Private Information Management Initiative?
The Private Information Management Initiative (PIMI) is a program where the RIT Information Security Office helps RIT faculty and staff scan their computers and attached drives to determine if they contain private information (PI). When PI is found, each RIT faculty and staff member is responsible for remediating the private information by scrubbing or shredding the files.
The program also includes destruction of paper files containing nonessential PI.
The goals of the program are to identify and reduce the amount of private information at RIT. This reduction will help safeguard the RIT community against identity theft and will help RIT comply with relevant state and federal laws.
What is Private Information?
New York State defines private information (PI) as:
any personal information concerning a natural person combined with one or more of the following data elements: Social Security number (SSN), driver's license number, account number, or credit or debit card number in combination with any required security code. These combinations of information are often used in identity theft.
The New York State Information Security Breach and Notification Act requires that RIT notify affected consumers if their Private information is compromised.
Why is RIT scanning my computer or drive for Private information?
RIT is scanning your computer or drive because we've found that scans have revealed the presence of Private information on many computers; even when the computer owners do not believe there is any Private information present. We want to reduce the potential for identity theft occurring as a result of information obtained from RIT computers.
How is RIT authorized to scan my computer?
It is important to note that the Information Security Office may inspect the results of the scan only to aid in remediation efforts.
Are other universities doing anything similar?
Many universities are beginning to scan for Private information on computers connected to their networks and have begun remediation of paper files and other media containing Private information.
What are my responsibilities in the Private Information Management Initiative?
Your responsibilities as faculty or staff may be found here.
How will RIT scan my system?
Your computer is scanned by Identity Finder (IDF) software installed on your computer. The scans will be initiated from a central scanning server administered by the RIT Information Security Office. Identity Finder also allows you to initiate an on-demand scan. You do not have to be connected to the network to initiate an on-demand scan.
What do I do if the scan is slowing down my computer or I would like to pause it temporarily?
It's easy to Pause Identity Finder so that it doesn't impact your productivity significantly. Go to your system tray, right click on the Identity Finder icon (Ctrl-click for Mac) and choose Maximize. Then click on the Pause button. When you're ready to resume the scan, click on Resume.
What happens when Identity Finder finds Private information?
Identity Finder will generate an interactive report of suspected Private information matches and provide user-friendly tools to erase the information securely or remove the Private information (e.g. Social Security Number, Bank Account Number, Credit Card Number or Drivers License) from the files directly from the interactive report. You may also identify "false positives" by choosing "Ignore" within IDF. The Information Security Office will verify that the ignored files do not contain Private information.
I've completed a search and Identity Finder is asking me how to proceed. What should I do?
When Identity Finder completes its search, review the list of results to begin Shredding or Scrubbing Private Information and Ignoring "false positives."
How do I shred, scrub, or ignore a match?
You can choose shred, scrub, or ignore by right-clicking on the check box next to the entry and choosing from the options available. NOTE: not all options are available for all file types. Process the entire list before closing Identity Finder.
What do I do if Identity Finder doesn't find Private information?
If Identity Finder completes its search and no Private Information is found, close Identity Finder.
I am unable to "shred" a file in Identity Finder. What should I do?
If you are unable to "shred" a file containing Private Information, you may not have permissions in Windows that allows Identity Finder to "shred" it. Contact the Help Desk and ask them to login to Identify Finder as admin and securely "shred" the file.
I am unable to "scrub" a file in Identity Finder. What should I do?
Identity Finder provides a scrub option for specific file types that may not work with all file types. If you need to retain an Office 2003 file on your computer but need to redact the Private information in the file you’ll need to follow a three-step process.
1. Save a copy of the file in Office 2007 or 2010 format (.docx, xlsx, etc.)
2. Use Identity Finder to scrub (redact) the Private information from the new file
3. Use Identity Finder to shred the old file.
What do I do with Private information found on my system?
The RIT Information Security Office has created a Private Information Handling Quick Reference Table to assist you in determining how to handle Private information found on your computer or drives.
If you find Private information (e.g. Social Security Number, Bank Account Number, Credit Card Number or Drivers License) on your computer and are not sure whether it should be there, ask your Information Steward/Management Representative.
New York State law does not allow the retention of Social Security Numbers unless there is a clear business need for the information. In general, an RIT employee has a legitimate purpose for having access to the Social Security Numbers of another individual when such number is required for tax or billing purposes, credit authorizations, background checks, or in furtherance of submitting a federal or state governmental application that requires the transmission of an individual's Social Security Number. In addition, social security numbers shall be maintained when required by either court order, subpoena, or by direction of the Office of Legal Affairs.
What is redaction?
Unless required by RIT business processes, files must not contain Private information. Unnecessary information must be sanitized by redacting (removing) the Private information. It is not sufficient to simply obscure or hide the information. Although "redaction" has a broader meaning in editing, in the context of information handling it refers to the removal of information from a document.
If you are redacting a file before the Identity Finder scan, Adobe has provided a guide that instructs readers how to redact Microsoft Word and Adobe PDF files properly. The guide can be found here.
Why is Outlook prompting me for a new profile?
We’ve seen the following a few times
1. Outlook is closed and you see the Identity Finder results screen.
2. You try to open Outlook while the Identity Finder Results Screen is open.
3. Outlook prompts you to create a new profile
1. Exit the Outlook setup wizard
2. Process the results in the Identity Finder report
3. Close Identity Finder
4. Open Outlook
What if the only Private information the scan finds is mine?
Private information should not be stored on an RIT computer unless expressly permitted. (This information is typically found in copies of tax returns and filled-in forms.)
I’m seeing a Delete Database dialog box at the beginning of my Identity Finder session. The dialog box says that AnyFind technology has been updated and asks if I want to perform a full search. Should I answer Yes or No?
You should answer Yes. Identity Finder will conduct a full scan (including items previously ignored.) The scan length may be similar to your initial scan.
I have a non-Windows computer, will it be scanned?
Currently, only computers with the Microsoft Windows and Mac Operating System will be scanned by Identity Finder. We encourage you to examine the files on your computer and attached drives to identify Private information and handle it accordingly. For Linux, we recommend using Cornell's Spider. You may also work with your systems administrator to scan the Linux drive from Windows.