Want to make creations as awesome as this one?

More creations to inspire you

NORMANDY 1944

Horizontal infographics

LIZZO

Horizontal infographics

BEYONCÉ

Horizontal infographics

ONE MINUTE ON THE INTERNET

Horizontal infographics

SITTING BULL

Horizontal infographics

RUGBY WORLD CUP 2019

Horizontal infographics

Transcript

AirJet Escape

Welcome to the Flight Simulator Challenge! Your mission is to discover the concealed four-digit code, enabling you to exit the flight simulator within a 5-minute window. Explore the cockpit's control panel, scrutinizing each key term in sequential order to reveal the elusive combination. Good luck!

Enter

05:00

Flight Simulator

Aggregated Information

Distinguishable Information

Obscured Data

System of Records

Confidentiality

Context of Use

Have the code?

De-identified Information

Privacy Impact Assessment (PIA)

Harm

Personally Identifiable Information (PII)

Traceable

Linked Information

Linkable Information

PII Confidentiality Impact Level

1.

2.

3.

4.

5.

6.

7.

8.

9.

10.

11.

12.

13.

14.

Replay

Congratulations on completing your mission and successfully exiting the flight simulator!

Any adverse effects that would be experienced by an individual (i.e., that may be socially, physically, or financially damaging) or an organization if the confidentiality of PII were breached.

Harm

2

Linked Information

Information about or related to an individual that is logically associated with other information about the individual.

0

Personally Identifiable Information (PII)

Any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.

De-Identified Information

Records that have had enough PII removed or obscured such that the remaining information does not identify an individual and there is no reasonable basis to believe that the information can be used to identify an individual.

Information that is sufficient to make a determination about a specific aspect of an individual's activities or status.

Traceable

Information about or related to an individual for which there is a possibility of logical association with other information about the individual.

Linkable Information

Privacy Impact Assessment (PIA)

An analysis of how information is handled that ensures handling conforms to applicable legal, regulatory, and policy requirements regarding privacy; determines the risks and effects of collecting, maintaining and disseminating information in identifiable form in an electronic information system; and examines and evaluates protections and alternative processes for handling information to mitigate potential privacy risks.

The PII confidentiality impact level-low, moderate, or high- indicates the potential harm that could result to the subject individuals and/or the organization if PII were inappropriately accessed, used, or disclosed.

PII Confidentiality Impact Level:

2

A group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual.

System of Records

4

Distinguishable Information

Information that can be used to identify an individual.

The purpose for which PII is collected, stored, used, processed, disclosed, or disseminated.

Context of Use

Aggregated Information

Information elements collated on a number of individuals, typically used for the purposes of making comparisons or identifying patterns.

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

Confidentiality

Data that has been distorted by cryptographic or other means to hide information. It is also referred to as being masked or obfuscated.

Obscured Data