Last updated on:
September 30, 2025

Personal information list: Types and PII examples

Personal Information list

Your birth date by itself is just a number - millions of people share January 15th. Your ZIP code alone tells nothing personal - thousands live in 10001. Your gender is basic demographic data. But combine all three, and suddenly you become uniquely identifiable among 87% of the American population. This is how modern identity theft works: harmless details become powerful identification tools when criminals connect the dots.

PII breaches drained $16.6 billion from Americans in 2024. Yet when 1.7 billion breach notifications landed in people's inboxes, most recipients had no idea what personal information was actually compromised - or how criminals could use seemingly harmless details against them.

This comprehensive personal information list reveals what businesses must protect and what individuals need to safeguard. Modern PII goes beyond obvious identifiers like Social Security numbers - today's digital world creates new categories that can identify people.

What are the examples of PII, and how do you spot it?

Examples of PII include traditional identifiers like Social Security numbers and addresses, but the definition has expanded. Modern personal information examples encompass everything from keystroke patterns that reveal health conditions to device fingerprints that track behavior across websites.

The traditional approach of protecting obvious identifiers misses the sophisticated tracking methods that make privacy protection more critical than ever. Understanding these categories, which are elements of PII, isn't academic - it's essential for both personal privacy and business compliance.

What are direct identifiers and high-risk personal information?

Direct identifiers

These examples of personal information uniquely identify individuals by themselves and require the highest protection priority. This list of PII represents the most sensitive data categories:

Government-issued numbers

Social Security Numbers (SSN) represent the classic example where name and Social Security number combinations create immediate identity theft risk. Additional government identifiers include:

  • Passport numbers, visa numbers, alien registration numbers
  • Driver's license numbers, state identification numbers
  • Tax identification numbers, voter registration numbers
  • Military service numbers, security clearance identifiers

Financial account identifiers

Banking and financial details that enable immediate fraud:

  • Bank account numbers and routing numbers
  • Credit card numbers (requiring specialized credit card number scanning software for secure processing)
  • Investment account numbers, retirement account identifiers
  • Insurance policy numbers and claim numbers

Biometric identifiers

Physical characteristics that permanently identify individuals form another category of examples of personally identifiable information:

  • Fingerprints, iris scans, retina patterns
  • Facial geometry measurements, voice signatures
  • DNA profiles, genetic markers
  • Palm prints, vein patterns, handwriting samples

These biometrics cannot be changed if compromised, making their protection critical.

What are the indirect identifiers?

Indirect Indetifiers

These data points don’t identify someone alone but become powerful when combined. Research shows that even seemingly harmless demographic details can create unique identification patterns.

Think of it like a process of elimination. Start with 300+ million Americans. Your ZIP code narrows it to 40,000 people. Add your birth year - 800 remain. Add your gender - 400 left. Each detail eliminates more candidate records until you're uniquely identifiable from what seemed like meaningless information.

Demographic information

Name is an example of PII when combined with other data points, creating identification possibilities through:

  • Age, birth date, gender identity
  • Race, ethnicity, marital status
  • Nationality, citizenship status
  • Educational background, graduation years

Geographic data

Location-based personal information examples that narrow identification:

  • ZIP codes, postal codes, area codes
  • City, state, province, country
  • Census tract, voting district boundaries
  • GPS coordinates, geofencing data patterns

Professional information

Work-related examples of personal data that enable identification:

  • Job titles, employer names, work locations
  • Professional licenses, industry certifications
  • Salary ranges, employment history records
  • Union membership, professional organization affiliations

Traditional privacy advice fails because it only protects obvious identifiers and ignores the data combinations that identify you.

Sensitive PII categories that require special handling

Healthcare Legal Finance

These examples of PII include information types that require the highest security standards due to potential discrimination or harm:

Financial information

Economic data that creates vulnerability - key personal details example of protected information::

  • Credit reports, credit scores, financial statements
  • Tax returns, income documentation records
  • Investment portfolios, trading histories
  • Bankruptcy records, debt information, loan applications

Health information

Medical PII data examples protected under HIPAA and similar regulations:

  • Medical records, treatment histories, diagnoses
  • Prescription information, mental health records
  • Genetic test results, family medical history
  • Disability status, workers' compensation claims

HIPAA specifically defines 18 identifiers that make health information into protected PHI. For the complete list of these health-related identifiers and detailed protection requirements, see our comprehensive guide to HIPAA patient identifiers.

Legal information

Personal details examples that may be used, or produced by courts and law enforcement:

  • Criminal history, arrest records, court documents
  • Immigration status, visa applications
  • Litigation involvement, legal settlements
  • Background check results, security clearance data

Permanent redaction vs visual hiding

See how Redactable actually removes your data

Modern digital PII categories

Technology continuously produces new types of personally identifiable information (PII) that most organizations and regulatory standards fail to recognize or address. This gap exposes companies to compliance risks and data breaches because their policies and controls do not cover emerging examples of PII forms:

Device identifiers

Hardware-based personal information examples:

  • IMEI numbers, MAC addresses, device serial numbers
  • Advertising identifiers (Google GAID, Apple IDFA)
  • Browser fingerprints, hardware configuration fingerprints
  • SIM card identifiers, network signatures

Online identifiers

Digital identifiers that track across platforms - modern example of personal data:

  • IP addresses when linked to individuals
  • Email addresses, social media handles
  • User account names, loyalty program identifiers
  • Digital certificates, cryptographic keys

Behavioral biometrics

Pattern-based data that identify through behavior representing newer PII examples list entries:

  • Keystroke dynamics (typing patterns that can reveal medical conditions like Parkinson's disease)
  • Gait patterns, walking characteristics
  • Mouse movement patterns, touch gesture signatures
  • Voice stress patterns, speaking rhythm analysis

AI-inferred personal data: The invisible threat

Invisible threat of AI-inferred personal data

Modern algorithms create example of personal information that individuals never directly provided:

Predictive profiles

AI-generated personal profiles:

  • Personality assessments based on social media activity
  • Health risk predictions derived from browsing behavior
  • Income estimates calculated from purchase patterns
  • Political affiliation inferences from data correlation analysis

Behavioral predictions

Algorithmic forecasts that become personal data examples:

  • Likelihood of job changes, relationship status changes
  • Propensity for specific health conditions or treatments
  • Risk assessments for loan defaults or insurance claims
  • Probability calculations for criminal behavior or recidivism

These AI-inferred profiles extend PII beyond what people directly provide.

Regulatory definitions: What law considers PII

Understanding legal frameworks helps determine what is actually considered as PII. This list of personal information varies by regulation:

GDPR (European Union)

Personal Data includes "any information relating to an identified or identifiable natural person," encompassing online identifiers, location data, and behavioral patterns. The GDPR's broad interpretation means virtually any distinguishing information qualifies.

CCPA/CPRA (California)

Personal Information covers data that "identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked" to consumers or households. California uniquely includes household-level data and commercial information.

HIPAA (Healthcare)

Protected Health Information (PHI) encompasses health information tied to 18 specific identifiers including names, addresses, dates, phone numbers, Social Security numbers, medical record numbers, account numbers, and biometric identifiers.

FERPA (Education)

Educational Records include information directly related to students maintained by educational institutions, covering grades, disciplinary records, and any personally identifiable information in education files.

Industry-specific PII considerations

Different sectors face unique PII protection requirements for various examples of PII include:

Healthcare: HIPAA's 18 identifiers

Healthcare organizations must protect all PHI that could identify patients, including medical record numbers, health plan beneficiary numbers, biometric identifiers, and full-face photographs combined with health information.

Average healthcare breach cost reaches $9.77 million—the highest of all industries for 14 consecutive years.

Financial services: GLBA requirements

Financial institutions must protect nonpublic personal information including account numbers, Social Security numbers, credit reports, financial statements, transaction histories, and investment portfolios.

New 2024 requirement mandates FTC breach notification for incidents affecting 500+ individuals.

Education: FERPA protections

Schools must protect educational records including student grades, transcripts, disciplinary records, special education information, health records, and financial aid information.

Legal services: Attorney-client privilege

Law firms face unique challenges protecting attorney-client privileged communications, case-related information, client personal and financial data, and work product materials.

Recent trend shows courts increasingly reject privilege claims for post-breach forensic reports.

Real-world consequences: Case studies in PII exposure

Snowflake multi-client cascade

Snowflake multi-client cascade (2024)

Impact: 165+ organizations, 500+ million individuals affected

Root cause: Stolen credentials lacking multi-factor authentication

Key lesson: Third-party cloud security failures cascade across industries

Affected companies included AT&T (nearly all wireless customers), Ticketmaster (560 million records), and Santander Bank (customer contact and transaction data).

PowerSchool education breach (2024)

Impact: 62.4 million students, 9.5 million educators

PII exposed: Social Security numbers, medical records, special education information

Industry impact: North Carolina discontinued PowerSchool services

Key lesson: Educational technology vendors handle extremely sensitive student data requiring enhanced protection

How to protect PII: Actionable steps

For individuals

Enable multi-factor authentication everywhere - 1.24 billion records could have been saved with this single step. Monitor the "Big 4" identifiers: Social Security number, full name, birth date, and address combinations.

Understand modern tracking methods: keystroke patterns, device fingerprints, and location data now identify you as uniquely as traditional identifiers. Exercise privacy rights under CCPA, GDPR, and other regulations to see what companies know about you.

Sanitize all documents containing personal data before uploading them to AI chatbots, or sharing online. Use professional redaction software to achieve complete and permanent data removal.

For businesses

Implement comprehensive PII classification using the direct/indirect/sensitive framework outlined above. This PII examples list approach ensures all data categories receive appropriate protection. Address third-party risk immediately -30% of breaches now originate from vendors and partners.

Invest in detection capabilities: average US breach costs ($10.22 million) justify significant security investment. Train employees on modern PII categories including behavioral biometrics and AI-inferred data - understanding which are elements of PII prevents inadvertent exposure..

Cross-industry recommendations:

  • Zero Trust Architecture: Assume breach and verify all access continuously
  • Privacy by Design: Build PII protection into systems from development
  • Regular risk assessments: Quarterly evaluations of PII handling practices
  • Incident response planning: Prepare for when, not if, breaches occur

How document security protects PII in files?

Many organizations overlook PII protection in documents shared internally or externally. Traditional methods like black markers or PDF boxes don't permanently remove sensitive information—they simply hide it visually while leaving data recoverable.

For organizations handling sensitive documents, professional tools like Redactable ensure permanent PII removal from files, including metadata and hidden layers, while maintaining document integrity for legal and business purposes.

Your next steps for PII protection

PII Protection

The definition of personal information that can identify you has fundamentally changed. Today's examples of personally identifiable information include behavioral patterns revealing health conditions, device fingerprints tracking across the internet, AI-generated profiles predicting personal characteristics, location patterns revealing life routines, keystroke dynamics diagnosing medical conditions, and digital exhaust from every online interaction.

Understanding the modern scope of PII isn't academic - it's essential for protection in a world where traditional privacy assumptions no longer apply. Names and Social Security numbers represent only the tip of the iceberg in today's AI-driven data landscape.

With 1.7 billion breach notifications delivered in 2024 alone and average breach costs exceeding $10 million, comprehensive PII protection has become a critical business and personal priority. Success requires understanding not just traditional identifiers, but the full spectrum of modern personal data that make us identifiable in an interconnected digital world. That means pairing awareness with action - whether by implementing advanced privacy practices, training teams, or taking simple steps like sanitizing electronic documents with professional redaction software before sharing them online.

Ultimately, protecting PII isn’t optional. It’s essential for organizations and a personal responsibility for individuals, in a world where our data is more powerful—and more vulnerable - than ever.

Interested in learning more?

Learn why we're the #1 redaction software today!
Try for free

Frequently asked questions

What's the difference between direct and indirect PII identifiers?

Direct identifiers uniquely identify someone by themselves—like Social Security numbers, passport numbers, or biometric data. Indirect identifiers (also called quasi-identifiers) seem harmless alone but become powerful identification tools when combined. For example, your ZIP code, birth date, and gender together can identify 87% of Americans uniquely, even though each piece alone reveals nothing personal.

How can businesses identify all PII in their systems?

Start with a comprehensive data audit using the direct/indirect/sensitive PII framework. Direct identifiers include SSNs, account numbers, and biometric data. Indirect identifiers include names, addresses, demographic data, and device identifiers. Sensitive PII covers financial records, health information, and legal data. Don't forget modern categories like behavioral biometrics, AI-inferred profiles, and digital exhaust from user interactions.

What qualifies as PII under GDPR versus CCPA?

GDPR defines personal data broadly as "any information relating to an identified or identifiable natural person," including online identifiers and behavioral data. CCPA covers information that "identifies, relates to, or could reasonably be linked" to consumers or households - uniquely including household-level data. Both regulations are expanding their definitions to include AI-inferred data and behavioral patterns that weren't considered personal information under older privacy laws.

Why are keystroke patterns considered personally identifiable information?

Keystroke dynamics - how you type, including rhythm, pressure, and timing between keys—create unique behavioral signatures as distinctive as fingerprints. Research shows typing patterns can even reveal health conditions like Parkinson's disease. Since these patterns identify individuals uniquely and can infer sensitive health information, privacy regulations increasingly classify them as biometric PII requiring special protection.

Is my company required to protect customer PII in documents?

Yes, if you handle personal information, you're typically required to protect it in all formats, including documents. This means going beyond visual redaction methods that simply hide data—you need permanent removal that eliminates information from metadata and hidden document layers. Professional redaction tools ensure compliance while maintaining document integrity for business and legal purposes.

Ready to get started?

Try Redactable for free and find out why we're the gold standard for redaction
Try for free
Secure icon, green background and white checkmark

No credit card required

Secure icon, green background and white checkmark

Start redacting for free

Secure icon, green background and white checkmark

Cancel any time