Last updated on:
January 20, 2026

Who is responsible for protecting PII in your company?

Who is responsible for protecting PII in your company

TikTok paid €530 million (approximately $600 million USD) in GDPR fines in 2025 from Ireland's Data Protection Commission for violating Article 46 data transfer safeguards when transferring personal data to China. The penalty stemmed from inadequate protections for cross-border data flows - a failure in the controller-processor relationship where TikTok, as data controller, didn't ensure its Chinese processors maintained GDPR-compliant safeguards.

Half of all organizational records contain some form of PII, according to NIST benchmarks—yet many organizations lack complete inventories of what sensitive data they hold and where it's stored. That gap creates the conditions for breaches that expose millions to identity theft. When a phishing email arrives or a vendor requests customer data, does your team know whose responsibility it is to evaluate the risk?

The confusion is expensive. Over 53% of 2025 data breaches targeted customer PII like Social Security numbers, addresses, and account numbers. The average cost per record lost reached $160. Most of these breaches happened not because of technical failures, but because someone in the organization didn't know their role in protecting sensitive information.

This guide breaks down who is responsible for protecting PII at your company, which privacy controls are everyone's responsibility, how to delegate tasks safely without creating bottlenecks, and why phishing remains the top breach vector that every role must address.

Who is ultimately responsible for protecting PII at your company

Ultimate accountability rests with senior leadership - boards and CEOs bear final liability when breaches occur. NIST SP 800-122 makes this explicit: senior management must allocate resources for PII protection and ensure that safeguards are implemented across the organization.

The legal structure matters. Data controllers decide purposes and ensure compliance under GDPR and CCPA - typically your company's executive team. Data processors handle execution under contracts - your vendors and service providers. When processors fail, controllers still face penalties.

Privacy officers and legal counsel define specific obligations. NIST guidance emphasizes consulting these roles to understand what laws apply to your PII holdings—Privacy Act, HIPAA, CCPA, GDPR, industry-specific regulations. They translate regulatory language into operational requirements.

CISOs manage the cybersecurity infrastructure that protects PII from threats like phishing, ransomware, and unauthorized access. This role implements the technical controls—encryption, access restrictions, monitoring systems—that prevent breaches.

But everyone shares vigilance. Every employee who handles PII has responsibility for spotting and reporting risks. The person who receives a phishing email, the manager who gets a vendor data request, the assistant who prepares documents for external sharing - they all make decisions that affect PII protection.

The breakdown creates problems. When everyone thinks someone else is responsible, no one takes ownership. When senior leadership assumes IT handles everything, they don't allocate sufficient resources. When IT assumes legal approves all data sharing, they don't implement proper access controls.

Clear role definition prevents this confusion.

Breaking down team roles and responsibilities

Different roles own different aspects of PII protection. The key is understanding what each role does, when to involve them, and how to escalate appropriately.

Who protects PII

Employees: Everyone's responsibility

Every employee must follow PII safeguards as part of daily work. This isn't abstract policy - it's the person who spots a phishing email and reports it instead of clicking, the team member who questions why a vendor needs Social Security numbers, the manager who challenges excessive PII collection in a new form.

Training makes this practical. Employees need to recognize what constitutes PII, understand basic handling rules, know how to report concerns, and follow established procedures for sharing or storing sensitive data.

When to involve them: Immediately for anything suspicious. Don't wait to escalate phishing attempts, unexpected data requests, or situations where PII seems at risk.

IT and CISO: Technical safeguards

IT teams and CISOs secure systems through access controls, encryption, monitoring, and breach response. Delegate routine cybersecurity tasks here—implementing multi-factor authentication, configuring firewalls, managing user permissions, monitoring for intrusions.

This role owns the infrastructure layer. They can't make legal or policy decisions about what PII to collect or how to use it, but they control how systems protect whatever PII the organization holds.

When to involve them: For technical threats like phishing campaigns, system vulnerabilities, access control issues, or any indication of unauthorized access to PII.

Privacy officers and DPOs: Regulatory compliance

Privacy officers assess impacts, minimize collection, and conduct privacy impact assessments. For organizations under HIPAA, this role ensures compliance with Protected Health Information requirements. For companies subject to CCPA or GDPR, Data Protection Officers manage regulatory obligations.

These roles interpret how regulations apply to specific business activities. When you're launching a new product that collects customer data, the privacy officer determines what consent you need, what disclosures are required, and what security measures are mandatory.

When to involve them: Policy gaps, new data collection initiatives, vendor assessments, audits, or whenever you're unsure if an activity complies with privacy regulations.

Legal counsel: Interpretation and risk management

Legal counsel interprets laws and advises on compliance across jurisdictions. They handle questions about the Privacy Act, OMB guidance, state laws, contractual obligations, and liability exposure. They also advise on hiring consultants or engaging service providers who will handle PII.

Legal translates regulatory requirements into business decisions. When a regulation says you must implement "reasonable security measures," legal counsel defines what that means for your organization given your size, resources, and risk profile.

When to involve them: Cross-departmental policy revisions, major system integrations, vendor contracts involving PII, breach response, or any situation with potential legal exposure.

Executives and CEO: Resources and oversight

Senior management allocates resources and maintains ultimate responsibility per NIST SP 800-122 (Section 3.2, page 3-2). No amount of delegation removes this accountability. When a breach occurs, regulators look to the top—did leadership provide adequate budget, enforce policies, and ensure proper training?

Executives make the strategic decisions: how much to invest in security infrastructure, whether to collect certain types of PII, which markets to enter (each with different regulations), and how to respond when prevention fails.

When to involve them: High-risk projects, significant policy changes, budget decisions for security infrastructure, breach response coordination, or situations that could result in regulatory penalties or reputational damage.

What PII protection tasks are everyone's responsibility

Vigilance and reporting are everyone's responsibility. NIST emphasizes that while specialized roles implement specific controls, all personnel must remain alert to potential PII exposure.

The practical controls everyone owns:

  • Spotting anomalies: Unusual data requests, suspicious emails, unexpected access attempts, vendors asking for information they shouldn't need.
  • Following procedures: Using approved channels for sharing PII, encrypting sensitive documents, properly disposing of records containing PII, locking screens when away from desks.
  • Questioning excessive collection: Challenging forms or processes that collect more PII than necessary. The person closest to the work often spots unnecessary data gathering before privacy officers review it.
  • Immediate reporting: Flagging potential breaches, phishing attempts, or policy violations upward without delay. The cost of investigating a false alarm is trivial compared to the cost of ignoring an actual breach.

This shared responsibility doesn't mean everyone makes compliance decisions - it means everyone contributes to the intelligence system that catches problems before they become breaches. The administrative assistant who questions why a new vendor needs employee Social Security numbers might prevent a breach that the CISO never sees.

The breakdown happens when "everyone's responsibility" becomes "no one's responsibility." Clear escalation paths fix this: employees spot and report, specialized roles investigate and decide, management provides resources and oversight.

Save 98% of your redaction time

AI-powered redaction that actually works

Is phishing responsible for PII data breaches

Phishing attacks caused over 300,000 healthcare data breaches yearly, with credential theft remaining the primary attack vector. Recent FBI and CMS warnings emphasize phishing as the top threat to PII security across sectors.

The mechanism is straightforward: an employee receives an email that appears to come from IT, a vendor, or management. The email requests login credentials, contains a malicious link, or includes an attachment with malware. One click grants attackers access to systems containing PII.

Healthcare proves especially vulnerable because Protected Health Information commands high black market prices and healthcare workers often operate under time pressure that makes them more likely to click without careful evaluation.

Every role prevents phishing differently:

  • Employees receive training on spotting suspicious emails - odd sender addresses, urgent language demanding immediate action, requests for credentials, unexpected attachments. They report suspicious emails rather than deleting them, because one person's suspicious email might be targeting hundreds of others.
  • IT and CISOs implement technical defenses: email filtering, multi-factor authentication that prevents credential theft from succeeding, monitoring systems that detect unusual access patterns, and regular security awareness training.
  • Privacy officers ensure that breach notification procedures work when phishing succeeds. They maintain the documentation required to notify affected individuals and regulators within legal timeframes.
  • Legal counsel manages the response when phishing leads to PII exposure—determining notification obligations, coordinating with law enforcement, managing public communications.
  • Executives fund the infrastructure and training that prevents phishing and respond decisively when prevention fails.

The shared responsibility model applies directly: technical controls reduce phishing success rates, but employee awareness provides the final defense. NIST SP 800-122 emphasizes annual training as essential (Section 4.3, page 4-3), because phishing techniques evolve faster than technical defenses can adapt.

How to delegate PII protection tasks safely

Delegation prevents bottlenecks, but poor delegation creates gaps where no one owns critical tasks. The framework: delegate execution, maintain oversight, escalate based on risk.

Escalate by risk

Routine tasks that don't require higher approval

  • Low-risk data handling: Document owners and IT teams can handle routine PII tasks—preparing reports with properly redacted sensitive information, managing access to systems, implementing standard encryption protocols, following established procedures for data sharing.
  • Phishing training and response: IT can manage ongoing awareness programs, email filtering configuration, and initial incident response for suspected phishing without executive involvement for each incident.
  • Standard vendor assessments: For vendors who won't access PII or who are using established, approved platforms, routine due diligence can happen at operational levels.

Use NIST's risk factors for quick triage: identifiability (does it directly identify individuals?), quantity (hundreds of records or millions?), context (routine business use or novel application?), sensitivity (addresses or medical records?).

Low identifiability, small quantity, routine context, low sensitivity—delegate freely. Any factor elevated—escalate.

When to involve specialized roles

Data integration projects: New systems that combine data sources require privacy officer and legal review, particularly if they create new ways to identify individuals or enable new uses of existing PII.

Regulated data: HIPAA-covered Protected Health Information always requires privacy officer involvement. Don't delegate HIPAA compliance decisions to IT alone.

Cross-border transfers: GDPR and other international regulations create complex requirements for moving PII across borders. Legal counsel must evaluate these before implementation.

Third-party access: When external vendors, contractors, or service providers will access PII, privacy officers and legal counsel should review contracts, assess security measures, and document the data processing agreement.

High-volume processing: Projects involving millions of records, even if routine, warrant specialized review because the impact of errors scales with volume.

Calculate your redaction costs

Compare Redactable vs. manual workflows

What requires executive decision-making

  • Resource allocation: Only executives can decide to fund security infrastructure, hire specialized roles, or prioritize PII protection over competing business needs.
  • Risk acceptance: When compliance is too expensive or operationally difficult, executives must explicitly accept the risk. They cannot delegate this decision.
  • Breach response strategy: The decision to notify affected individuals, engage with media, or cooperate with regulators requires executive approval because it affects reputation and legal exposure.
  • Policy exceptions: Requests to violate established PII policies for business reasons must reach executives who can weigh business value against compliance risk.

When external consultants make sense

Most organizations don't need consultants for basic PII protection. NIST guidance assumes internal resources handle routine compliance.

Consultants add value when:

  • You lack internal privacy officers or DPOs and face immediate compliance deadlines
  • You're entering new regulatory environments (expanding to EU markets requiring GDPR compliance)
  • You're responding to a breach and need specialized incident response expertise
  • You're implementing complex technical controls beyond your IT team's capabilities

Don't hire consultants to avoid building internal capability. Privacy and security require ongoing attention that consultants can't provide intermittently.

Who performs PII redaction in different contexts

Redaction is a specific PII protection task with clear delegation rules based on document type and regulatory context.

WhoPerformsPII

Legal and court documents

Legal and compliance teams perform redaction for FOIA requests, discovery responses, and court filings, with privacy officer oversight and legal counsel approval. Federal agencies redact using specific FOIA exemptions for law enforcement records, medical information, and personal privacy protection.

Why this matters: Court documents have admissibility requirements and audit trail needs that make redaction errors particularly costly. Metadata that remains in "redacted" PDFs can be discovered by opposing counsel, exposing information you intended to protect.

1,732 U.S. breaches in the first half of 2025 exposed millions of Social Security numbers, often because metadata persisted after visual redaction. Simple black boxes over text don't remove the underlying content—the text remains in the file structure, fully recoverable.

Healthcare and HIPAA compliance

Compliance and privacy officers perform PHI de-identification, sometimes delegating to trained IT staff under supervision. HIPAA requires removing 18 specific identifiers before disclosure: names, geographic subdivisions smaller than state, dates (except year), phone numbers, fax numbers, email addresses, Social Security numbers, medical record numbers, health plan beneficiary numbers, account numbers, certificate/license numbers, vehicle identifiers, device identifiers, web URLs, IP addresses, biometric identifiers, full-face photos, and any other unique identifying characteristics.

Expert determination applies when statistical methods de-identify data while preserving analytical value. This requires specialized knowledge that most IT teams don't possess.

Routine document sharing

Document owners work with IT teams to redact routine reports and communications, with privacy office verification for consistency. This includes preparing board reports, vendor communications, and internal documents that will be shared beyond the team that created them.

The verification step catches common errors: inconsistent redaction (some instances of a name redacted, others visible), metadata that reveals redacted content, formatting that allows text recovery, and incomplete coverage of PII types.

High-volume or breach response situations

Cross-functional teams coordinate large-scale redaction - IT, legal, CISO, with privacy officers leading and executives funding resources as needed. Automation becomes necessary when you're processing thousands of documents, but human verification remains essential.

Breach response redaction is particularly urgent. When you've discovered unauthorized PII exposure, you need to assess what was exposed (requiring un-redacted review) and prepare redacted versions for notification and regulatory reporting (requiring rapid, verified redaction).

The coordination challenge: legal needs redacted versions for court filings, privacy needs them for regulatory notification, IT needs them for system cleanup, and management needs them for public communications. One redaction process serving multiple needs requires clear ownership—typically privacy officers coordinate with legal counsel approval.

Permanent redaction vs visual hiding

See how Redactable actually removes your data

Key redaction triggers that require immediate action

Certain situations demand redaction regardless of who performs it:

External document sharing: FOIA requests, court discovery, regulatory submissions, public records releases. OMB M-07-16 mandates minimization before external sharing.

Compliance requirements: HIPAA demands de-identification for research use, CCPA requires it for data sharing with processors, GDPR mandates it for legitimate interest processing.

High-impact PII: Social Security numbers, medical records, financial account numbers, biometric data—these warrant redaction even for internal use when recipients don't need that level of detail.

Breach response cleanup: After discovering unauthorized access, redacted versions prevent additional exposure during investigation and remediation.

The trigger that teams miss: metadata and hidden content. FTC enforcement actions increasingly target organizations that share documents with PII embedded in metadata, even when visible text is properly redacted.

Traditional PDF redaction tools add visual masks without removing underlying data. Copy the text, paste it into a word processor, and everything you thought you redacted appears intact. Search the document for a supposedly redacted Social Security number, and it shows up in results.

Proper redaction requires:

  • Permanent removal of text from document structure
  • Complete metadata stripping
  • Verification through copy-paste and search tests
  • Audit trail documentation for compliance purposes

Implementing clear PII protection responsibilities

Defining ownership across PII

Confusion about PII protection creates the conditions for breaches. Clear role definition, proper delegation, and documented procedures prevent the gaps where no one takes ownership.

Start with an annual PII inventory. NIST and OMB require knowing what PII you hold (Section 2.2, page 2-2), where it's stored, who accesses it, and why you need it. Purge unnecessary PII immediately - you can't breach data you don't hold.

Train on roles, not just threats. Employees need to know what they're responsible for (spotting and reporting), what IT handles (technical safeguards), what privacy officers do (regulatory compliance), what legal counsels (risk interpretation), and when to escalate to executives (high-risk decisions). Generic "security awareness" training doesn't create this clarity.

Establish escalation paths for common scenarios:

  • Phishing email received → Report to IT immediately
  • Vendor requests customer data → Privacy officer reviews necessity and legal approves contract
  • New system will store PII → Privacy impact assessment before implementation
  • Document needs external sharing → Redaction by appropriate role with verification
  • Possible breach discovered → CISO coordinates immediate response, legal manages notification obligations

Build verification into delegation. When IT performs routine redaction, privacy spot-checks for consistency. When document owners prepare reports, someone verifies PII removal. When vendors process PII under contract, regular audits confirm compliance.F

Document everything. NIST emphasizes audit trails - who redacted what, when, under what authority, and what verification occurred. This documentation becomes essential during regulatory investigations or litigation.

The most important step: executives must demonstrate that PII protection is a priority through resource allocation and consequence enforcement. When leadership treats compliance as a formality rather than a requirement, confusion multiplies and breaches follow.

Organizations that define roles clearly, delegate appropriately, and implement proper verification procedures don't just avoid fines - they build the trust that comes from actually protecting the information customers and employees share with them.

Interested in learning more?

Learn why we're the #1 redaction software today!
Try for free

Frequently asked questions

Who is responsible for protecting PII in a company?

Ultimate responsibility rests with senior leadership—boards and CEOs face liability for PII breaches. However, protection requires coordinated effort across roles: privacy officers define compliance requirements, CISOs implement technical safeguards, legal counsel interprets regulations, IT teams secure systems, and every employee must spot and report risks. NIST SP 800-122 makes clear that while executives allocate resources and maintain accountability, everyone shares vigilance. The confusion that leads to breaches happens when teams assume someone else owns PII protection entirely.

What is the role of a privacy officer in protecting PII?

Privacy officers assess privacy impacts, minimize PII collection, conduct privacy impact assessments, and ensure regulatory compliance with HIPAA, CCPA, and GDPR. They translate regulations into operational requirements—determining what consent is needed for new data collection, what security measures are mandatory, and when Data Protection Officers must be appointed under GDPR. Privacy officers don't make business decisions about whether to collect PII, but they define how to handle it compliantly once that business decision is made. For HIPAA-covered entities, privacy officers ensure all 18 PHI identifiers are properly protected and de-identified before disclosure.

Can PII protection be fully delegated to IT?

No. IT and CISOs handle technical safeguards like encryption, access controls, and system monitoring, but they can't make compliance or policy decisions. Legal counsel must interpret regulations, privacy officers must assess impacts, and executives must allocate resources and accept risk. Delegating routine cybersecurity tasks to IT makes sense—implementing multi-factor authentication, configuring firewalls, managing user permissions. But decisions about what PII to collect, how to use it, when to share it with vendors, and how to respond to breaches require cross-functional involvement. The mistake is assuming technical controls alone satisfy regulatory requirements.

How do you know when to escalate PII concerns?

Use NIST's risk factors for quick triage: identifiability (does it directly identify individuals?), quantity (hundreds of records or millions?), context (routine business use or new application?), and sensitivity (email addresses or medical records?). Low-risk situations—routine reports with properly redacted information, standard vendor assessments for providers who won't access PII—can be handled by document owners and IT teams. Escalate to privacy officers when: new systems will collect or combine PII, regulated data like HIPAA PHI is involved, vendors will access PII, or you're unsure if an activity complies with regulations. Escalate to executives for: high-risk projects, policy exceptions, breach response, or decisions requiring significant resources.

What are the most common PII protection mistakes?

The biggest mistake is assuming visual redaction removes sensitive data. Black boxes over text in PDFs leave the underlying content intact—copy and paste reveals everything you thought you protected. Metadata remains in files even when visible text is redacted, exposing author names, edit history, and hidden comments. Other common errors include: collecting more PII than necessary (increasing breach exposure), failing to train employees on their responsibilities (creating gaps in vigilance), not documenting who performed redactions and when (failing audit requirements), delegating HIPAA compliance entirely to IT (missing regulatory nuances), and assuming breach notification procedures work without testing them. Organizations often lack complete inventories of what PII they hold and where it's stored, making comprehensive protection impossible.

Is phishing really a major cause of PII data breaches?

Yes. Phishing attacks caused over 300,000 healthcare data breaches yearly according to HIPAA Journal data, with recent FBI and CMS warnings emphasizing phishing as the top PII security threat. Phishing succeeds because it targets human behavior rather than technical vulnerabilities. An employee receives what appears to be a legitimate email from IT, management, or a vendor requesting credentials or containing a malicious attachment. One click grants attackers access to systems containing millions of PII records. Healthcare organizations face higher risk because Protected Health Information commands black market premiums and healthcare workers operate under time pressure that makes careful email evaluation difficult. Defense requires both technical controls (email filtering, multi-factor authentication, monitoring) and employee awareness (spotting suspicious sender addresses, questioning urgent requests, reporting rather than deleting suspicious emails).

Who should perform PII redaction in different situations?

For legal documents and court filings, legal and compliance teams perform redaction with privacy officer oversight and counsel approval—admissibility requirements and audit trails make errors costly. For healthcare PHI de-identification under HIPAA, compliance and privacy officers handle the work, sometimes delegating to trained IT staff for the 18 required identifier removals. For routine document sharing like board reports and vendor communications, document owners work with IT teams and privacy office verification catches inconsistencies. For high-volume situations or breach response, cross-functional teams coordinate with privacy officers leading and executives funding resources. The critical requirement across all contexts: permanent removal of PII from document structure and metadata, not just visual masking that leaves data recoverable.

What are the real-world consequences when companies fail to protect PII?

The consequences are severe and multi-layered. You're looking at significant financial penalties - TikTok just paid €530 million in GDPR fines for inadequate data transfer protections. Beyond regulatory fines, there's the per-record cost of breaches, which averaged $160 in 2025. But the damage doesn't stop at dollars. Your organization faces reputational harm that can take years to rebuild, potential lawsuits from affected individuals, and erosion of customer trust that directly impacts your bottom line. Senior leadership bears ultimate liability - boards and CEOs can face personal consequences when breaches occur.

Ready to get started?

Try Redactable for free and find out why we're the gold standard for redaction
Try for free
Secure icon, green background and white checkmark

No credit card required

Secure icon, green background and white checkmark

Start redacting for free

Secure icon, green background and white checkmark

Cancel any time