Techniques for protecting personally identifiable information are
described. In an implementation, a method is described which includes
analyzing heuristics which correspond to a communication to determine a
likelihood that the communication relates to a fraudulent attempt to
obtain personally identifiable information. A determination is made based
on the determined likelihood of whether to perform one or more actions in
conjunction with the communication.