Avoiding Email Data Security Breaches

Pause for a second and take advantage of another pair of eyes!

|
|
PUBLISHED on
5 Oct
2022

For all of us, email can be both a blessing and a curse.  On one hand you have the speed and convenience of communication and an audit trail, and on the other hand you have a significant information security risk.  In recent years, a number of large Information Commissioner’s Office (ICO) fines have arisen due to simple human error in relation to email communication.

What are Some of the Email Risks?

There are a range of risks attached to email communication, one of the biggest involving emails containing personal data being sent to the wrong email address.  This could be the result of a number of factors including:

  • A typo in the address held for the person on the organisation’s CRM database
  • Transcription error by the sender
  • The sender incorrectly selecting another addressee suggested by the email system’s autofill predictive text feature
  • Accidentally including other recipients of the email in the ‘cc’ line (i.e., visible to all) rather than ‘bcc’ (‘blind copy’).

There is also the risk of an individual forwarding an email which contains sensitive information within the email trail.

Such errors are greatly amplified when the contents of the email contain highly sensitive personal data, for example, ‘delicate’ medical information.  The results of such apparently ‘simple’ oversights can be catastrophic, both for the individuals concerned and the sender organisation.

How Can We Reduce the Risks?

There are, of course, technological solutions which organisations can deploy to minimise the risk of staff members causing ‘email’ data breaches.  For example, where the email system identifies an unfamiliar email address in the ‘To’ field, before the email is sent.  However, while these tools may pick up a database typo or an incorrectly addressed email, they do not address the other types of misdirected email risks, e.g., the mistakenly clicked-on autofill or the use of ‘cc’ instead of ‘bcc’.  In other words, the addresses in themselves are perfectly valid, but the sender has inadvertently entered them in the wrong email, or in the wrong line on the right email.

Need for ‘People’ and ‘Process’ Controls

Where technology cannot eliminate a risk, organisations must concentrate their risk reduction measures on the other two elements of organisational risk management, i.e., ‘people’ and ‘process’.  This can be achieved through the delivery of training sessions where the goal is to instil the importance of users getting into the habit of pausing for a few seconds before pressing the ‘Send’ button.  Users should be encouraged to pause and double check that the recipient email addresses on their emails are correct (sometimes called the ‘check twice, send once’ approach).  They need to check that typos don’t result in messages being delivered to an unintended recipient, potentially leading to an unauthorised disclosure of personal data.  Users also need to be reminded to check full email trails to ensure there is no inadvertent disclosure of sensitive information or personal data within the trail.

Second Pair of Eyes

Some organisations, which regularly send emails containing sensitive personal information outside the organisation, have found it beneficial to institute a procedure (‘process’) for mitigating the risk of incorrect addressing, and which is often referred to as a ‘second pair of eyes’.  This involves an ‘appropriate’ colleague, perhaps the email writer’s line manager, checking the intended sender’s email, prior to sending, to ensure that all recipients are correctly specified and the appropriate ‘cc’ or ‘bcc’ line has been used.  Whether adopting such a ‘second pair of eyes’ protocol is feasible in your organisation will depend on such factors as the volume and frequency of emails containing sensitive personal being sent, the number of appropriate reviewers available and any other technical solutions used, for example, some automated email software packages allow bulk emails to be sent to individual addressees, removing the need to use the ‘cc’ or ‘bcc’ fields.

Satisfy GDPR Requirements

Principle 6 and Article 32 of the UK GDPR require organisations to implement appropriate technical and organisational security measures proportionate to the risk involved in their processing of personal data.  Taken together, these two simple but effective data risk reduction organisational measures, which could be summarised as ‘Take a second, or use a second pair of eyes’, could help your organisation meet the requirements for email security controls, sitting alongside your organisation’s email acceptable use policy.

Gain a sound grounding and practical interpretation of the GDPR and the DPA 2018!

By attending URM’s online BCS Foundation Certificate in Data Protection course, you will gain valuable insights into the key aspects of current DP legislation including rights of data subjects and data controller obligations.
Thumbnail of the Blog Illustration
Data Protection
Published on
8/2/2024
10 Top Tips for Achieving GDPR Compliance

URM provide 10 actionable top tips that will allow you to take significant steps forward in your compliance journey.

Read more
Thumbnail of the Blog Illustration
Data Protection
Published on
10/6/2022
How to Create a Record of Processing Activities (ROPA)

In this blog, we will outline a step-by-step procedure on how you can create a ROPA.

Read more
Thumbnail of the Blog Illustration
Data Protection
Published on
14/3/2024
URM Analyses ICO’s Enforcement Actions Since the GDPR was Introduced in 2018

URM’s blog breaks down which Articles of the GDPR have seen the greatest number of enforcement actions by the ICO, and which have gone largely unenforced.

Read more
We used URM as we had a large amount of information to redact for a Court of Protection case and neither had the time nor the knowledge to be able to complete this appropriately. URM were suggested to us and we made contact. They responded very quickly and were able to explain their role, estimated timescales & costings. During the initial consultation, they were very professional and approachable, and certainly had the skills we required. URM’s consultant provided us with details of the work they had completed before & we felt confident to pursue the work with them. We were on a tight deadline for court and URM were confident that they could provide the services we required in a timely manner. The logistics of sending a large amount of confidential documents were easy to navigate and straightforward. We were unable to very accurately gauge how much work was required, however URM’s Team supported us with this and maintained regular contact regarding their progress and addressed any concerns they had. When we needed to contact them, they were prompt with their responses. The work did take longer that envisaged, however that was due to the amount of work that we, as clients, were unable to accurately identify would be required. We did, however, meet the deadline for court. I would certainly use the services of URM again & if possible would work with same team. The services are not cheap, however redacting sensitive information is a skilled task and, therefore, having a professional complete this work is priceless.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.