We all know we shouldn’t send certain information without protection - card numbers, passwords - but some data might sit in a mental grey area.
Names, dates of birth, even memorable words might seem harmless alone, yet combined they can expose far more than we realise.
Whether you’re sharing personal details with a friend or handling customer data at work, it’s worth asking: when does information become sensitive enough to secure?
Let’s explore what counts as personally identifiable information (PII), why it matters, and how to decide when - and how - to keep it safe.
What Counts as PII?
Understanding the Building Blocks of Identity
PII - or personally identifiable information - is any data that can identify a specific individual, either on its own or when combined with other information (see UK GDPR guidance).
Direct identifiers include details such as your name, address, or ID number.
Indirect identifiers might seem harmless - your job title, date of birth, or postcode - but linked together, they can reveal more than intended.
Think of PII as a puzzle: one piece on its own may not say much, but put several together and it forms a clear picture of who you are.
Why Protecting PII Matters - For You and Others
The Real-World Impact of Information Leaks
When information falls into the wrong hands, it can have serious consequences - for you and the people whose data you handle.
Personally, exposed details can lead to identity theft, fraud, or targeted scams.
At work, a single mis-sent email can put customer trust - and compliance - at risk.
And in both cases, there’s the emotional cost: stress, embarrassment, and a loss of confidence in everyday communication.
"Even ordinary details can become risky when combined - protecting them isn’t over-cautious, it’s responsible."
Follow NCSC tips for safer everyday online habits.
Regularly delete old emails containing sensitive information.
The Golden Rule: The Postcard Test
If You’d Be Uncomfortable Posting It, Secure It
Before sending any message, ask yourself:
Would I write this on a postcard?
Would I be happy if a stranger saw it?
If the answer is no - encrypt it. And if it contains someone else’s information, always err on the side of caution.
Tools like Mailock make this simple, offering end-to-end encryption, recipient authentication, and the ability to revoke a message if needed.
How Encryption and Authentication Work Together
Locking Messages and Proving Identities
Encryption protects the contents of an email by converting it into unreadable code until the right person opens it.
Authentication verifies who that person is - using a code, security question, or digital certificate.
Secure messaging tools that introduce security alerts can also help you catch risks before you hit send, prompting you to encrypt or challenge recipients when sensitive content is detected.
Together, these tools protect not just data - but the people behind it.
Key Takeaway
Protecting Information Protects People
Whether it’s your own details or someone else’s, protecting information is about respect and responsibility.
A few simple habits - and the right technology - can prevent costly mistakes and build lasting trust.
FAQs
What Counts as PII?
PII includes any information that can identify someone - like names, addresses, ID numbers, or data that, when combined, reveals an individual.
Is It Overkill to Encrypt Everyday Emails?
No - most breaches come from routine communication. Encryption adds a layer of safety that prevents exposure if something goes wrong.
How Can I Make Sure I Don’t Send Data by Mistake?
Use tools like Mailock that flag sensitive content, require verification before access, and allow you to revoke messages after sending.
Sam Kendall is a marketing strategist with over a decade of experience working on how organisations communicate with people through digital channels. At Beyond Encryption, he leads digital marketing, collaborating closely with product and sales on secure, trustworthy customer communications. His work is grounded in research, buying behaviour, and practical experience, with a focus on clarity, consistency, and long-term effectiveness rather than short-term tactics.