woman using laptop in university
4 min

To Secure or Not to Secure: What Counts as PII and Why?

Posted by Picture of Sam Kendall Sam Kendall

We all know we shouldn’t send certain information without protection - card numbers, passwords - but some data might sit in a mental grey area.

Names, dates of birth, even memorable words might seem harmless alone, yet combined they can expose far more than we realise.

Whether you’re sharing personal details with a friend or handling customer data at work, it’s worth asking: when does information become sensitive enough to secure?

Let’s explore what counts as personally identifiable information (PII), why it matters, and how to decide when - and how - to keep it safe.

What Counts as PII?

Understanding the Building Blocks of Identity

PII - or personally identifiable information - is any data that can identify a specific individual, either on its own or when combined with other information (see UK GDPR guidance).

Direct identifiers include details such as your name, address, or ID number.

Indirect identifiers might seem harmless - your job title, date of birth, or postcode - but linked together, they can reveal more than intended.

Think of PII as a puzzle: one piece on its own may not say much, but put several together and it forms a clear picture of who you are.

PII = puzzle pieces that form a picture of identity

Why Protecting PII Matters - For You and Others

The Real-World Impact of Information Leaks

When information falls into the wrong hands, it can have serious consequences - for you and the people whose data you handle.

Personally, exposed details can lead to identity theft, fraud, or targeted scams.

At work, a single mis-sent email can put customer trust - and compliance - at risk.

And in both cases, there’s the emotional cost: stress, embarrassment, and a loss of confidence in everyday communication.

"Even ordinary details can become risky when combined - protecting them isn’t over-cautious, it’s responsible."

Paul Holland, Founder, Beyond Encryption

What to Secure and What’s (Usually) Safe

Examples to Help You Judge What Needs Protection

Type Examples Should You Secure It? Why
Financial details Card numbers, account info, payslips ✅ Always Used for fraud or identity theft.
Personal identifiers Name + address, DOB, NI number ⚠️ Often Low risk alone, high in combination.
Health or benefits data Prescriptions, claims, medical notes ✅ Always Considered “special category” data.
Work data Client info, ID numbers, internal reports ✅ Always Contains others’ personal data.
Public data Job title, company name ❌ Usually fine Safe in isolation but watch the context.
If you wouldn’t write it on a postcard, encrypt it

At Work: Protecting Other People’s Information

Every Email Is a Responsibility

Most data breaches aren’t the result of hackers - they happen through everyday mistakes.

If you handle customer or colleague information, treat it like your own:

  • Double-check the recipient before hitting send.
  • Don’t forward sensitive messages to personal inboxes.
  • Use secure email for anything containing PII or attachments.
  • Delete files and messages when they’re no longer needed.

Solutions like Mailock automatically identify when an email might contain personal data and apply the right protection before it leaves your outbox.

At Home: Protecting Your Own Data

Simple Everyday Habits That Make a Difference

Good digital habits at home go a long way toward protecting your privacy:

  • Be cautious when sharing personal information online or over email.
  • Watch out for phishing emails or fake sender addresses.
  • Turn on two-factor authentication for important accounts.
  • Store ID documents and financial files in encrypted folders or apps.
  • Use encrypted email when sending private documents.
  • Follow NCSC tips for safer everyday online habits.
  • Regularly delete old emails containing sensitive information.

Data security at home starts with small, repeatable habits

The Golden Rule: The Postcard Test

If You’d Be Uncomfortable Posting It, Secure It

Before sending any message, ask yourself:

  • Would I write this on a postcard?
  • Would I be happy if a stranger saw it?

If the answer is no - encrypt it. And if it contains someone else’s information, always err on the side of caution.

Tools like Mailock make this simple, offering end-to-end encryption, recipient authentication, and the ability to revoke a message if needed.

How Encryption and Authentication Work Together

Locking Messages and Proving Identities

Encryption protects the contents of an email by converting it into unreadable code until the right person opens it.

Authentication verifies who that person is - using a code, security question, or digital certificate.

Secure messaging tools that introduce security alerts can also help you catch risks before you hit send, prompting you to encrypt or challenge recipients when sensitive content is detected.

Together, these tools protect not just data - but the people behind it.

Key Takeaway

Protecting Information Protects People

Whether it’s your own details or someone else’s, protecting information is about respect and responsibility.

A few simple habits - and the right technology - can prevent costly mistakes and build lasting trust.

Just email it (securely)! CTA

FAQs

What Counts as PII?

PII includes any information that can identify someone - like names, addresses, ID numbers, or data that, when combined, reveals an individual.

Is It Overkill to Encrypt Everyday Emails?

No - most breaches come from routine communication. Encryption adds a layer of safety that prevents exposure if something goes wrong.

How Can I Make Sure I Don’t Send Data by Mistake?

Use tools like Mailock that flag sensitive content, require verification before access, and allow you to revoke messages after sending.

 

References

UK GDPR Guidance, ICO, 2024

Top Tips for Staying Secure Online, NCSC, 2025

Reviewed by

Sam Kendall, 02.01.26

 

Originally posted on 11 11 25
Last updated on January 2, 2026

Posted by: Sam Kendall

Sam Kendall is a marketing strategist with over a decade of experience working on how organisations communicate with people through digital channels. At Beyond Encryption, he leads digital marketing, collaborating closely with product and sales on secure, trustworthy customer communications. His work is grounded in research, buying behaviour, and practical experience, with a focus on clarity, consistency, and long-term effectiveness rather than short-term tactics.

Return to listing