woman using laptop in university
4 min

To Secure or Not to Secure: What Counts as PII and Why?

Posted by Picture of Sam Kendall Sam Kendall

We all know we shouldn’t send certain information without protection - card numbers, passwords - but some data might sit in a mental grey area.

Names, dates of birth, even memorable words might seem harmless alone, yet combined they can expose far more than we realise.

Whether you’re sharing personal details with a friend or handling customer data at work, it’s worth asking: when does information become sensitive enough to secure?

Let’s explore what counts as personally identifiable information (PII), why it matters, and how to decide when - and how - to keep it safe.

What Counts as PII?

Understanding the Building Blocks of Identity

PII - or personally identifiable information - is any data that can identify a specific individual, either on its own or when combined with other information.

Direct identifiers include details such as your name, address, or ID number.

Indirect identifiers might seem harmless - your job title, date of birth, or postcode - but linked together, they can reveal more than intended.

Think of PII as a puzzle: one piece on its own may not say much, but put several together and it forms a clear picture of who you are.

PII = puzzle pieces that form a picture of identity

Why Protecting PII Matters - For You and Others

The Real-World Impact of Information Leaks

When information falls into the wrong hands, it can have serious consequences - for you and the people whose data you handle.

Personally, exposed details can lead to identity theft, fraud, or targeted scams.

At work, a single mis-sent email can put customer trust - and compliance - at risk.

And in both cases, there’s the emotional cost: stress, embarrassment, and a loss of confidence in everyday communication.

"Even ordinary details can become risky when combined - protecting them isn’t over-cautious, it’s responsible."

Paul Holland, Founder, Beyond Encryption

What to Secure and What’s (Usually) Safe

Examples to Help You Judge What Needs Protection

Type Examples Should You Secure It? Why
Financial details Card numbers, account info, payslips ✅ Always Used for fraud or identity theft.
Personal identifiers Name + address, DOB, NI number ⚠️ Often Low risk alone, high in combination.
Health or benefits data Prescriptions, claims, medical notes ✅ Always Considered “special category” data.
Work data Client info, ID numbers, internal reports ✅ Always Contains others’ personal data.
Public data Job title, company name ❌ Usually fine Safe in isolation but watch the context.
If you wouldn’t write it on a postcard, encrypt it

At Work: Protecting Other People’s Information

Every Email Is a Responsibility

Most data breaches aren’t the result of hackers - they happen through everyday mistakes.

If you handle customer or colleague information, treat it like your own:

  • Double-check the recipient before hitting send.
  • Don’t forward sensitive messages to personal inboxes.
  • Use secure email for anything containing PII or attachments.
  • Delete files and messages when they’re no longer needed.

Solutions like Mailock automatically identify when an email might contain personal data and apply the right protection before it leaves your outbox.

At Home: Protecting Your Own Data

Simple Everyday Habits That Make a Difference

Good digital habits at home go a long way toward protecting your privacy:

  • Be cautious when sharing personal information online or over email.
  • Watch out for phishing emails or fake sender addresses.
  • Turn on two-factor authentication for important accounts.
  • Store ID documents and financial files in encrypted folders or apps.
  • Use encrypted email when sending private documents.
  • Regularly delete old emails containing sensitive information.

Data security at home starts with small, repeatable habits

The Golden Rule: The Postcard Test

If You’d Be Uncomfortable Posting It, Secure It

Before sending any message, ask yourself:

  • Would I write this on a postcard?
  • Would I be happy if a stranger saw it?

If the answer is no - encrypt it. And if it contains someone else’s information, always err on the side of caution.

Tools like Mailock make this simple, offering end-to-end encryption, recipient authentication, and the ability to revoke a message if needed.

How Encryption and Authentication Work Together

Locking Messages and Proving Identities

Encryption protects the contents of an email by converting it into unreadable code until the right person opens it.

Authentication verifies who that person is - using a code, security question, or digital certificate.

Secure messaging tools that introduce security alerts can also help you catch risks before you hit send, prompting you to encrypt or challenge recipients when sensitive content is detected.

Together, these tools protect not just data - but the people behind it.

Key Takeaway

Protecting Information Protects People

Whether it’s your own details or someone else’s, protecting information is about respect and responsibility.

A few simple habits - and the right technology - can prevent costly mistakes and build lasting trust.

Just email it (securely)! CTA

 

FAQs

What counts as PII?

PII includes any information that can identify someone - like names, addresses, ID numbers, or data that, when combined, reveals an individual.

Is it overkill to encrypt everyday emails?

No - most breaches come from routine communication. Encryption adds a layer of safety that prevents exposure if something goes wrong.

How can I make sure I don’t send data by mistake?

Use tools like Mailock that flag sensitive content, require verification before access, and allow you to revoke messages after sending.

 

References

UK GDPR Guidance, ICO, 2024

Top Tips for Staying Secure Online, NCSC, 2024

Reviewed by

Sam Kendall, 04.11.25

 

Originally posted on 11 11 25
Last updated on November 11, 2025

Posted by: Sam Kendall

Sam Kendall is a digital strategy specialist with nearly a decade of experience exploring the intersection of technology, culture, and transformation. At Beyond Encryption, he drives strategic marketing initiatives that enhance secure digital communications and foster digital identity innovation. Known for insightful research into digital culture and user behaviour, Sam combines expertise in SEO, CRO, and demand generation with a deep understanding of the evolving digital landscape. His work empowers organisations to navigate complex challenges in digital transformation with clarity and confidence.

Return to listing