We all know we shouldn’t send certain information without protection - card numbers, passwords - but some data might sit in a mental grey area.
Names, dates of birth, even memorable words might seem harmless alone, yet combined they can expose far more than we realise.
Whether you’re sharing personal details with a friend or handling customer data at work, it’s worth asking: when does information become sensitive enough to secure?
Let’s explore what counts as personally identifiable information (PII), why it matters, and how to decide when - and how - to keep it safe.
What Counts as PII?
Understanding the Building Blocks of Identity
PII - or personally identifiable information - is any data that can identify a specific individual, either on its own or when combined with other information.
Direct identifiers include details such as your name, address, or ID number.
Indirect identifiers might seem harmless - your job title, date of birth, or postcode - but linked together, they can reveal more than intended.
Think of PII as a puzzle: one piece on its own may not say much, but put several together and it forms a clear picture of who you are.
Why Protecting PII Matters - For You and Others
The Real-World Impact of Information Leaks
When information falls into the wrong hands, it can have serious consequences - for you and the people whose data you handle.
Personally, exposed details can lead to identity theft, fraud, or targeted scams.
At work, a single mis-sent email can put customer trust - and compliance - at risk.
And in both cases, there’s the emotional cost: stress, embarrassment, and a loss of confidence in everyday communication.
"Even ordinary details can become risky when combined - protecting them isn’t over-cautious, it’s responsible."
Regularly delete old emails containing sensitive information.
The Golden Rule: The Postcard Test
If You’d Be Uncomfortable Posting It, Secure It
Before sending any message, ask yourself:
Would I write this on a postcard?
Would I be happy if a stranger saw it?
If the answer is no - encrypt it. And if it contains someone else’s information, always err on the side of caution.
Tools like Mailock make this simple, offering end-to-end encryption, recipient authentication, and the ability to revoke a message if needed.
How Encryption and Authentication Work Together
Locking Messages and Proving Identities
Encryption protects the contents of an email by converting it into unreadable code until the right person opens it.
Authentication verifies who that person is - using a code, security question, or digital certificate.
Secure messaging tools that introduce security alerts can also help you catch risks before you hit send, prompting you to encrypt or challenge recipients when sensitive content is detected.
Together, these tools protect not just data - but the people behind it.
Key Takeaway
Protecting Information Protects People
Whether it’s your own details or someone else’s, protecting information is about respect and responsibility.
A few simple habits - and the right technology - can prevent costly mistakes and build lasting trust.
FAQs
What counts as PII?
PII includes any information that can identify someone - like names, addresses, ID numbers, or data that, when combined, reveals an individual.
Is it overkill to encrypt everyday emails?
No - most breaches come from routine communication. Encryption adds a layer of safety that prevents exposure if something goes wrong.
How can I make sure I don’t send data by mistake?
Use tools like Mailock that flag sensitive content, require verification before access, and allow you to revoke messages after sending.
Sam Kendall is a digital strategy specialist with nearly a decade of experience exploring the intersection of technology, culture, and transformation. At Beyond Encryption, he drives strategic marketing initiatives that enhance secure digital communications and foster digital identity innovation. Known for insightful research into digital culture and user behaviour, Sam combines expertise in SEO, CRO, and demand generation with a deep understanding of the evolving digital landscape. His work empowers organisations to navigate complex challenges in digital transformation with clarity and confidence.