Threat four: lax procedures for handling 'sensitive' information
While you might be scrupulous about how you handle and store sensitive information once you’ve actually received it, other users might be much less rigorous - ultimately undermining your integrity and the security of the information you have sent them.
Even if an organisation's computer systems are secure, there is no guarantee that sensitive information will be appropriately handled once it reaches them.
How Secure eMail can help: Terms and conditions
Before anyone can join the Secure eMail service, they have to agree to our terms and conditions, which sets out in great detail the levels of security we expect them to maintain.
This ranges from ensuring that they have a hardware firewall installed, to making sure that strangers are accompanied at all times in areas where Secure eMail is being used.
We also require users to comply with all relevant legislation, including the Data Protection Act, when sending, receiving or storing Secure eMails.
The day-to-day benefits of using Secure eMail
Security issues aside, Secure eMail will also enable you to share sensitive information, up to and including anything marked restricted, with anyone in the criminal justice community, quickly and reliably. So everyday processes can be handled in a more secure, efficient and cost-effective way.
Want to find out more?