Know and understand minimising the potential danger of using email including an awareness of the potential dangers of opening or replying to an email from an unknown person, an awareness of the risks associated with sending personal identifiable data
Students will know and understand how to minimise the potential danger of using email, including:
Awareness of the potential dangers of opening or replying to an email from an unknown person.
Awareness of the risks associated with sending personally identifiable data or images via email.
1. Why Email Can Be Risky
Email is a convenient communication tool, but it can be exploited for malicious purposes. The main reasons are:
It can carry hidden code (malware, ransomware) in attachments or links.
It allows impersonation (phishing) where the sender pretends to be someone trusted.
It provides a channel for accidental disclosure of personal or confidential information.
2. Common Email Threats
Phishing – deceptive messages that ask for login details or personal data.
Malware attachments – files that execute harmful code when opened.
Spam – unsolicited messages that may contain scams or unwanted advertising.
Spoofing – forged sender addresses that make the email appear to come from a legitimate source.
3. Safe Email Practices
Follow these steps each time you handle an email:
Check the sender’s address carefully. Look for misspellings or unexpected domains.
Hover over any links to view the actual URL before clicking.
Do not open attachments unless you are sure of the source and purpose.
Use built‑in spam filters and report suspicious messages to your IT administrator.
Keep your email client and anti‑virus software up to date.
4. Risks of Sending Personal Identifiable Data (PID) or Images
Personal Identifiable Data includes names, addresses, phone numbers, ID numbers, and photographs that can be used to identify an individual. Sending PID via email can lead to:
Identity theft if the email is intercepted or accessed by unauthorised persons.
Unintended distribution if the email is forwarded without consent.
Legal consequences under data protection regulations.
To protect PID:
Encrypt the email or use a secure file‑sharing service.
Ask the recipient to confirm receipt and delete the message after use.
Avoid including unnecessary personal details in the body or subject line.
Never send images of official documents (e.g., passports) unless absolutely required and encrypted.
5. Email Safety Checklist for Students
Action
Check
Verify sender’s email address
☐
Hover over links to view full URL
☐
Open attachments only from trusted sources
☐
Use encryption for PID or sensitive images
☐
Confirm receipt and request deletion after use
☐
Report suspicious email to teacher/IT staff
☐
6. Summary of Threats and Mitigation
Threat
Potential Impact
Mitigation Strategy
Phishing
Loss of login credentials, financial fraud
Verify sender, avoid clicking unknown links, use two‑factor authentication
Malware attachment
System infection, data loss
Scan attachments with anti‑virus, open only trusted files, keep software updated
Spam
Clutter, exposure to scams
Use spam filters, delete unsolicited messages, never reply
Spoofing
Deception, unauthorized data disclosure
Check email headers, confirm via alternate communication channel
Sending PID/images
Identity theft, privacy breach
Encrypt, limit information, use secure transfer methods
Suggested diagram: Flowchart of safe email handling process (from receipt to reply or deletion).