Know and understand minimising the potential danger of using email including an awareness of the potential dangers of opening or replying to an email from an unknown person, an awareness of the risks associated with sending personal identifiable data
Safety and Security – Email (IGCSE ICT 0417)
1. Why Email Safety Matters
Email is the main method of communication in schools, homes and workplaces. Mis‑use can lead to:
Loss of privacy or identity theft
Financial loss (card‑fraud, ransomware payments)
Damage to personal or organisational reputation
Legal or disciplinary consequences if personal data is mishandled
Archives – .zip or .7z (use a strong password if the archive contains PID)
Compression – reduce file size before attaching; most operating systems allow right‑click → “Compress”.
Folder hierarchy – store received and sent attachments in clearly named folders (e.g., School/2025‑Term‑1/English/Assignments) to avoid losing track of sensitive files.
12. How to Minimise the Potential Danger of Using Email
Apply these steps each time you receive, read, reply to or send an email.
12.1 Verify the Sender
Hover over the displayed name to see the full email address.
Check the domain (e.g., @school.edu vs. @school.co).
If anything looks odd, contact the sender via a known alternative channel (phone, face‑to‑face, a previously verified email address).
12.2 Handle Attachments and Links Safely
Do not open unexpected attachments – even from a known sender.
Ask the sender to confirm the attachment via a separate message or phone call.
Hover over every link; compare the URL shown in the status bar with the claimed destination.
Copy the link into a new browser tab (do not click directly) and verify HTTPS and correct spelling.
Scan all attachments with anti‑malware before opening.
12.3 Use Encryption for Sensitive Emails
S/MIME or PGP – encrypt the whole message and optionally add a digital signature.
SSL/TLS – ensure the web‑mail interface shows a padlock; this protects the connection.
If built‑in encryption is unavailable, upload the file to a password‑protected cloud folder and send only the link.
Remember: encryption protects data in transit; it does not stop the recipient from forwarding the email.
12.4 Protect Your Privacy Settings
Disable automatic image loading (usually under Settings → Privacy or Reading).
Turn off “request read receipt” unless required for a specific purpose.
Review who can see your profile picture and contact details in the email service.
12.5 Limit the Amount of Personal Data Sent
Ask yourself: “Is this name, address, DOB and a photo of my ID really needed?”
Redact unnecessary fields with a PDF editor or image‑editing tool.
Prefer a protected cloud link to an attachment when large or sensitive files are involved.
12.6 Maintain Account Security
Use a strong, unique password for the email account.
Enable 2FA (app‑based codes or hardware token).
Log out of shared computers and clear browser cache after each session.
12.7 Keep Software & Anti‑Malware Updated
Enable automatic updates for the OS, browser and email client.
Update anti‑malware definitions daily; run a full scan weekly.
12.8 Regular House‑keeping
Delete emails that contain PID or sensitive attachments as soon as they are no longer needed.
Empty the “Deleted Items”/“Trash” folder regularly.
Archive old, non‑sensitive correspondence in a secure, organised folder structure.
13. Checklist for Safe Email Use
Action
Why It Is Important
How to Do It
Check sender address
Prevents impersonation and phishing
Hover over the name, read the full address, verify the domain.
Verify attachments
Stops malware infection
Confirm via phone or a separate email; scan with anti‑virus before opening.
Hover over links
Detects malicious URLs
Move the cursor over the link; compare displayed URL with the claimed site.
Use encryption for PID
Protects data in transit
Enable S/MIME or PGP, or share a password‑protected cloud link.
Limit personal data
Reduces exposure if intercepted or forwarded
Send only essential information; redact unnecessary parts.
Enable two‑factor authentication
Adds a second security layer
Activate 2FA in the provider’s security settings (app code or hardware key).
Keep software & anti‑malware updated
Closes known security vulnerabilities
Turn on automatic updates; run daily definition updates and weekly full scans.
Regularly purge the inbox and permanently delete items from the Trash folder.
Apply appropriate email etiquette
Ensures clear, professional communication
Use a relevant subject, greeting, concise body, proper sign‑off, correct CC/BCC.
Consider audience & copyright
Matches tone to recipient and respects intellectual property
Identify the audience, choose formality, use only licensed images and cite sources.
Save attachments in safe formats & compress large files
Facilitates easy opening and reduces risk of size‑related errors
Use .pdf, .jpg/.png, .zip; compress before attaching.
Suggested diagram: Flowchart of safe email handling – from receiving the message, verifying the sender, checking attachments/links, deciding whether to encrypt, applying etiquette, and finally replying or forwarding.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.