When data security is a matter of life and death

Home / Insights / When data security is a matter of life and death

Insights

When data security is a matter of life and death

Most organisations think about data security in terms of fines, downtime, or reputational harm. For some people, though, a breach isn’t just costly - it’s dangerous.

In the UK, a Ministry of Defence error exposed identities and contact details of Afghans linked to British operations. Many of those individuals were still living under Taliban control. Publishing their names, roles, and phone numbers didn’t just “violate privacy.” It could have put targets on their backs. The government scrambled to warn people, move families, and lock down processes. Parliamentary questions followed; costs ballooned; trust eroded.

That incident is a stark reminder: data isn’t abstract. It maps to human beings. And in some sectors-defence, humanitarian aid, healthcare, whistleblowing, domestic violence services-security failures can literally become life-and-death events.

This post breaks down how such breaches happen, and why “good intentions + spreadsheets” isn’t a safety strategy:

The chain of failure

It’s rarely one glitch. High-stakes breaches usually involve several mundane problems lining up:

  • Over-collection & centralisation
    Too many fields gathered “just in case,” stored in a single place. One mistake now has systemic blast radius.
  • Unstructured workflows
    Staff export CSVs, email attachments, and copy-paste lists because the “official system” is slow or unclear.
  • Weak sharing controls
    Open mailing lists, permissive Google/M365 links, or misconfigured access groups make it easy to overshare.
  • No contextual guardrails
    Systems don’t know that this dataset is sensitive or that these recipients are outside the risk boundary.
  • Lack of detection & response
    If something is sent to the wrong person, there’s no automated containment.
  • Secrecy over governance
    When incidents are hushed rather than managed, lessons don’t propagate and the same risks persist.

Necessary precautions

If the data you hold could endanger individuals - whether employees, informants, patients, or refugees then security must be designed around people, not just compliance checklists. That means:

  • Minimising what you collect, how long you keep it, and where it lives.
  • Compartmentalising by default, limiting who can ever see sensitive attributes.
  • Instrumenting every movement of sensitive data with auditability and real-time controls.
  • Automating protection so safety never depends on one person remembering the right checkbox.
  • Practising incident “muscle memory”: simulate, detect, contain, notify, and learn.
Author photo

By John Noble, Director at dataXchange

At dataXchange, I focus on harnessing the power of data integrity and security to create seamless file transfer experiences for our users. With a background in data-driven marketing, I understand the critical importance of fast, reliable, and secure data movement – and that’s exactly what dataXchange delivers.

Oct 2, 2025