SOS – I am Being Asked for Confidential Information

In Brief

Check the classification level of the information requested. Afterwards, make sure that:

  • the person requesting this information can be sufficiently well identified for the criticality of the information (if secret or confidential information is requested, the identity of the requesting party must be ascertained with certainty);
  • the requesting party is authorised to hold this information (access control policy);
  • the criticality of the information authorises the use of the proposed communication channels (sectoral policy on the classification and control of resources).

If these three conditions are fulfilled, the information can be transmitted. If there is any doubt over this, refuse to communicate the information requested.

Checking Somebody’s Identity

It is very difficult to be sure of someone’s identity:

  • The identity of someone who sends an e-mail can only be verified if the e-mail bears an electronic signature and the resource used results in the necessary level of trust.
  • The identity of someone over the telephone is very difficult to verify, too. The telephone number displayed can be faked (‘caller id spoofing’). There are also ways to fake the timbre of a person’s voice. A certain level of assurance can be established if you offer to call back the displayed number, to verify that it does belong to whom the person claims to be.

Check the Legitimacy of the Request

Before forwarding information to an identified person, check whether that person is entitled to receive the desired information. This obviously depends on the situation and partly depends on common sense, the security policy implemented or other rules defined within the organisation.

Choose the Right Communication Channel

Before transmitting any information, be sure to select the appropriate communication channel corresponding to the criticality level of the data to be transmitted. Remember that:

  • E-mail provides no guarantee of confidentiality. By using strong encryption, the use of e-mail is conceivable. However, the encryption key still needs to be transferred securely, without using e-mail, so secure methods for exchanging keys or asymmetric cryptography must be used. See also E-mail: best practices and OpenPGP.
  • The landline telephone network and GSM networks are much safer (although in some cases it is possible to listen in on them) and can be used to exchange passwords.

Table of Content