Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

Veeamon Tour'26 - Data & AI Trust CONVERGE for the Agentic Era

View

Here’s What You Should Know About The UK ICO’s Guidance On Disclosing Documents To The Public

Contributors

Anas Baig

Product Marketing Manager at Securiti

Syed Tatheer Kazmi

Data Privacy Analyst

CIPP/Europe

Published February 19, 2026

Listen to the content

For multiple reasons, organizations publish documents regularly. These range from responses to Freedom of Information (FOI) requests to sending information to customers or posting helpful resources online.

While information disclosures such as sending documents to a customer, responding to a DSAR, or publishing documents to the wider public as part of a Freedom of Information Act (FOIA) requirement, are necessary to ensure regulatory compliance and meet customers’ expectations related to trust, it is important to guarantee that all personal information part of such disclosures is appropriately protected.

The focus is directly on visible content. However, this seemingly straightforward task is not without its own risks. Hidden metadata, common histories, embedded spreadsheets, and invisible text can all lead to exposures of personal information, silently, without anyone noticing. However, the resulting consequences will not be so silent.

In its latest guidance, the Information Commissioner’s Office (ICO) has underscored a reality that most organizations either neglect or seriously underestimate. Accidental personal data breaches are still one of the most common reasons for enforcement actions. These are entirely preventable cases of data loss for an organization as they almost always occur due to issues in an organization’s internal oversight mechanisms, such as a missed tracked change, a pivot table that still contains cached source data, or a PDF that wasn’t properly sanitised.

The fact that a single file can contain multiple layers of metadata, hidden objects, and linked resources that most reviewers never see makes the problem that much more serious. Disclosing such files without a systematic check would be akin to mailing a sealed envelope without notifying the recipient of the sensitive passwords or other information written on the outside.

With this guidance, the ICO provides clear and practical steps that organizations can leverage to find and eliminate hidden personal information. Read on to learn more.

Why Do Accidental Breaches Occur

In almost all cases, people are much more likely to make mistakes when one or more factors are present. These factors can be concerning the organization, a specific job, or employees themselves. These include:

  • poor communication about internal policies and procedures;
  • lack of regular training;
  • inadequate resources;
  • challenging workloads;
  • time pressure;
  • employee fatigue and stress.

Circumstances of the Breach

As important as it is to undertake remedial measures to offset the possible damage by a breach, it is equally important to understand the circumstances behind it. When doing so, the things to consider are:

  • The nature of the breach, who it affects, and what actions can be taken to contain it;
  • Assessment of the possible risks;
  • Why did a breach or a possible breach occur in the first place?

A Checklist to Consider

The guidance aims to give as much help as possible to organizations on how to avoid accidental breaches. However, when working with people, there will always be some risks. In any case, if there is a breach, organizations should:

  • Record the details of the breach, including facts, its effects, and remedial actions being undertaken;
  • Report it to the relevant authorities without undue delay, where possible within 72 hours of becoming aware of it;
  • Report the person or people affected by the breach about it without undue delay if the risk is high.

Moreover, actions must be taken to:

  • Act promptly to contain the breach;
  • Assess the risk;
  • Take appropriate action per relevant internal policies and procedures;
  • Investigate and take further action to avoid future repetitions.

When Might Organizations Disclose Documents to the Public

Organizations may disclose documents to the public generally when publishing information online. Additionally, public disclosure may be the result of specific responsibilities under FOIA and the Environmental Information Regulations 2004 (EIR) to respond to requests for information and proactively publish certain information. Lastly, disclosures may also be made to specific members of the public rather than the wider public, such as disclosures to update a customer or a response to a SAR under data protection regulations.

However, before disclosing documents that contain personal information, organizations must generally:

  • Ensure compliance with data protection principles and individual rights;
  • Only disclose information if done lawfully, fairly, and transparently;
  • Consider any relevant individual rights.

Principles to Help Avoid Accidental Breaches

a. Data Minimization

Data minimization ensures only the minimal amount of data is ever collected and thus exposed. Under it, all personal information being used must be:

  • Adequate for your purpose;
  • Relevant for that purpose;
  • Limited to what is necessary to achieve that purpose.

b. Data Limitation

All collected personal information must be kept only for as long as needed. It should be deleted or anonymized when no longer needed.

c. Data Security

The security principle consists of both integrity and confidentiality principles. It requires organizations to have appropriate measures in place to protect against unauthorized or unlawful use, accidental loss, destruction, or damage.

d. Accountability

Organizations must be able to readily demonstrate that their use of the collected personal information is in line with all the GDPR’s data protection principles.

An Accidental Breach When Personal Information is Hidden

In case an accidental breach occurs when the personal information is hidden in the documents released, the organization must:

  • Have data protection policies and procedures in place to respond to such breaches;
  • Comply with the relevant obligations per information access and data protection legislation;
  • Keep all personal information secure using appropriate methods.

Organizations should:

  • Give staff appropriate data protection training about disclosing documents securely and how to report breaches;
  • Check all documents appropriately before disclosing them;
  • Know how to remove personal information that cannot be disclosed and how to redact it effectively;
  • Undertake measures to eliminate ineffective techniques.

Organizations could:

  • Raise awareness internally about the risks of accidentally disclosing documents containing personal information;
  • Use software to search for text that may be of the same color as the background;
  • Use software tools designed to help find various types of personal information;
  • Convert complex files into simpler formats to reveal all displayable information in the document;
  • Check the file size to ensure it is not larger than the expected volume of the file;
  • Use a retention schedule to identify when to remove or delete personal information permanently.

How Does Converting Documents Help in Identifying Hidden Personal Information

Organizations must consider converting their data files into simpler formats (e.g., CSV or TXT) to ensure easier identification of hidden information. These formats display all information contained in the document. Conversion to other widely used formats, such as PDFs, is not recommended, since they may not always display all information in the document.

Once the conversion is done, organizations must consider any obligations under various laws they may be subject to when it comes to releasing documents. Some factors to consider are:

How to Reduce the Chances of Ineffective Techniques Being Used

Some steps organizations can take to ensure ineffective techniques such as simply changing the color of the text or background, covering information with objects, moving information to the document’s fringes, or formatting information to make it invisible, are not used whilst trying to keep personal information secure include:

  • Control and restrict access to information within a document. This can be done through using various methods, such as in-document passwords and secure redaction;
  • Checking documents thoroughly for hidden personal information before disclosing them;
  • Leverage automated software to scan entire documents for information that may be hidden, such as within images or in different text colors.

Metadata: A Risk?

Metadata is the embedded information in any document. In essence, it is data about the data. In most cases, it is automatically embedded after the document is created, edited, or saved. Examples of such metadata are author name, subject, title, information about email sender and recipient, and information about image files called EXIF or GPS coordinates.

While it may be helpful and appropriate to disclose some metadata publicly, there may be some information that is not appropriate. This can be released accidentally in case an organization does not realize the information is automatically embedded.

However, due diligence remains the most effective way to prevent such risk. Organizations can leverage the aforementioned section on converting files to simpler formats to minimize the chances of such risks.

An Accidental Breach When Personal Information Is Hidden In Spreadsheets

The different steps an organization must, should, and could take include the following:

Organizations must:

  • Have comprehensive policies and procedures in place to help staff securely disclose information found in spreadsheets;
  • Rely on sound data hygiene practices, such as effective passwords and secure redaction protocols, to not only remove all such information but also enable the release of documents in a manner more suitable for public release;
  • Comply with relevant obligations under information access and data protection regulations they’re subject to.

Organizations should:

  • Dedicate significant resources to appropriate data protection training for staff when it comes to securely disclosing information in spreadsheets and reporting possible breaches;
  • Avoid ineffective techniques with extra vigilance being adopted when it comes to disclosing spreadsheets;
  • Check information in spreadsheets appropriately before disclosing them;
  • Know how to remove and redact personal information effectively when appropriate.

Organizations could:

  • Raise awareness internally about the greater risk of accidentally disclosing hidden personal information in the spreadsheets;
  • Adopt data management systems that are easier to handle;
  • Convert spreadsheets to simpler formats that display all displayable information;
  • Take extra care to ensure file size is not greater than the size you’d expect for a file with the information you’re about to release;
  • Use a retention schedule to know when to remove or delete personal information permanently.

An Accidental Breach When Redacting Information

Redaction involves the permanent deletion of information from a document because it cannot be disclosed. Organizations rely on various ways to redact information depending on circumstances. They may be small or more extensive.

Redaction may pose a risk itself in cases involving accidental breaches. An example includes what an organization may consider a redacted document that it has redacted using a black marker, but the recipient can view the information simply by holding the document up to the light.

When it comes to avoiding such risks, organizations must adopt appropriate data protection policies and procedures to help the staff in redacting information effectively. Records should be maintained securely while maintaining the integrity of the records.

Other typical measures include regular training sessions in redaction practices for the organization, as well as sound documentation practices in line with the organizational requirements under various laws.

How Securiti Can Help

This guidance from the ICO is meant to be simplistic and easy to understand for businesses without getting them tangled up in complicated software and other protocols. Leveraging automated solutions and sensible data hygiene practices will be more than enough to stave off the risks of accidental breaches, as explained in the guidance.

Securiti is a market leader in providing enterprise data+AI solutions in privacy, security, and compliance. Its plethora of modules is designed to ensure an organization can keep all its bases covered. These include solutions related to DSR automation, data mapping, data access governance, and data lineage. Each of these modules ensures an organization can take the recommendations of this guidance into account when protecting its data assets or when releasing these documents to the public in a secure manner.

Request a demo today and learn about how Securiti can help you release documents to the public without incurring any accidental breaches.

Frequently Asked Questions (FAQs) about the ICO’s Guidance

Some of the most commonly asked questions related to the ICO’s guidance on disclosing documents to the public are as follows:

Even with redaction tools, organizations may find a lot of their information still exposed if the redaction is only visual in nature rather than an irreversible removal. In such instances, metadata, revision history, embedded objects, and cached spreadsheets may continue to persist unless they’re specifically sanitized. Moreover, if the redaction is not applied to a copy, the original may also be unintentionally altered if there is an automated backup enabled. Hence, it is important to carry out validation of the final file to guarantee its irrecoverability.

As per the ICO’s recommendation, using built-in inspection tools such as Microsoft’s Document Inspector can be vital in effectively detecting metadata, comments, hidden content, embedded objects, and version history. Moreover, it also recommends converting complex files into simpler formats such as CSV and TXT to reveal any hidden data. Proper redaction techniques, such as visual obfuscation, can also be leveraged.

An accidental personal information breach occurs when personal data is unintentionally disclosed, lost, altered, or accessed by an individual who did not have the authority to see it. This occurs mainly due to simple mistakes such as emailing the wrong recipient, failing to remove hidden metadata, or overlooking comments and tracked changes in a document. Other failures most commonly occurring are caused by a lack of training, time pressure, or a misunderstanding of tools or processes.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
View More
Vietnam’s Law on Artificial Intelligence: A Guide to Compliance
A practical guide to Vietnam’s AI Law, scope, risk-based obligations, provider and deployer duties, governance, timelines, and how businesses can prepare for compliance.
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
Surviving the DROP Platform: Rethinking Privacy Operations for Centralized, Large-Scale Deletion View More
Surviving the DROP Platform: Rethinking Privacy Operations for Centralized, Large-Scale Deletion
Access the whitepaper and explore how the DELETE Act and DROP are transforming privacy compliance, why legacy approaches fail, and how to build scalable,...
View More
Agentic AI & Privacy: Governing Autonomous AI Agents in the Enterprise
Learn how to govern agentic AI in the enterprise. Manage privacy risks, control data access, enforce policies and ensure compliance for autonomous AI agents.
View More
ROT Data Minimization
Eliminate redundant, obsolete, and trivial (ROT) data to improve AI accuracy, reduce storage costs, and minimize security and compliance risks at scale.
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New