What to do if…
you realise you sent confidential information to the wrong recipient at work
Short answer
Contain it fast (revoke access/recall if possible), then report it immediately to your company’s IT/security and privacy/compliance contact so the incident can be assessed, documented, and handled correctly.
Do not do these things
- Don’t pretend it didn’t happen or try to “solve it quietly” by deleting your sent message.
- Don’t send additional sensitive details while trying to explain the mistake.
- Don’t argue with or pressure the recipient; keep your request brief and practical.
- Don’t assume there are no obligations because it was accidental—requirements depend on the data type, contracts, and state/federal rules.
- Don’t notify customers/regulators/media yourself unless your role and policy explicitly require it.
What to do now
- Stop and write down the facts (1 minute). What was sent, when, to whom, how (attachment, link, system), and whether it included personal data, credentials, or regulated information.
- Try immediate containment.
- Use any message recall/undo send option available in your email system (if supported).
- If you sent a cloud link (SharePoint/OneDrive/Google Drive/Box, etc.), turn off the link, remove external sharing, or remove that recipient’s access.
- If you granted access to a folder/project, revoke permissions for that recipient.
- Contact the recipient promptly and neutrally. Ask them to:
- Not open/use the information,
- Delete it (including trash/deleted items),
- Confirm in writing that they deleted it and didn’t forward or copy it.
- Report it immediately through your organization’s incident route. Commonly this means:
- IT/security (or the security operations/help desk),
- Privacy/compliance (or legal),
- Your manager (so reporting is not delayed). Use clear language: “Possible data breach / accidental disclosure — misdirected email.”
- If credentials or access details were included, treat it as urgent (but coordinate).
- Ask IT/security to reset exposed passwords, revoke tokens/links, disable access, and rotate shared secrets if needed.
- Flag if the data is regulated or especially sensitive (you don’t need to decide coverage). Tell privacy/compliance immediately if it involved:
- Health information (possible HIPAA implications),
- Financial account details,
- Government identifiers (e.g., SSNs),
- Payroll/benefits files,
- Customer lists with contact + sensitive fields,
- Attorney-client or other privileged/confidential material.
- Create a clean incident record. Save the sent message metadata (time, recipient address, subject, attachments/links), your containment actions, and the recipient’s deletion confirmation. Keep the record factual and minimal.
What can wait
- Figuring out “which law applies” yourself (state breach-notification rules and sector rules are complex and handled by compliance/legal).
- Writing a long explanation or apology; short, factual reporting is enough right now.
- Discussing blame, performance impact, or disciplinary outcomes.
- Long-term prevention changes (labels, DLP rules, training, templates).
Important reassurance
People make this mistake in real workplaces. What matters most is speed and clarity: rapid containment plus prompt reporting gives your organization the best chance to limit exposure and follow the right process.
Scope note
These are first steps only. Next steps (risk assessment, notification decisions, contractual notices, remediation) should be directed by your organization’s incident response, privacy/compliance, and legal teams.
Important note
This guide is general information, not legal advice. Follow your employer’s policies and directions from IT/security, privacy/compliance, and legal—especially where personal data, regulated data (such as HIPAA), or contractual confidentiality obligations may apply.
Additional Resources
- https://www.ftc.gov/business-guidance/resources/data-breach-response-guide-business
- https://www.nist.gov/itl/smallbusinesscyber/guidance-topic/responding-cyber-incident
- https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html
- https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-29.pdf