Skip to content

Menu

Jackson Lewis P.C.  logo
HomeAboutServicesContactSubscribe
Search
Close

Workplace Privacy, Data Management & Security Report

The Hidden Risks of Information Disclosure: A Costly Lesson from Cornwall

By Joseph J. Lazzarotti on December 9, 2025
Posted in Data Privacy, Governance, Risk, and Compliance, Information Risk

When Royal Cornwall Hospital responded to a routine Freedom of Information request in 2023, they had no idea they were about to expose sensitive staff data to the public. The hospital recently apologized after discovering that a spreadsheet published on their website contained hidden sickness absence data for 8,100 current and former employees spanning three years. The breach wasn’t discovered until someone accessing the file brought it to the hospital’s attention, meaning the confidential information sat publicly available for an extended period.

This incident serves as a stark reminder that even well-intentioned compliance with information requests can go disastrously wrong when proper safeguards aren’t in place.

The Metadata Problem: What You Don’t See Can Hurt You

The Royal Cornwall case exemplifies a critical vulnerability that many organizations overlook: hidden data in electronic documents. Spreadsheets, Word documents, and PDFs routinely contain metadata, hidden columns, tracked changes, embedded comments, and deleted content that remains recoverable. In Cornwall’s case, staff absence information was lurking in the spreadsheet despite not being visible in the normal view.

When employees aren’t specifically trained to identify and scrub these hidden fields before responding to information requests, they may unwittingly disclose trade secrets, personnel matters, or protected personal information. A document that appears appropriate to share on the surface might contain embedded discussions of confidential business strategy, salary negotiations, or sensitive health information that could harm the organization or violate privacy rights.

The same risks exist with email correspondence. An employee responding to a document request might forward an email thread without carefully reviewing the entire string. What appears appropriate at the top might be fine, but buried further down could be discussions of unrelated confidential matters or protected information. Once disclosed, that information cannot be retrieved.

Not All Requests Deserve Blanket Compliance

Even when faced with what appears to be a legally mandated request, organizations have both the right and the responsibility to evaluate whether the scope is appropriate.

Consider the attorney representing a former employee in a car accident case who demands “the entire personnel file and all medical records.” Does that lawyer truly need every performance review, every disciplinary action, and every medical claim the employee ever submitted? Probably not.

While federal and state laws may authorize, permit, or even require certain disclosures in specific circumstances, these laws typically don’t mandate blanket disclosure of everything requested. Organizations can and should push back when requests seem overbroad or when the stated purpose doesn’t align with the scope of information demanded. Understanding the basis and genuine need behind each request isn’t obstructionist—it’s prudent stewardship of sensitive information.

Building a Defensible Position Through Policy and Training

Royal Cornwall Hospital’s response to their breach demonstrates both the immediate damage control required and the long-term changes necessary. They reported the incident to the Information Commissioner’s Office, removed the spreadsheet, suspended their disclosure log for review, and implemented new processes to ensure spreadsheet files are “fully disabled” before any FOI disclosure. They also introduced additional data handling checks.

But these measures came after affecting thousands of people. The key to protecting your organization lies in being deliberate and systematic before a breach occurs. This starts with developing written policies and protocols that clearly outline how information requests should be handled, who has authority to respond, and what review processes must occur before disclosure.

Regular training is equally essential. Employees need to understand not just the technical aspects of scrubbing metadata and reviewing documents, but also the legal and ethical dimensions of information disclosure. They should know when to escalate requests to legal counsel or management, and they should feel empowered to question whether a request is reasonable. Data minimization principles and practices (including under the CCPA) apply not only to data collection and retention, but also disclosure.

When an inadvertent disclosure does occur, having documented policies and evidence of regular training significantly strengthens an organization’s defensible position. It demonstrates the presence of reasonable precautions, which can be crucial in limiting liability and maintaining trust.

Tags: CCPA, metadata, minimization, permissible disclosure, PII
Print:
Email this postTweet this postLike this postShare this post on LinkedIn
Photo of Joseph J. Lazzarotti Joseph J. Lazzarotti

Joseph J. Lazzarotti is a principal in the Tampa, Florida, office of Jackson Lewis P.C. He founded and currently co-leads the firm’s Privacy, Data and Cybersecurity practice group, edits the firm’s Privacy Blog, and is a Certified Information Privacy Professional (CIPP) with the…

Joseph J. Lazzarotti is a principal in the Tampa, Florida, office of Jackson Lewis P.C. He founded and currently co-leads the firm’s Privacy, Data and Cybersecurity practice group, edits the firm’s Privacy Blog, and is a Certified Information Privacy Professional (CIPP) with the International Association of Privacy Professionals. Trained as an employee benefits lawyer, focused on compliance, Joe also is a member of the firm’s Employee Benefits practice group.

In short, his practice focuses on the matrix of laws governing the privacy, security, and management of data, as well as the impact and regulation of social media. He also counsels companies on compliance, fiduciary, taxation, and administrative matters with respect to employee benefit plans.

Read more about Joseph J. Lazzarotti
Show more Show less
Related Posts
hacker hand stealing data from laptop top down
Towfiqu barbhuiya, Unsplash
Insights From The IBM 2023 Cost of a Data Breach Report
September 5, 2023
Beds at a hospital in Sinjar.
Levi Meir Clancy, Unsplash
Hospital Mergers Double the Risk of a Data Breach, Study Shows
August 15, 2023
Gaming Keyboard
Xeriss, Unsplash
Cyber Safety Review Board Issues Compelling Report about Lapsus$, MFA Vulnerabilities, and Helpful Recommendations
August 14, 2023
Jackson Lewis JacksonLewis.com

Stay Connected

Subscribe to this blog via RSS Follow Us on Twitter Add us on Facebook View Our LinkedIn Profile

Topics

Archives

Editors

  • Jason C. Gavejian
  • Joseph J. Lazzarotti

Contributors

  • Christopher E. Hoyme
  • Damon W. Silver
  • Michael R. Bertoncini
  • Marlo Johnson Roebuck
  • Nathan W. Austin
  • Nicky Jatana
  • Jeffrey M. Schlossberg

Blog Authors Show/Hide

  • Joseph J. Lazzarotti
  • Jason C. Gavejian
  • Maya Atrakchi
  • Jackson Lewis P.C.
  • Mary T. Costigan
  • Damon W. Silver
  • Jeffrey M. Schlossberg
  • Michael R. Bertoncini
  • Robert Yang
  • Christopher E. Hoyme
  • Eric J. Felsberg
  • Rachel E. Ehlers
  • Sean Paisan
  • Melissa Pascualini
  • Jody Kahn Mason
  • Frank J. Fanshawe
  • Gregory C. Brown Jr.
  • Delonie A. Plummer
  • Richard I. Greenberg
  • Michelle L. Duncan
  • Jerel Pacis Agatep
  • Cecilie E. Read
  • Catherine R. Tucciarello
  • Todd R. Dobry
  • Susan M. Corcoran
  • Phillip A. Baggett
  • Dorothy Parson McDermott
  • Ryan J. Soscia
  • Ronald V. Sgambati
  • Nathan W. Austin
  • Joshua D. Allen
  • Jason Selvey
  • Michelle T. Hackim
  • Daniel J. Moses
  • Amanda A. Simpson
  • Yvonne Arvanitis Fossati
  • Teri Wilford Wood
  • Shannon Bettis Nakabayashi
  • Paul A. Friedman
  • Nikolas S. Dean
  • Marlo Johnson Roebuck
  • Melissa Ostrower
  • Michael H. Neifach
  • Joseph J. Lynett
  • Kevin B. Hambly
  • Jennifer Shoaf Richardson
  • Jackson Biesecker
  • Francis P. Alvarez
  • Christopher T. Patrick
  • Cheyna Galloway
  • Amy L. Peck
  • Zachary A. Ahonen
  • John A. Snyder
  • Sierra Vierra
  • Stephanie L. Adler-Paindiris
  • Richard F. Vitarelli
  • Kathryn J. Russo
  • Rachel A. Jacob
  • Philip M. Duclos
  • Laura A. Mitchell
  • Michael D. Ridenour
  • Michael A. Giarratano
  • Maryam Shokry
  • Leo P. Norton
  • Kevin D. Holden
  • Kelly E. Eisenlohr-Moul
  • Julia Bover
  • Joshua M. Henderson
  • Jonathan J. Spitz
  • Jamie L. Levitt
  • Valerie K. Jackson
  • Howard M. Bloom
  • Greg Alvarez
  • Erik J. Winton
  • Ena T. Diaz
  • Elizabeth S. Walsh
  • David R. Golder
  • Craig W. Wiley
  • Clifford R. Atlas
  • Cindy Y. Huang
  • Chai Williams
  • Chad P. Richter
  • Brian L. McDermott
  • Ashley Solowan
  • Angelika Avagian
  • Alec Nealon
  • Theron Velazquez
  • Terri Bowman
  • Robert Pfeifer
  • Regan Harrison
  • Paige
  • Nicky Jatana
  • Nicole A. Trotta
  • Mei Fung So
  • Mariama Keita
  • lbarksdale
  • Lara Hamm
  • Kourtney Goebel
  • Kendall Melidosian
  • Gayla Kirkland
  • Kelly Heber
  • Katharine C. Weber
  • Joanne Marsh
  • Jessica Poot
  • Jenifer M. Bologna
  • Jen Starken
  • Jonathan L. Crook
  • Haley Nystrom
  • Camille​​​​ Garcia‑Mendoza
  • Ann Albertson

Recent Upates

  • Top 10 Privacy, AI & Cybersecurity Issues for 2026
  • Florida’s Digital Wiretapping Surge: What Businesses Need to Know About FSCA Litigation
  • New CCPA Regulations Go Into Effect, Updated FAQs Summarize Key Compliance Requirements
  • The Hidden Legal Minefield: Compliance Concerns with AI Smart Glasses, Part 4: Data Security, Breach Notification, and Third-Party AI Processing Risks
  • The Hidden Legal Minefield: Compliance Concerns with AI Smart Glasses, Part 3 –Privacy, Surveillance, and Labor Law Violations

Jackson Lewis

Subscribe to this blog via RSS Follow Us on Twitter Add us on Facebook View Our LinkedIn Profile
Privacy PolicyDisclaimer

About Jackson Lewis

Focused on employment and labor law since 1958, Jackson Lewis P.C.’s 1,100+ attorneys located in major cities nationwide consistently identify and respond to new ways workplace law intersects business. We help employers develop proactive strategies, strong policies and business-oriented solutions to cultivate high-functioning workforces that are engaged and stable, and share our clients’ goals to emphasize belonging and respect for the contributions of every employee.

Read More...
Copyright © 2026, Jackson Lewis P.C. All Rights Reserved.
Law blog design & platform by LexBlog LexBlog Logo