Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Remote workers are printing confidential documents at home

UK remote workers printing confidential docs from home and potentially violating GDPR
February 2, 2021

New research reveals 66% of home workers in the U.K. are potentially breaching GDPR regulations by printing work related documents at home, including meeting notes, contracts, commercial documents, payroll documents, CVs and more.

Currently in the UK, all companies that store or process personal information about EU citizens within EU states must comply with the General Data Protection Regulation (GDPR) which requires them to have an effective, documented, auditable process in place for the collection, storage and destruction of personal information. 

But with many employees in the U.K. and the rest of the world now working from home due to government restrictions, how many home workers are potentially breaking confidentiality rules by printing documents at home? 

A new study conducted by confidential shredding and records management company Go Shred finds that 66% of home workers have printed work related documents since they began working from home, averaging five documents every week. That means that since the government first advised against all unnecessary social contact on the 16th March 2020, home workers have potentially printed an average of 2202 confidential documents to date. 

The top five items home workers admit to printing at home are: 

  1. Meeting notes/agendas (42%)
  2. Internal documents including procedure manuals (32%)
  3. Contracts and commercial documents (30%)
  4. Receipts/expense forms (27%)
  5. Industry related copy (e.g. press release/brochure copy/articles/student work to proof) (24%)

A fifth (20%) of remote workers that have printed at home admit to printing confidential employee information including payroll, addresses, medical information and 13% have even printed CVs or application forms. Printing this type of information is a high-risk activity and any documentation which includes these details need to be handled and most importantly disposed of correctly. 

Delving into the places and professions with the highest number of home workers opting to print work related documents at home, Liverpool leads the way with 80% admitting to the act and those working in Law (86%) are surprisingly the most likely occupation to commit this breach. 

When asked whether they have disposed of any printed documents since working from home, nearly a quarter (24%) said haven’t disposed of them yet as they plan to take them back to the office and a further 24% say they used a home shredding machine but then disposed the documents in their own waste. This method of disposal is not recommended due to personal waste bins not providing enough security for confidential waste and therefore still leaving employers open to a data breach and potential fine. 

A further 9% of home workers who have printed work related documents at home say they haven’t disposed of them yet but they do plan to in some way but 8% say they have no plans at all to dispose of the work related documents they have printed at home. Interestingly, 7% of home workers admit they haven’t disposed of any work related documents as they don’t know how to. 

Surprisingly, 41% of home workers say they are aware of the GDPR rules and regulations around printing confidential documents related to work outside the workplace, but they have no choice other than to print at home

To find out more about the study, click here. 

KEYWORDS: data breach data privacy data protection data security GDPR GDPR; security compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • remote work

    Only 53% of Companies Cover the Cost of Home Office Supplies for Remote Workers

    See More
  • SEC0219-data-Feat-slide1_900px

    Data Breach Report: British Printing Press Leaks Confidential Material and More

    See More
  • Security newswire default

    Why the Security of Confidential Documents is a Problem for Enterprises

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing