Messages, Communication, Information Security: Protecting the User from the Data

We present a way of analysing a socio-technical system (i.e. one which contains both human. and mechanical components) for a certain class of undesired characteristics including security breaches, privacy violations, errors being inserted into databases, and the like. We illustrate our approach by means of a case study involving communicating public administrations which we have been studying. We outline a number of options for constructing solution strategies to these problems.