Recent reporting on a data security incident at the U.S. Equal Employment Opportunity Commission (EEOC) highlights a challenge that many federal agencies and enterprises continue to face: data exposure that originates not from an external attacker, but from individuals who already had authorized access to systems.
According to the agency’s notification, the incident involved contractor employees with privileged access who handled sensitive information in an unauthorized and prohibited manner. While investigations are ongoing and details remain limited, the circumstances spotlight how identity-based access alone is not sufficient to protect sensitive data once access is granted.
In many security models, the primary question is whether a user should be allowed into a system. Background checks are performed, credentials are issued, and role-based access controls determine who can log in. In this case, the individuals involved reportedly met applicable screening requirements and were entrusted with elevated access to agency systems.
Yet the incident was triggered not by a failure of authentication, but by how data was handled after access was granted.
This distinction matters. Identity and access management systems are designed to answer who can access a platform, but they often provide limited enforcement over what happens to data once it is accessed. If a user can view sensitive information, they may also be able to copy it, download it, or move it beyond its intended context unless additional controls are in place.
A data-centric security model approaches this dynamic differently. Rather than focusing exclusively on securing systems and identities, it places controls directly on the data objects themselves.
When protections are embedded at the data layer:
These controls are particularly important in environments that rely heavily on contractors, third parties, and privileged users—where broad system access is often necessary, but unrestricted data use is not.
Recommended Reading: Identity is the New Perimeter, but Data is Still the Target: Unpacking the CrowdStrike-SGNL Acquisition
None of this diminishes the importance of identity, access management, or workforce screening. Those measures remain foundational. However, incidents like this one reinforce that identity-based trust must be complemented by data-level enforcement.
When employees or contractors “technically have access,” the question becomes whether the organization has the ability to enforce appropriate use of sensitive information in real time—and to limit exposure if that trust is violated.
As agencies continue to modernize systems and adopt Zero Trust principles, protecting data where it lives and travels must extend beyond infrastructure and identity layers. Sensitive information (especially personally identifiable information) requires controls that travel with the data itself.
While the full scope of the EEOC incident is still being assessed, it serves as a reminder that the most consequential data risks often emerge from inside trusted environments. Addressing those risks requires a shift in focus; from who can access systems, to how data is protected wherever it goes.
Nick is the Communications Manager at Virtru. With 8 years of experience in tech-focused public relations and media content, he has a passion for news analysis and finding the story behind the story.
View more posts by Nick MichaelSee Virtru In Action
Sign Up for the Virtru Newsletter


/blog%20-%20marquis%20exploit/Marquise-Zero-Day.webp)
/blog%20-%20the%20data%20layer/geode.webp)

/blog%20-%20From%20Zero%20Trust%20Principles%20to%20Practice/dcs-principles.webp)

/blog%20-%20Zero%20Trust%20Primer%20-%20N5K%20series/Zero-Trust-Primer%20copy.webp)
/blog%20-%20Private%20Cloud%20Compute%20is%20Only%20Half%20the%20Story/PrivateCloudCompute.png)

Contact us to learn more about our partnership opportunities.