How Email Auto-Classification Exposes Your Private Information: A Privacy-First Guide

Email auto-classification systems that sort messages into categories require reading your emails and create detailed behavioral profiles tracking timestamps, locations, devices, and reading habits. This guide reveals what data these systems collect, potential privacy risks, and practical steps to protect yourself while maintaining email functionality.

Published on
Last updated on
+15 min read
Michael Bodekaer

Founder, Board Member

Oliver Jackson

Email Marketing Specialist

Jose Lopez

Head of Growth Engineering

Authored By Michael Bodekaer Founder, Board Member

Michael Bodekaer is a recognized authority in email management and productivity solutions, with over a decade of experience in simplifying communication workflows for individuals and businesses. As the co-founder of Mailbird and a TED speaker, Michael has been at the forefront of developing tools that revolutionize how users manage multiple email accounts. His insights have been featured in leading publications like TechRadar, and he is passionate about helping professionals adopt innovative solutions like unified inboxes, app integrations, and productivity-enhancing features to optimize their daily routines.

Reviewed By Oliver Jackson Email Marketing Specialist

Oliver is an accomplished email marketing specialist with more than a decade's worth of experience. His strategic and creative approach to email campaigns has driven significant growth and engagement for businesses across diverse industries. A thought leader in his field, Oliver is known for his insightful webinars and guest posts, where he shares his expert knowledge. His unique blend of skill, creativity, and understanding of audience dynamics make him a standout in the realm of email marketing.

Tested By Jose Lopez Head of Growth Engineering

José López is a Web Consultant & Developer with over 25 years of experience in the field. He is a full-stack developer who specializes in leading teams, managing operations, and developing complex cloud architectures. With expertise in areas such as Project Management, HTML, CSS, JS, PHP, and SQL, José enjoys mentoring fellow engineers and teaching them how to build and scale web applications.

How Email Auto-Classification Exposes Your Private Information: A Privacy-First Guide
How Email Auto-Classification Exposes Your Private Information: A Privacy-First Guide

If you're concerned about how much your email provider knows about you, you're right to be worried. Email auto-classification systems—those convenient features that automatically sort your messages into categories like "Social," "Promotions," or "Updates"—require extensive analysis of your message content and create comprehensive behavioral profiles that expose far more than most users realize.

The fundamental problem is simple but troubling: for AI to categorize your emails, it must first read them. According to comprehensive research on email categorization privacy risks, there's no technical way to implement auto-classification without analyzing message content, making privacy exposure unavoidable unless you adopt architectural alternatives.

This guide examines exactly what information these systems collect, how that data can be exploited, and most importantly, what practical steps you can take to protect your privacy while maintaining email functionality.

What Auto-Classification Systems Actually Collect About You

What Auto-Classification Systems Actually Collect About You
What Auto-Classification Systems Actually Collect About You

Most users assume email categorization is a simple sorting mechanism. The reality is far more invasive. These systems create detailed behavioral profiles by continuously monitoring multiple dimensions of your email activity.

The Scope of Data Collection Extends Far Beyond Message Sorting

According to research on behavioral analytics in email applications, auto-classification systems track:

  • Exact timestamps of when you opened emails down to the second
  • IP addresses revealing approximate geographic location, sometimes accurate to neighborhoods
  • Device type and operating system information identifying whether you're using a phone, tablet, or computer
  • Email client information revealing whether you're using Gmail, Outlook, or Apple Mail
  • Number of times opened indicating your level of interest in the message
  • Screen resolution data contributing to device fingerprinting

The Federal Trade Commission's investigation of major email providers found that these services collect far more information than necessary, share it with third parties without meaningful consent, and fail to adequately protect it from breaches. The investigation revealed that data flows to analytics partners and third-party data brokers that aggregate information from multiple sources to build comprehensive profiles on individuals.

How Classification Creates Behavioral Profiles

The classification process itself generates revealing patterns. Research demonstrates that auto-classification systems can infer your work schedule and daily routines, identify your closest professional and personal relationships, predict purchasing behavior based on communication with vendors, detect life changes like job transitions or relationship status updates, and map organizational hierarchies showing reporting structures and influence patterns.

Every time you move an email from one category to another, you're training the AI model to better understand your preferences. This creates an explicit feedback loop where your behavior directly trains surveillance systems that become progressively more accurate at predicting your personal circumstances.

The Metadata Problem That Encryption Can't Solve

Even when email content itself remains technically protected through encryption, the metadata accompanying classified emails creates what researchers describe as a detailed behavioral profile. According to analysis of email metadata risks in HIPAA-compliant communications, this metadata includes sender and recipient information, timestamps, subject lines, geographic location, device information, and communication patterns.

The critical issue is that metadata cannot be easily encrypted along with the email body for the system to function properly. This metadata travels alongside the message, making it vulnerable to interception by attackers who can exploit weaknesses in network security.

When metadata is compiled over time, unauthorized parties can piece together comprehensive behavioral profiles including communication patterns revealing who you communicate with and about what topics, geographic locations indicating where you access email, organizational structure becoming apparent through communication networks, and potentially sensitive information about business relationships and partnerships.

How Attackers Exploit Classification Patterns and Metadata

How Attackers Exploit Classification Patterns and Metadata
How Attackers Exploit Classification Patterns and Metadata

Understanding what data is collected is only part of the privacy concern. The more immediate threat is how threat actors actively exploit the behavioral patterns and metadata that auto-classification systems expose.

Organizational Mapping Without Network Access

According to research on how email metadata undermines privacy, attackers use email metadata to identify who communicates with whom, how frequently different individuals exchange messages, and which email addresses appear in correspondence about specific projects or departments. This enables them to construct detailed organizational charts without ever penetrating internal networks or accessing confidential documents.

When attackers analyze metadata revealing that certain employees regularly communicate with specific vendors, they can craft convincing phishing emails impersonating those vendors, complete with details suggesting legitimate business relationships. This metadata analysis enables threat actors to understand communication patterns, identify key decision-makers, determine organizational hierarchy, understand vendor relationships, and craft highly targeted phishing emails that appear to come from trusted internal sources.

AI-Enhanced Social Engineering Attacks

The 2025 SoSafe State of Social Engineering Survey found that 87% of security leaders observed an increase in AI-based social engineering attacks in the past 24 months. These attacks succeed because threat actors use metadata and classification patterns to understand workflows, impersonate roles, and coordinate multi-channel activities.

Research from Palo Alto Networks' 2025 Unit 42 Global Incident Response Report documents that social engineering remained the top initial access vector, with 36% of all incidents beginning with a social engineering tactic. Critically, attackers are using generative AI to craft highly personalized lures using public information, with some campaigns using cloned executive voices in callback scams to increase the plausibility of urgent phone requests.

The research found that 46% of targeted individuals received follow-up emails, and 30% reported continual, deliberately sequenced multi-chain tactics across multiple channels.

Business Email Compromise Through Pattern Analysis

Business Email Compromise (BEC) attacks have become increasingly sophisticated by leveraging the behavioral patterns exposed through email classification systems. According to research from Abnormal AI, recognized as a Leader in the 2025 Gartner Magic Quadrant for Email Security, these systems now leverage identity and context to analyze normal behavior and assess the risk of every cloud email event.

The problem is that the same behavioral analysis used for security can be exploited by attackers. When threat actors gain access to classification patterns and metadata, they can identify which employees handle financial transactions, understand approval workflows, determine who has authority to authorize payments, and craft impersonation attacks that align perfectly with observed communication patterns.

How Major Email Providers Implement Auto-Classification

How Major Email Providers Implement Auto-Classification
How Major Email Providers Implement Auto-Classification

Understanding the specific approaches different email providers take to auto-classification helps clarify the privacy implications and available alternatives.

Gmail's Smart Features and Content Analysis

According to official clarification from Google documented in comprehensive research, Gmail does scan email content to power its own "smart features," such as spam filtering, categorization, and writing suggestions. While this is part of how Gmail normally works and isn't the same as training Google's generative AI models, the distinction matters little from a privacy perspective.

The fundamental issue remains: Gmail's smart features require analyzing your email content to function. The November 2024 confusion incident revealed a critical trust gap where many users discovered they didn't fully understand what Gmail's "smart features" actually do, how extensively their emails are being analyzed, or what control they have over these processes.

Microsoft Outlook and Cloud Processing

Microsoft Outlook's architecture involves emails being indexed on Microsoft servers by default, with Microsoft Defender and Security Copilot Agents analyzing message content for threat detection and security purposes. The Focused Inbox feature continuously learns from user behavior and engagement patterns to refine email categorization.

While enterprise versions provide additional privacy controls, default configurations leave individual users' emails subject to Microsoft's security and machine learning analysis systems. The tension between security functionality and privacy protection creates unavoidable trade-offs where threat detection requires content analysis.

The Architectural Alternative: Local Storage

There is a fundamentally different approach that eliminates the need for provider-level content analysis: local storage architecture. According to comprehensive research on local email storage versus cloud solutions, email clients that store messages directly on your device rather than on company servers create a different privacy model entirely.

Mailbird operates as a purely local email client for Windows and macOS that stores all emails, attachments, and personal data directly on the user's computer rather than on company servers. This architectural choice means that with local storage, email providers cannot access stored messages even if legally compelled or technically compromised because the client provider simply does not possess the infrastructure necessary to access stored messages.

When your emails are stored locally, breach impact is contained and provider vulnerabilities don't expose your data. When Microsoft, Google, or other providers experience security incidents, your locally stored emails remain unaffected. Critically, corporate data mining becomes impossible with local storage since email providers can't analyze, profile, or monetize communications they never receive.

The Regulatory Framework Governing Email Classification

The Regulatory Framework Governing Email Classification
The Regulatory Framework Governing Email Classification

Recent regulatory developments indicate that jurisdictions are recognizing the privacy risks of auto-classification systems and imposing requirements for transparency, documentation, and risk assessment.

The EU AI Act's Impact on Email Systems

The European Union's AI Act, which became applicable in August 2025, represents a major regulatory shift that directly impacts email auto-classification systems. According to analysis of email privacy in the age of AI, this legislation classifies systems handling sensitive data as "high-risk AI," requiring adequate risk assessment systems, high-quality datasets to minimize discriminatory outcomes, comprehensive logging for traceability, and detailed documentation for regulatory review.

GDPR Article 5 mandates explainability for AI-driven decisions, requiring that if a user asks why they received a specific email classification or were placed in a particular segment, the AI system must generate meaningful, human-readable explanations. This constrains how aggressively providers can deploy black-box machine learning models.

GDPR and Data Minimization Requirements

According to analysis of automated data classification from Fortra, GDPR requires organizations to know what data they hold, where it is, and who can access it. Under Article 5, organizations must classify personal data to ensure proper protection, with special categories receiving heightened safeguards.

The data minimization principle means that email systems should only collect and process the minimum data necessary for their stated purpose. Auto-classification systems that create comprehensive behavioral profiles may violate this principle by collecting far more information than necessary for simple message sorting.

HIPAA and Healthcare Email Privacy

For healthcare organizations and professionals, email metadata poses specific compliance risks. Research on HIPAA-compliant email systems indicates that email metadata can be compromised or breached in several ways, mainly through interception during transmission, unauthorized access to email servers, or phishing attacks.

If an email server is inadequately protected or unauthorized personnel gain access, there is the risk that the metadata as well as the email contents can be retrieved. HIPAA-compliant email systems must secure email metadata through automatic encryption of outbound emails, including email metadata, to protect them from interception and unauthorized access while in transit across the internet.

Practical Strategies to Protect Your Email Privacy

Person implementing email privacy protection strategies on laptop with security icons
Person implementing email privacy protection strategies on laptop with security icons

Understanding the privacy risks is essential, but what matters most is what you can actually do to protect yourself. Here are practical, implementable strategies based on the research findings.

The Multi-Layer Privacy Architecture

Research consistently identifies a specific architectural approach as providing the most comprehensive protection: combining local storage email clients with end-to-end encrypted email providers. This creates what security researchers call "defense in depth."

For maximum protection, combine Mailbird's local storage with encrypted email providers like ProtonMail, Mailfence, or Tuta. This approach provides end-to-end encryption at the provider level plus local storage security from Mailbird, creating comprehensive protection against both provider-level and client-level surveillance.

According to comparative analysis of secure email providers, ProtonMail is widely considered one of the safest encrypted email services available, thanks to its zero-access encryption architecture and Swiss privacy laws. ProtonMail relies on Pretty Good Privacy (PGP), a time-tested open-source encryption standard supported by many other mail services and clients.

Tutanota implements its own proprietary encryption method that uses the same encryption algorithms as PGP (AES 256 / RSA 2048) but in a slightly different way so that even the subject line is encrypted. Research indicates that Tutanota emerges as a strong privacy-focused option by a small margin due to superior privacy and security features, particularly with its proprietary encryption that covers not only the content of emails but also the subject lines.

Immediate Steps You Can Take Today

Even if you're not ready to switch email providers or clients immediately, you can implement several protective measures right now:

  • Disable automatic loading of remote content in your email settings to prevent tracking pixels from reporting when and where you open messages
  • Review and disable "smart features" in Gmail, Outlook, and other providers that require content analysis
  • Implement PGP encryption for end-to-end protection even when using traditional email providers
  • Review privacy settings regularly on email providers and opt out of data collection wherever possible
  • Use different email addresses for different purposes to segment your digital identity and limit behavioral profiling

The Local Storage Advantage for Privacy

Local storage eliminates a critical privacy vulnerability that cloud-based systems cannot address. When your emails are stored on your own device rather than provider servers, several important protections emerge:

Provider breaches don't expose your data. When Microsoft, Google, or other providers experience security incidents, your locally stored emails remain unaffected because they were never on the compromised servers.

Legal compulsion has limited effect. If a provider receives a legal demand to turn over user data, locally stored emails are not in their possession to turn over. The provider cannot access what they don't have.

Corporate data mining becomes impossible. Email providers can't analyze, profile, or monetize communications they never receive. Your email content and metadata remain exclusively under your control.

Mailbird's local storage architecture means the company cannot access or collect your email metadata because all data is stored on your device rather than Mailbird's servers. This fundamentally different approach eliminates the centralized surveillance infrastructure that makes behavioral profiling possible.

Understanding the Multi-Device Trade-offs

One common concern about local storage is multi-device access. Research indicates you have several options for multi-device access with local storage:

IMAP synchronization keeps messages synchronized across devices and maintains copies on the email provider's server. This provides convenience but reduces privacy protection since messages remain on provider servers.

POP3 download downloads and removes messages from the server for maximum privacy but limits multi-device access since messages are only on the device that downloaded them.

Hybrid approach uses IMAP for some accounts where convenience matters and POP3 for accounts containing sensitive information where privacy is paramount.

The key insight is that you can make different choices for different email accounts based on your specific privacy needs and convenience requirements.

How Organizations Can Protect Email Privacy

For businesses and organizations, protecting email privacy requires a more comprehensive approach that balances security needs with privacy protection.

Implementing Data Classification Frameworks

According to research on sensitive data classification from Forcepoint, effective email security programs should discover data across all environments by identifying where sensitive information exists using automated discovery tools that provide continuous scanning, map data to classification levels based on regulatory requirements and business needs, and apply access and handling policies following the principle of least privilege.

Organizations should continuously monitor and adjust classifications as changes in applications, user behavior, or regulations require continuous monitoring and periodic review.

Balancing Security and Privacy

The tension between security functionality and privacy protection creates unavoidable trade-offs where threat detection requires some level of content analysis. According to research from Forrester's Wave evaluation of Email, Messaging, and Collaboration Security Solutions, a layered approach—typically native capabilities from productivity suite providers and an additional solution or two—is the norm, with 63% of director-level security leaders reporting their firm currently uses two or more vendors.

Organizations need to carefully evaluate which security features genuinely require content analysis and which can be implemented through less invasive methods like metadata analysis, reputation systems, and behavioral anomaly detection that doesn't require reading message content.

Privacy-by-Design Implementation

The most effective organizational approach implements privacy-by-design principles from the beginning rather than trying to add privacy protections after systems are deployed. This includes:

  • Default privacy settings that maximize protection rather than requiring users to opt out of surveillance
  • Transparent data handling that clearly explains what data is collected, why it's necessary, and how long it's retained
  • Minimal data collection that only gathers information genuinely necessary for stated purposes
  • User control that provides meaningful choices about data collection and use rather than take-it-or-leave-it terms
  • Regular privacy audits that verify systems are operating as intended and not collecting unnecessary data

Understanding where email privacy is heading helps you make informed decisions about protecting your communications over the long term.

Increasing Regulatory Scrutiny

The Federal Trade Commission's comprehensive investigation of major email providers revealed systematic gaps between stated practices and actual data collection. According to FTC enforcement priorities signaled for 2026, focus areas include protecting children's privacy, halting the sale of sensitive data, pursuing violations of fair credit and financial privacy laws, and going after entities with deficient security practices.

This increased regulatory attention suggests that email providers will face growing pressure to be more transparent about data collection and provide more meaningful user control over how their communications are analyzed and used.

AI-Enhanced Threats Continue Evolving

Research indicates that AI-enhanced threats will continue to grow in sophistication. The 2025 Barracuda Email Threats Report found that 82.6 percent of phishing emails contain AI components, with attackers using machine learning models to analyze communication patterns and generate personalized messages appearing to originate from trusted contacts or authorities.

This evolution means that the behavioral patterns exposed by auto-classification systems will become even more valuable to attackers, making privacy protection increasingly critical.

The Privacy-Preserving Technology Response

In response to growing privacy concerns, researchers and companies are developing privacy-preserving technologies that attempt to provide useful functionality without exposing sensitive data. These include:

  • Homomorphic encryption that allows computation on encrypted data without decrypting it
  • Federated learning that trains machine learning models without centralizing data
  • Differential privacy that adds mathematical noise to prevent individual identification
  • Zero-knowledge proofs that verify information without revealing the underlying data

While these technologies show promise, they remain in early stages and haven't yet been widely implemented in commercial email systems.

Making Informed Privacy Decisions About Your Email

The research demonstrates a fundamental reality: email auto-classification necessarily requires analyzing your message content and creates comprehensive behavioral profiles. There is no technical way to implement auto-classification without reading your messages, making privacy exposure unavoidable unless you adopt architectural alternatives.

Evaluating Your Privacy Priorities

Different users have different privacy needs based on what they communicate about, who they communicate with, and what risks they face. Consider these factors when evaluating your email privacy approach:

Sensitivity of communications. If you handle confidential business information, protected health information, legal communications, or other sensitive content, privacy protection becomes more critical.

Threat model. Who might want access to your communications? Corporate competitors? Foreign intelligence services? Advertisers? Your threat model determines what protections you need.

Regulatory requirements. If you're subject to GDPR, HIPAA, or other regulatory frameworks, compliance obligations may dictate specific privacy protections.

Convenience trade-offs. How much convenience are you willing to sacrifice for privacy? Some privacy-protective approaches require accepting limitations on features or multi-device access.

The Mailbird Approach to Email Privacy

Mailbird's architectural approach addresses the fundamental privacy problem of auto-classification by eliminating the centralized surveillance infrastructure entirely. By storing all emails, attachments, and personal data directly on your computer rather than on company servers, Mailbird cannot access your communications even if legally compelled or technically compromised.

This local storage architecture means that Mailbird cannot access user emails even if compelled legally or technically breached—the company simply does not possess the infrastructure necessary to access stored messages. When you combine this local storage with connection to encrypted email providers like ProtonMail or Tutanota, you create a privacy architecture with multiple protective layers.

For professionals handling sensitive client information, healthcare workers managing protected health information, or anyone who values privacy, this combination provides comprehensive protection that addresses both provider-level and client-level surveillance risks.

Taking Action on Email Privacy

Based on the comprehensive research findings, here are the most effective actions you can take to protect your email privacy:

Immediate actions (implement today):

  • Disable automatic loading of remote content in your current email client
  • Review and disable "smart features" that require content analysis
  • Audit your current email provider's privacy settings and opt out of data collection where possible
  • Stop using auto-classification features that require reading your message content

Short-term actions (implement this month):

  • Evaluate whether your current email provider's privacy practices align with your needs
  • Research encrypted email providers like ProtonMail or Tutanota for sensitive communications
  • Consider switching to a local storage email client like Mailbird for Windows or macOS
  • Implement PGP encryption for your most sensitive correspondence

Long-term strategy (implement this quarter):

  • Migrate sensitive communications to encrypted email providers
  • Implement the multi-layer privacy architecture combining local storage with encrypted providers
  • Segment your email usage with different addresses for different purposes
  • Establish regular privacy audits to verify your protections remain effective

The scope of data collection by email auto-classification systems extends far beyond what most users imagine. These systems track which messages you open, how long you read them, which links you click, and even how you compose responses. This behavioral data feeds machine learning models that predict your preferences, optimize ad targeting, and train AI systems—often without explicit user awareness or meaningful consent options.

Understanding these privacy implications empowers you to make informed decisions about which email solutions align with your privacy priorities and what protections you need to implement to maintain control over your communications.

Frequently Asked Questions

Can I use email auto-classification without sacrificing my privacy?

No, not completely. The research findings are clear: for AI to categorize emails, it must first read them. There is no technical way to implement auto-classification without analyzing message content. However, you can minimize privacy exposure by using local storage email clients like Mailbird combined with encrypted email providers. This approach keeps your messages on your device rather than provider servers, preventing the centralized data collection that enables comprehensive behavioral profiling. While you may lose some convenience features, you gain genuine privacy protection.

What's the difference between Gmail's smart features and AI training?

According to official clarification from Google, Gmail does scan email content to power its "smart features" like spam filtering, categorization, and writing suggestions, but this is part of how Gmail normally works and isn't the same as training Google's generative AI models. However, from a privacy perspective, this distinction matters little—both require analyzing your email content. The November 2024 confusion incident revealed that many users didn't fully understand what Gmail's smart features actually do or how extensively their emails are being analyzed. The fundamental issue remains that Gmail's smart features require content analysis to function.

How does local storage protect my email privacy better than cloud storage?

Local storage eliminates several critical privacy vulnerabilities. When your emails are stored on your device rather than provider servers, the provider cannot access stored messages even if legally compelled or technically compromised. Provider breaches don't expose your locally stored data, corporate data mining becomes impossible since providers can't analyze communications they never receive, and your email content and metadata remain exclusively under your control. Mailbird's local storage architecture means the company cannot access user emails because all data is stored on your device rather than Mailbird's servers, fundamentally eliminating the centralized surveillance infrastructure.

What email metadata can attackers see even if my messages are encrypted?

Research demonstrates that email metadata—which includes sender and recipient addresses, timestamps, subject lines, IP addresses, device information, and communication patterns—travels alongside messages and cannot be easily encrypted along with the email body for systems to function properly. When compiled over time, attackers can piece together detailed behavioral profiles including who you communicate with and about what topics, geographic locations indicating where you access email, organizational structure revealed through communication networks, and business relationships and partnerships. Attackers can construct detailed organizational charts and craft sophisticated phishing attacks using only this metadata, without ever reading actual email content.

How can I protect email privacy while maintaining multi-device access?

You have several options for balancing privacy with multi-device convenience. IMAP synchronization keeps messages synchronized across devices but maintains copies on the email provider's server, reducing privacy protection. POP3 download provides maximum privacy by downloading and removing messages from the server, but limits multi-device access. The most comprehensive approach combines Mailbird's local storage with encrypted email providers like ProtonMail or Tutanota, creating end-to-end encryption at the provider level plus local storage security from the client. You can also use a hybrid approach with IMAP for less sensitive accounts and POP3 for accounts containing confidential information, making different privacy trade-offs based on specific needs.

What regulatory protections exist for email privacy in 2026?

The European Union's AI Act, which became applicable in August 2025, classifies email systems handling sensitive data as "high-risk AI," requiring adequate risk assessment systems, high-quality datasets, comprehensive logging for traceability, and detailed documentation for regulatory review. GDPR Article 5 mandates explainability for AI-driven decisions, requiring that systems generate meaningful, human-readable explanations for classification decisions. The Federal Trade Commission's investigation of major email providers found systematic gaps between stated practices and actual data collection, with FTC enforcement priorities for 2026 including protecting children's privacy, halting the sale of sensitive data, and pursuing entities with deficient security practices. These regulatory developments indicate growing recognition of email privacy risks and increasing requirements for transparency and user control.

Should I switch from Gmail or Outlook to a privacy-focused email provider?

The decision depends on your specific privacy needs, threat model, and willingness to accept trade-offs. If you handle sensitive business information, protected health information, legal communications, or face specific threats from corporate competitors or sophisticated attackers, switching to encrypted providers like ProtonMail or Tutanota combined with local storage clients like Mailbird provides significantly better privacy protection. ProtonMail uses zero-access encryption with Swiss privacy laws, while Tutanota's proprietary encryption covers even subject lines. However, this approach may require accepting some limitations on convenience features and integration with other services. For maximum protection, research recommends combining encrypted email providers with local storage email clients, creating comprehensive protection against both provider-level and client-level surveillance.