Including email addresses as URL parameters poses significant security and privacy risks. Experts and marketers alike strongly advise against this practice due to potential violations of Google Analytics' TOS, leakage of PII to various third parties (plugins, intermediary sites, trackers), and exposure through server logs, browser history, referrer headers, and even visual observation. This can lead to security vulnerabilities, privacy breaches, increased spam risk, and potential exploitation by malicious actors (e.g., unauthorized list unsubscriptions). Security documentation emphasizes mitigating techniques and adherence to best practices to protect sensitive data and prevent these exposures.
9 marketer opinions
Including email addresses as URL parameters poses significant security and privacy risks. This practice can expose sensitive data through various channels, including referrer headers, server logs, browser history, and third-party trackers. Bots crawling and indexing these URLs can lead to spam. Additionally, this practice violates company terms of service/privacy policies and increases the risk of phishing attacks.
Marketer view
Email marketer from StackExchange shares that including email addresses in URLs can lead to spam if bots crawl and index those URLs. Additionally, it can expose email addresses if the URL is shared or logged.
28 Mar 2023 - StackExchange
Marketer view
Email marketer from Information Security Forum explains that sending PII as URL parameters has the risk of exposing it in webserver logs, browser history, and the HTTP Referer header.
15 May 2024 - Information Security Forum
4 expert opinions
Including PII, particularly email addresses, as URL parameters poses several risks. It violates Google Analytics' Terms of Service, leaks email addresses to potential plugins, intermediary sites, server logs, and analytics tools. This exposure can lead to email addresses appearing in Google search results and creates opportunities for malicious actors to exploit the information, such as using the URL to unsubscribe users from lists without their consent, complicating spam tracking and causing user inconvenience.
Expert view
Expert from Email Geeks shares they have seen email address leaking into Google results from query strings in the past.
17 Sep 2024 - Email Geeks
Expert view
Expert from Word to the Wise explains that using PII in URLs is generally a bad idea and provides an example of a case where using an email address in a URL resulted in a spammer using the URL to unsubscribe a user from various lists, causing problems for the user and making it more difficult to track the source of the spam.
28 Mar 2023 - Word to the Wise
4 technical articles
Including email addresses as URL parameters exposes sensitive information through multiple channels. OWASP highlights risks such as exposure via browser history, server logs, referrer headers, and even visual observation (shoulder surfing), leading to security vulnerabilities and privacy breaches. SANS Institute emphasizes that referrer headers leak personal data, recommending avoidance or control techniques. Mozilla reinforces this by explaining the Referer header's potential to expose previous page URLs with sensitive data, suggesting the use of a Referrer-Policy header. Veracode warns against storing sensitive data in URLs due to exposure in server logs and browser history, explicitly advising against storing PII in URL parameters.
Technical article
Documentation from Veracode explains that storing sensitive data in the URL can lead to security problems, such as exposing the data in server logs and browser history, and recommends to not store PII in url parameters.
3 Mar 2025 - Veracode
Technical article
Documentation from SANS Institute explains that referrer headers can leak sensitive information when URLs contain personal data. This can be mitigated by avoiding the inclusion of sensitive data in URLs or by using techniques to control the referrer header.
10 Aug 2023 - SANS Institute
How can I prevent my domain from being blacklisted due to an infected employee's computer or scraping contact information?
How can I protect my domain from being spoofed and blacklisted?
How can you identify the source of unsolicited emails and prevent data leaks?
How to identify and handle email forging and replay attacks?
How to identify and handle spoofed emails violating DMARC policies?
Is BIMI easily spoofed and are there drawbacks to BIMI implementation?