Between procurement requests and purchase order updates, every line carried sensitive data. Email addresses sat there, plain text, exposed to anyone with read access. That is how breaches start—quiet, ordinary, inside the logs.
Masking email addresses in the procurement process logs is not optional. It’s a baseline control,