Be careful to whom you give your information. Even if it's far a supposedly legitimate purpose. Who are they giving it to? Can it be passed along? Information flow analysis is important ...
............
Other posts: https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413
This message may or may not be governed by the terms of
http://www.noticebored.com/html/cisspforumfaq.html#Friday or
https://blogs.securiteam.com/index.php/archives/1468