Malicious insider and privacy implications