Networked computing is a double-edged sword. Connectivity makes transparent sharing of data through e-mail, Web sites, and ftp archives possible, but it also invites unwanted access to your data.
PGP/GPG is one of the few cases where I'll be a right bastard about insisting that my users take detailed notes of the process that I'm walking them through the first (usually winds up being the first ...