Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless links. In contrast with the conventional cryptographic techniques, PLS methods exploit the random fading in wireless channels to provide link security. As the channel dynamics prevent a constant rate of secure communications between the legitimate terminals, the outage probability of the achievable secrecy rate is used as a measure of the secrecy performance. This work investigates the secrecy outage probability of a simultaneous wireless information and power transfer (SWIPT) system, which operates in the presence of multiple eavesdroppers that also have the energy harvesting capability. The loss in secrecy performance due to eavesdropper collusion, i.e., information sharing between the eavesdroppers to decode the secret message, is also analyzed. We derive closed-form expressions for the secrecy outage probability for Nakagami-m fading on the links and imperfect channel estimation at the receivers. Our analysis considers different combinations of the separated and the integrated SWIPT receiver architectures at the receivers. Numerical results are provided to validate our analysis. 2 The broadcast nature of wireless signals implies that nodes other than the intended receiver may also receive the transmitted message, which results in information leakage. Although cryptography-based techniques are conventionally used to secure transmitted information, the high computational complexity of these techniques consumes a significant amount of energy [10]. Recently, physical layer security (PLS) has been proposed as an alternative for securing wireless communications by exploiting the channel characteristics such as fading, noise, and interferences [11]. The secrecy performance of a cooperative network was investigated in [12], [13]; secrecy for interference limited networks was studied in [14] and for cognitive radio networks in [15], [16], [17]. In [18], the authors analyzed the secrecy performance of a multicast network in which the transmitter broadcasted its information to a set of legitimate users in the presence of multiple eavesdroppers. The authors then proposed power minimization and secrecy rate maximization schemes for the considered multicasting secrecy network. The security of large-scale networks has also been characterized in terms of connectivity [19], coverage [20] and capacity [21]. Researchers have also considered so-called artificial noise generation techniques to reduce the signalto-interference ratio of the eavesdropper channel while minimizing the interference to the legitimate link [22], [23]. The authors in [24], [25] studied cooperative jamming, whereby a relay transmitted an interfering signal towards the eavesdropper while the source broadcasted its message. In [26], secure beamforming techniques have been explored to maximize the received power at the legitimate receiver. The PLS techniques are naturally applicable to SWIPT but the design of an optimal PLS techniques for SWIPT systems is a no...