Home Back

Your Info Is All Over the Internet – Here's How To Clear It Up

Newsweek 2 days ago

With personal data increasingly becoming a commodity, concerns over privacy and data security are more relevant than ever.

The advent of digital tools and services has made it easier for data brokers to gather, store, and sell vast amounts of personal information.

Fortunately, there are effective steps you can take to remove or obscure your data from the internet.

Steps to Remove Personal Information

Cyber security stock image
Tech Developer Thinking and Typing on Computer, Surrounded by Big Screens Showing Coding Prompts. Professional Programmer Creating Software, Running Coding Tests

Secure Your Online Accounts

Ensuring your online accounts are secure is a critical first step. Use strong, unique passwords and enable two-factor authentication (2FA) to add an extra layer of security. Regularly check for any breaches and update your passwords immediately if your data is compromised​​.

Remove Data from Search Engines

Google's "Results about you" tool allows users to request the removal of personal information such as phone numbers, home addresses, and email addresses from search results. However, removing information from Google doesn't erase it from the internet entirely​​.

Contact Third-Party Websites

Many personal details end up on data broker sites like Spokeo and MyLife.com. To remove your information, you'll need to contact each site individually and request the deletion of your data. This process can be time-consuming but is necessary to ensure thorough removal.

Utilize Paid Removal Services

Services such as DeleteMe, Kanary, and OneRep offer to scrub your personal data from various websites for a fee. These services can automate the process of contacting data brokers and requesting data removal, providing regular updates on their progress​​.

Delete Old Accounts and Apps

Unused accounts can be vulnerable to hacking. Make a list of all your online accounts, especially those you no longer use, and delete them. Additionally, uninstall unused apps from your devices and ensure that your data is removed from the provider's systems.

Optimize Privacy Settings

Review and update the privacy settings on your social media accounts and other online services. Limit the amount of personal information you share and adjust settings to control who can see your content. This step is crucial in minimizing your digital footprint .

Cyber security stock image
Cyber security and cybercrime. System hacked with Master key lock on laptop, notebook. Cyber attack on computer network, Virus, Spyware, Malware or Malicious software.

Regulatory Frameworks and Their Impact

Regulatory frameworks like the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the U.S. provide individuals with rights to access, correct, and delete their data. However, compliance varies, and some organizations may exploit regulatory gaps to avoid fulfilling these requests.

Nader Henein, VP Analyst at Gartner, advises persistence: "If you want your data deleted from a specific site, ask, then ask again and if in 30 days, it hasn't been actioned, escalate to your privacy regulator."

Emerging Technologies and Best Practices

In terms of emerging technologies, Henein emphasizes the importance of being cautious about which data you share. "Organizations call this 'reducing the attack surface', which is fancy talk for making your data less accessible and therefore less likely to end up in a breach or in the hands of an aggregator."

Understanding the value of your data and being extremely guarded with sharing it is crucial. "The more of your data in the hands of third parties, the more likely it will end up with data brokers," Henein warned.

The Role of AI and Machine Learning

Henein highlights the dual role of artificial intelligence and machine learning in personal data security. "AI has been filling in the blanks for quite some time now, meaning that if a data broker has a handful of facts about a person, a well-trained model can extrapolate more probable characteristics about that person," Henein told Newsweek.

"The issue is they are not all 'well-trained' models, and there is an inexcusable amount of incorrect data used to make automated decisions about what services a person should or should not receive," Henein explained.

While AI has the potential to protect us, Henein remains skeptical about its current capabilities. "AI agents can act on our behalf potentially muddying the water for advertisers, making the data collected from those activities less valuable but that's still far into the future."

What's Next?

Removing your information from the internet is not a one-time task but an ongoing process requiring vigilance and persistence. By securing your accounts, managing your privacy settings, and using tools and services designed to protect your data, you can significantly reduce the risks associated with personal information being publicly available.

Henein sums it up: "Sadly, the genie is very much out of the bottle here. Data that could have value to advertisers and aggregators has already been sliced, batched, segmented, replicated and sold hundreds of times." While complete privacy may be unattainable, taking proactive steps can help mitigate the risks and give you more control over your personal information.

Do you have a story we should be covering? Do you have any questions about data protection? Contact LiveNews@newsweek.com

Newsweek is committed to challenging conventional wisdom and finding connections in the search for common ground.

People are also reading