
There are many reasons you might want to âdelete yourselfâ from the internet. From receiving frustrating amounts of spam to protecting yourself from carefully crafted scams fueled by the availability of personal data. But it goes much deeper than that.
Having your personal information floating around online leaves you more vulnerable to identity theft, a type of fraud that can lead to criminals opening lines of credit in your name. Stalkers can use location and other data to commit their crimes. Even the seemingly more mundane uses of personal data can be enough to make you want to delete yourself from the internet.
You might find loan applications being inexplicably rejected, insurance premiums going up or job searches getting drawn out. Companies checking your credit rating is one thing, but these effects could stem from inaccurate, outdated or irrelevant information being used in decision-making processes that affect you in very real ways.
What it means to âdelete yourself from the internetâ
Weâre not talking about completely disappearing from the internet. For one, this is very difficult if not impossible to do, even if you were to throw near-unlimited resources at the problem. Itâs also probably not something youâd want to do even if you could.
Thereâs a way you can keep making use of all the benefits the internet has to offerâlike the unparalleled shopping, communication and information-sharing opportunitiesâwithout leaving yourself needlessly vulnerable to all the downsides.
The key is getting your personal information under control. You donât need to delete yourself entirely, itâs often enough to remove your personal information from circulation. âPersonal informationâ includes things like your:
- Current and past names, and any aliases
- Current and past addresses
- Email addresses
- Phone numbers
- Educational background
- Work history
- Income bracket
- Licenses
- Certifications
- Marital status
- Sexual orientation
- Financial information
- Criminal record
- Court records
- And much, much more.
Not exactly the kinds of details youâd want shady companies to package and resell behind your back, or put on Google Search so that anyone can buy access to them for as little as a dollar. There are two ways to tackle this problem, and youâll need to do both to see long-term results:
- Figure out how youâre putting personal information online and bring it down to a level with which youâre comfortable
- Put a stop to companies grabbing and publishing or otherwise disseminating what personal data you do end up generating down the line.
Just going about your day-to-day business generates personal data that can then be scooped up by companies that know how to monetize it at your expense. Everything from doing some online shopping to selling a house or vehicle leaves traces.
Stop any personal information thatâs already out there from being spread around
Weâre starting here because youâve already got personal information doing the rounds onlineâpretty much everyone does. So the first thing youâll need to do is interrupt the flow of whatâs already out there. There are a couple of things you can do to make this happen.
Stop companies packaging and selling your personal information online and off
There are companiesâcalled data brokersâthat specialize in collecting, organizing and selling personal information. They get your personal data by scraping the web, purchasing or otherwise acquiring ready-made profiles, or a combination of the two. The most visible data brokers are commonly known as âpeople finderâ or âpeople searchâ sites.
You can see examples of these sites, and the information they have on you, simply by performing a web search for your full name, address or phone number. These sites will likely show you a free âteaserâ of your profile, with the full records being locked behind a paywall.
It gets worse: people search sites are just the tip of the data brokerage iceberg. Many data brokers operate in the background, selling personal information to other businesses and organizations rather than putting it on websites aimed at individuals. You wonât find these companies by simply searching for your details, but theyâre out there. Hundreds of them.
People search sites sell your data to anyone whoâs willing to pay for access, including unscrupulous landlords, curious neighbours, nosy coworkers, stalkers, even scammers. Other data brokers will sell your data to:
- Advertisers
- Marketers
- Government agencies
- Insurance companies
- Banks
- Employers
- And many more.
Thanks to state privacy laws like the California Consumer Privacy Act (CCPA), you can do something about this. To comply with laws like this, data brokers have to have an opt-out procedure in place to give people caught up in their personal-data dragnets a clear way out.
You can track down these companies one by one and submit an opt-out request to each one. Some are just a matter of a couple of clicks and take 5 minutes to complete, others can be a real nightmare and can take 45 minutes or more. Add the time it takes to find them in the first place, and youâre looking at hundreds of hours in total.
Or, you can sign up for an automated personal information removal service, like Incogni. These services already know where to find some of the most connected brokers and how to submit opt-out requests in line with their requirementsâbecause virtually every one has a different procedure to follow.
Incogni makes it easy for anyone to remove their personal information from being searched online. Subscribers get a 30-day moneyl-back guarantee on automated data removal services, including recurring removal from 220+ data broker sites. With flexible plans for just $7.49/month for one person (billed annualyy) or $16.49/month for the family plan, Incogni offers privacy protections against identity theft, scam robocalls, and exposure after breached data.
Remove your personal information from Google Search results
Youâve seen how a search engine can reveal your personal information to anyone who knows your name, address, email or phone number. With the latest âface-searchâ technology, they donât even have to know that much, a surreptitiously taken photo is all it takes.
Google Search, with its monopoly over the search market, is likely the first place most people will look. Google wonât always agree to remove links from its search results and, even if it does, it can only remove links from Google Search: it canât affect the content itself and it canât stop that content from showing up on other search engines. To have content taken down at the source, youâll need to contact the relevant webmaster.
Hereâs a quick rundown of your options on Google Search:
- Use this form to remove outdated content
- Use this form to remove harmful or illegal content (as long as it violates Googleâs terms of service)
- Finally, use this form to remove content that contains âselect personally identifiable information (PII) or doxxing content.â
Stop new personal information from getting out into the wild
Stopping data brokers from buying and selling your data and getting Google Search to remove your personal information from its search results can only do so much if you keep allowing new personal information to appear online. âAllowingâ might be a bit harsh, given that you might not be aware of how some of your data is getting out there. Weâll get to that.
Stop publishing personal information online
Social media platforms are careful to use words like âshareâ when encouraging users to publish content, including personal information. âSharingâ makes it sound like you have some control over who sees what you post. But âpublishingâ is more accurate: social media posts are public by default.
The best advice is as predictable as it is inconvenient: delete your social media accounts to protect your privacy and delete yourself from the internet. Short of doing that, hereâs a list of things you can do to limit the damage:
- Switch from mainstream social media platforms like Facebook and X (Twitter) to decentralized and open-source platforms like Mastodon.
- Set any social media profiles you decide to keep to private mode, so that only people you know and trust can see your posts.
- Check and double-check anything you decide to post publicly for personal information, this will become second nature sooner than you might think.
- Turn location services off on mobile devices before posting, many social media platforms will grab this information from your device, some will append it to your posts.
- Check photos for anything that could reveal personal information, look out for reflections, documents, screens (that show private information), and unique identifiers like car registration plates.
- Strip photos of metadataâmetadata is text thatâs automatically attached to photos and contains a lot of information about the location at which the photo was taken as well as the device on which it was taken.
- Apply the same level of caution when uploading video and audio recordings.
The same holds true for any blogging or vlogging you do, the comments you leave on various platforms, and anything you post on forums.
Stop your devices from leaking personal information
The above best practices come into play when youâre actively publishing information online, but a lot of personal data leaves your devices when youâd least suspect it. Here are just some examples:
Apps and programs
Mobile apps and computer programs that have been granted access to location data, device information, microphone and camera inputs, and files (including documents, photos, videos and audio recordings) can leak personal information while youâre not even using them. Such apps and programs might have been set up to âdial homeâ periodically and upload your data. This might be necessary to support their features, or it might be to harvest data thatâs then sold to advertisers in order to generate revenueâfree apps are often monetized in this way.
Even apps developed with the most honest of intentions and collecting only the bare minimum of data can be hijacked by malicious actors (think: hackers) and have any data they have access to stolen (âbreachedâ).
Delete any apps and programs you havenât used in a while. For particularly data-hungry apps like Facebook, Amazon, and so on, consider using the respective websites instead.
Web browsers
Browsers are a special category of app or program, mainly because we do so much through a browser. They have access not only to hardware (like cameras and microphones), but also information (in the form of files) andâperhaps most importantlyâto usersâ behaviour and movements across the web. And no, âincognitoâ or âprivateâ mode doesnât do anything to help you here.
Diligently research any browser you decide to use. Options like Googleâs Chrome are very secure but not private, whereas something like Mozillaâs Firefox is both secure and private. Stick to well-known and trusted browsers, avoid new browsers that donât have an established track record, and watch out for browsers that had a good reputation in the past but have since changed hands.
Browser-based games
Games can take a lot of resources to develop and maintain, so you might wonder how so many impressive-looking browser-based games can be offered for free. Often, itâs by collecting and selling or otherwise monetizing personal information. Avoid free online, especially browser-based, games. Be particularly wary of games with development teams from countries like China and Russia.
Again, even games produced by the most trustworthy and well-intentioned developers can be breached by third parties. Any stockpile of personal data is going to be a target for hackers and other bad actors.
Operating systems
This is one thatâs more for the technically minded, but itâs worth keeping in mind for everyone. The operating system on your device (whether Windows, macOS, Android or iOS) has access to everything you do on that device. Both Microsoft and Apple harvest personal data from their users, and both have business interests in protecting that data from competitors and bad actors.
There are two problems here: Microsoft and/or Apple having vast stores of your personal data is a bad thing in and of itself, and neither company is able to guarantee the security of that dataâboth have suffered and continue to suffer data breaches.
Alternatives exist, mainly in the form of Linux and the BSDs. These operating systems are open-source, meaning that anyone can review their source code to look for security vulnerabilities and privacy threats. As a result of this transparency, and the general absence of corporate interests, these systems are both more secure and more private.
The catch is that these operating systems are unfamiliar to most people, and can take some getting used to. Although the Linux operating system in particular has many extremely user-friendly âversionsâ (called distributions) available, and almost all of them are readily given away, free of charge.
Stop your online accounts from leaking personal information
We covered how publishing personal information online can jeopardize your privacy, but you donât have to actively post things yourself for the information to get out there. If youâre active online, and especially if you do a lot of online shopping, you can easily have hundreds of online accounts out there. Many of which you probably only used once, to grab that Black Friday deal, for example.
Apart from the fact that youâre effectively trusting dozens if not hundreds of companies to not misuse your data, youâre also trusting that they wonât leave that data unsecured, that they wonât be bought out by less scrupulous companies, and so on.
The solution is simple, but it might require some tedious work: delete any accounts you donât need anymore. If youâve been using a password manager (like Bitwarden), this shouldnât be too difficult. Otherwise, search through your emails for keywords like âwelcomeâ and âverificationâ to ferret out evidence of old accounts.