There is now a very thin line, easily broken, which separates our physical and digital identities. Social networks have evolved and become valuable, data-slurping machines that hold a lot of our sensitive information. It has been said countless times that once something is online, it is immortal, immutable, and almost impossible to contain.
In other words, you should not put anything online you wouldn’t want your grandmother to see in case the consequences damage you or your prospects. However, keeping your digital information in check is not just about your online information. Monitoring the passive data collection conducted by companies from you is also important.
If you want to take control of your privacy and online data, here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.
Google and Other Search Engines
The Google search engine, among others such as Bing and Yandex, can be used to uncover exactly what information about you is public and what the average person can quickly find out without the need for advanced tools, social engineering, or Open-source intelligence (OSINT).
Once you know what is online, you can start tackling the problem. Run a quick search and note any website domains that flag you, social media account links, YouTube videos, and anything else of interest.
- Quick tip: To stop your search queries from being tracked, switch to DuckDuckGo.
You May Have The Right To Be Forgotten
After filling in this form, requests are reviewed by Google employees on a case-by-case basis. You must provide the specific URLs you want de-listed, the search queries related to these URLs and you must explain why the tech giant should agree to your request.
Google may not accept every request to remove links relating to you. Reasons given for refusal include technical reasons, duplicate URLs, information deemed “strongly in the public interest,” and whether or not the content on a web page relates to professional lives, past convictions, work positions, or self-authored content.
Have I Been Pwned?
You cannot take control of your digital footprint without knowing where and what information is stored and potentially leaked. The Have I Been Pwned service is run by cybersecurity expert Troy Hunt and can be a useful tool to discover if any account information belonging to you has been compromised or included in a data breach.
If you find an email address connected to you has been pwned, check to see what data breaches you have become embroiled in and make sure you change your passwords as quickly as possible. You won’t be able to do much about the data leak itself, but this also could serve as a reminder of where you have opened online accounts.
Make sure you visit the Google Account page, where there are numerous settings that can boost your privacy, reduce data collection, or remove you altogether from the ecosystem.
Privacy checkup: The Google Privacy checkup allows users to prevent Google from saving your searches and other Google activity to your Google Account and turn off your location history.
You can choose to disallow Google from saving web and app activities, Chrome history, YouTube history, voice and audio, and other data. Google has also introduced an auto-delete function for data stored. You can also choose whether or not to allow Google to use your information for tailored advertising.
Security checkup: The Google Security checkup can be used to show you which devices have access to your account, including laptops, PCs, and handsets. You can also find a list of any third-party applications which have been granted permission to access your account and revoke permissions as necessary. In addition, if Google finds an online account with your email and password, you will see an alert here.
Delete me: Found under Account Preferences, Google’s deletion service can be used to delete select products or remove your account entirely. You can also download a copy of all your data.
For a Quick Fix, Use a Service
There are several services available out there in which you can pay to keep your information away from data brokers. These can keep your private information off search results and away from platforms such as open people search databases.
For example, DeleteMe, a paid subscription service that maintains tabs on data collectors and removes data including names, current and past addresses, dates of birth, and aliases on your behalf.
When it comes to mailing lists, services such as unroll.me can list everything you are subscribed to, making the job of unsubscribing from newsletters, company updates, and more far easier.
Lockdown Social Media Accounts
Facebook: In the Settings tab, you can download all of Facebook’s information on you. To lock down your account, go to the Privacy tab and restrict your posts to ‘friends only,’ limit your past posts, and disallow lookups through your provided email address or phone number.
An important element that shouldn’t be overlooked here is the option to remove your Facebook profile from search engine results outside of the social networking platform. Under the Location tab, consider turning off location data collection by Facebook as well.
If you look at Apps and Websites, you can also see what is connected to your Facebook account. If you choose to delete these, Facebook can also automatically remove posts, videos, and events the connected service posted on your behalf.
Twitter: Twitter also allows users to request their archive, which is all the information collected from you. This option can be found under the Settings and privacy tab.
You can choose to lock down your account entirely, make tweets private and only viewable by those with your approval. You can turn off tweets containing location data, and decide whether or not to allow email and phone number searches to connect others to your profile. You can also choose whether or not to allow others to tag you in photos.
Under the Safety portion of the tab, you can prevent your tweets from appearing in the search results of those you have blocked on the micro-blogging platform. You can also deactivate your account entirely.
Instagram: Facebook-owned Instagram has a number of privacy settings you can also change to maintain an acceptable level of privacy. By going to your profile, clicking Settings, Account Privacy, and switching to ‘Private account’ on, you can make sure your content is only viewed by those you approve.
Remove Everything: A more extreme option is to delete all of your primary social media accounts completely.
In order to do so on Facebook, you can go to Settings & Privacy>Settings>Your Facebook Information>Deactivation & Deletion to deactivate it. This gives you the option to return at a later time and does not delete your data. Your settings, photos, and other content are saved, but you will not appear beyond unclickable text.
Deactivating your account gives you the option to take a break and return later and will take you off searchable results. However, you can also permanently delete your account. If you have trouble finding this setting, you can also type “delete Facebook” in the Help Center tab.
You are given a grace period to change your mind and log back in. It can take up to 90 days before the deletion of content on your wall and in your account will begin.
In order to deactivate Twitter, you need to click on Settings and privacy from the drop-down menu under your profile icon. From the Account tab, you can then click deactivate.
To delete your Instagram account, log in and go to the request deletion page. Once you have submitted an answer as to why you are deleting your account, you will be prompted to re-enter your password, and then a delete account option will appear.
Delete and Deactivate Old Accounts
Do you have old, unused customer accounts with e-commerce platforms that you only remember you opened when they send emails that detail recent discounts and deals?
When information such as your name, physical address, telephone number, and credit card details are spread across multiple businesses, should these companies experience a data breach, your data is up for grabs.
Unless the account is one you use frequently, consider deleting it permanently. It is a pain to find, remember credentials, and recover passwords associated with old accounts, but this is an important step in locking down your data.
Remove Old Social Media Posts
We are all responsible for the information we post online, but it does not have to stay there once it is posted. Effort and time are required to comb through old posts, but the result is worth it.
However, suppose you have come across embarrassing forum posts or messages that you do not have the privileges required to delete, and the only other option is to contact organizations and webmasters directly?
When you contact them, make sure you include a link to the content you are concerned about, give your reasons, and hope they agree to delete it. However, do not expect an immediate response.
Finding Old Accounts and Deletion Options
To find your old accounts, visit Have I Been Pwned, check the lists of connected apps in your Facebook and Google accounts, and if you have a password manager, they will store the credentials of accounts you have used since signing up.
Depending on the service, you may have to manually login to each account you want to remove and delete them from there or you may have to contact the service provider with the request, via email or by submitting a ticket. If you aren’t able to delete your account, remove any sensitive information and change the linked email address, name, and any other identifying factors if you can.
Justdeleteme.com is a helpful directory containing guides to removing accounts from countless online services and a rating on how hard it is to remove: ranging from “easy” to “impossible.” Another alternative is Account Killer.
If you cannot delete online accounts outright and can only deactivate them, before you do, wipe as much content from them as possible. If the account is no longer relevant to you, consider changing the name and personal details connected to it, as well as removing or changing photos to generic alternatives.
When it comes to active accounts such as on Facebook or Twitter, anonymity or aliases can help keep your digital and physical presence separate. It is against terms of service to not use your full, correct name, but it is still common practice for many to change their username at the least to prevent work and personal accounts from colliding.
Set Up a Second Email Account for Junk
Another way to keep your digital footprint clean of debris is to separate online services between email accounts. If you need to provide an email address for a one-off purchase, for example, consider using a junk email address.
This will quickly become full to the brim with promotional material but will keep marketing databases separate from your primary email address. For example, you could set up two Gmail accounts, one as a primary and one as a delegate for spam and potential junk.
Use a Virtual Private Network (VPN)
A VPN can mask your IP address and create a private tunnel between yourself and online services. This tunnel ensures that data and communication packets sent between a browser and server are encrypted, which in turn can prevent eavesdroppers from harvesting your information or tracking your online activity.
There are services out there that are both subscription-based and free. It is generally better to sign up for a paid service if you can, no VPN service is truly ‘free’ given the cost to create and maintain the infrastructure required to route traffic. Therefore your data may be used or sold to third parties in return for VPN services.
The Most Permanent Measure
Starting from scratch may seem extreme, but it could be worth considering in some cases. The outright deletion of email accounts, social media, and e-commerce services won’t immediately destroy all data or search results connected to them, but it will, over time, make them less likely to appear.
Just make sure that before you take this irrevocable step, you have backed up any data that you want to keep, such as irreplaceable photos you have uploaded to social media or document scans stashed away in your email inbox.