How to Remove Personal Information From the Internet

From sensitive banking information to those awkward photos you wish hadn’t been posted to the web, you probably have stuff online you wouldn’t want others to find.

Erasing some of your personal data from the internet could lower the chances of someone finding and using it for nefarious purposes.

If you’re ready to take steps to help protect your online privacy, here are some tips and examples of how to remove personal information from the internet.

How can my personal information land on the internet?

When fraudsters get hold of your information, it could lead to serious trouble. Once they obtain your full name and other personal details, they could use these together to piece together a fuller picture about you, potentially wreaking havoc on your finances, send phishing attempts, or even stalk you in person.

Examples of personal information include:

  • Details such as full name, physical address, telephone number, and education history.
  • Bank account numbers and login information.
  • Account credentials, such as user names and passwords, for websites.
  • Health information or health insurance details.
  • Identification numbers, such as a passport number or tax identification number.

Here are four ways thieves may get your personal information.

Data breaches

These occur when unauthorised individuals break into databases to steal and release personally identifying information, or PII, on hard-to-find websites, usually on the dark web.

The targeted information may include names, driver’s license numbers, medical and financial records, and email addresses and passwords.

Data brokers

These companies collect and sell all the data they can legally get their hands on, such as names, date of birth, telephone numbers, addresses, land records, marriage records, criminal history, social media profiles, and more. They consolidate this data from dozens of different public records, then compile it online.

You can typically look at basic details for free or pay to get a more in-depth report.

Social media and blogs

Your social media accounts may contain all the pieces a cybercriminal needs to commit fraud, such as your full name, where you live and work, photos of you and your family, holiday plans, and your favorite bands and hobbies. For instance, your dog’s name is PII if it’s the answer to one of your online security questions!

Removing social profiles and information on blogs makes it harder for fraudsters to use that data.

Web-browsing habits

Internet service providers and various companies can use technology called “cookies” to track your web browsing history, usually using this information to create targeted advertisements.

However, cybercriminals could also get their hands on your search and browsing history and use it to scam you, embarrass you, or get into your financial accounts.

Removing your personal information from the internet

It’s a process to remove your personal information from the internet, so be patient and don’t expect to complete it in one day. Take a systematic approach, tackling one technique every week or so.

Keep these caveats in mind: It may be impossible to permanently delete all of your info from the web. And after you remove any profiles and information, you might not surface in search results, which could put off future employers and potential love interests. But the time, effort, and absence from the web can help you protect your information and finances.

Delete your social media accounts

Make a list of the social media accounts you keep. Visit each website, find the account settings, and look for the option to deactivate or remove the account. Depending on how much information you want to keep private, you can also delete your online banking and credit card accounts, and even your email accounts.

If you’re having trouble, try Googling “how to delete X profile/account,” and you should find instructions for removing it. If you’re unable to close the account, replace the stored account information (such as your name and email address) with something that’s unintelligible (such as a string of random numbers and letters).

Close or delete any blogs or personal sites

Personal blogs may contain intimate details about your daily life, family, jobs, health information and financial situation — which is information a fraudster could use to scam you or access your accounts. If you publish a blog, be mindful of the details you’re sharing.

If someone else has posted sensitive information about you on their website or blog, then you can contact the webmaster of the site and ask them to remove the information.

If a website refuses to remove your info, then you can send a legal request to Google* and ask to have it removed.

Remove all unnecessary apps from your phone or tablet

Many mobile apps on your smartphone and tablet collect personal details such as your name, email address, spending habits, and geographical location. This information could be accessed by cybercriminals, leaked or stolen, and if it ends up in the hands of scammer, your finances could be at risk.

If you’re unsure whether an app is trustworthy, it’s a good idea to review the Terms of Use and Privacy Notice first to determine what info is collected, why it is collected, and how it may be secured, stored, and shared. You might also check some user reviews.

If you then determine you don’t want the app to have your info, then look for how to remove all your info and delete the app. You may have to contact the app provider and ask them to remove your information.

Also, it’s smart to go through your apps regularly and check out the privacy settings.

For instance, one app may request access to your microphone. While this could make sense for an messaging and voice app a maps app might not need it.

While you’re checking these apps regularly, remove the ones you’re not using to free up space and lower your risk of information exposure.

Keep in mind that uninstalling an app from your device doesn’t necessarily mean your personal information is deleted by the app developer. Again, check the privacy and account settings to determine how to fully delete your account.

Use a do-not-track feature

While browsing the web, you’ve probably noticed disclaimers about “cookies,” which is technology that tracks your web browsing habits. If you don’t want that information tracked and stored, then consider running security software that contains features to block online tracking. You should also understand the limitations of your browser and any do-not-track feature.

However, your browsing activity might still be visible to the websites you visit, your employer or school (if you’re on their networks), or your internet service provider.

Sweep out your computer data

There’s a trove of personal information stored on your browser history, including the websites you visit (including financial institutions), passwords, and cached images and files. If a cybercriminal gains access to your device, they may be able to use that information, but it’s easy enough to clean much of it out. Regularly clear your browser history, delete cookies and install and use security software that includes online privacy features.

Remove outdated search results

Search engine results can expose a lot of info about you, through data broker websites, social media pages, news stories and even cached images. But you can ask Google to exclude any results containing your personal information by submitting a removal request form. It’s not 100% guaranteed, but Google will try to exclude your data from its results, making it much less likely that you’ll be found via search engines.

Final word on removing personal information from the internet

Removing your personal information from the internet will only go so far in privacy protection. You should also use encryption software, or a VPN, when transferring files, and install internet security and antivirus software on your computer, smartphone and tablet.

Although the process will take some time and effort, the peace of mind of increased privacy will be worthwhile.

Better protection for your life in the connected world.

Introducing NEW Norton™ 360. Get multiple layers of protection in a single solution: protection for your devices against viruses, phishing and other online threats, a VPN for your online privacy when using any Wi-Fi, a password manager to generate and store your passwords and logins, plus Cloud Backup for PC to help prevent data loss due to ransomware or hard drive failures.

Stealing your identity can be easy.​ Good thing calling us is, too.

With Norton Advisor Plus a Identity Restoration Specialist will help guide you through the restoration process from start to finish. 

Help with identity theft starts here.​

Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.

Copyright © 2023 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.