SlideShare a Scribd company logo
1 of 4
Download to read offline
LOG OFF FROM THE INTERNET, STEP BY STEP
A 101 on removing your personal data from the Internet. But be warned: it’s a
painful exercise
Had enough of selfies, tweets, posts and searches? Tired of bots tracking and
predicting every move of yours? If you want to get back to being anonymous, here’s
how you can systematically delete personal information from the World Wide Web.
STEP 1: Target social media
Posts, photos, thoughts, tumblers,
tweets.... We have all posted endless numbers of things online on various social media
accounts. Start by deleting all these accounts: Facebook, Google Plus, LinkedIn,
Instagram, Pinterest, YouTube. All of them have the option to deactivate an account.
If you are still not able to figure out how to delete a particular social media account,
head to DeleteYourAccount.com, which tells you the process for 34 social media
accounts.
STEP 2: Get hold of other accounts
Remember that shopping site where you created an account because they had
an offer you just couldn’t resist? Or that food app which had promised a free dinner if
you signed up with them? Even that dating site you visited once? And that game you
played for a day and then forgot about? It’s time to go through your emails and list all
the obscure accounts you’ve created over the years. If you’re not sure, simply search
for your name and the usernames you use in Google, Bing, Yahoo and other search
engines. You may have forgotten the passwords or the account could have been
deactivated simply because you haven’t used it in a long time.
But if you really want to wipe that slate clean, you will need to reset the
password, sign in to reactivate the account, and then proceed to delete it. Most of the
online companies allow you to deactivate, but there’s no guarantee that all of them
will actually delete all the data they have collected about you, says Thejesh G.N., a
Bengaluru-based technologist and co-founder of DataMeet, a community of open-data
enthusiasts. “Unfortunately, in India we don’t have any legal option to demand that
the personal data be deleted by the online or telecommunication company,” he says.
This is why the other steps that follow are important.
STEP 3: Unsubscribe mailing lists
There was a time before social media when we used to subscribe to the
newsletters of different websites. You might still be old-fashioned and get emails
from Google and Yahoo groups and various forums, as well as from associations and
sundry accounts that you have subscribed to. Go through your Inbox, Spam and Junk
folders and methodically unsubscribe from each of these groups.
STEP 4: Dumb down your phone
Every app that you downloaded on your smartphone collects some kind of
data about you. “Apps send off location, geo-tags, your search patterns, contacts, and
sometimes even read your messages,” says Rakshit Tandon, cyber-security consultant
with the Internet and Mobile Association of India, who does workshops with
law-enforcement agencies on Internet security.
The ideal way is to remove the Internet factor—switch off 2G, 3G and 4G and
use your smartphone only to make calls. If you don’t want to switch off the World
Wide Web completely, start by controlling the apps. Uninstall the apps you don’t
require and haven’t used for a while. Then head to the app websites and delete your
personal account from there. Simply uninstalling the app won’t delete your personal
information from the company’s servers.
If you want to make sure personal data is removed by the app owners, email
the webmasters of the companies running these apps and ask them to erase your
personal content. If you don’t want to uninstall the app from the phone, make sure
you know what permissions each of these apps is using. In most phones, you can head
to App Settings and you’ll know what all you’ve said yes to. Switch off the
permissions you don’t want to give, or uninstall if the app refuses to work without
these.
STEP 5: Remove search engine results
Would you want your name to vanish from search engine results? If the
answer is yes, then most of the search engines let you remove certain links—which
come up when you search your name—that might be harming your reputation.
However, if the mention is not harming your reputation in any way or isn’t a
copyright infringement or harassment, as decided by the search engine company, it
might be hard to get a search engine to remove links about you. In that case, click on
each of the links, head to the individual websites that are using your name in news,
mentions, or listings, and email each webmaster of these websites, requesting them to
remove mentions about you from their sites.
STEP 6: Become browser-anonymous
When you next want to go online and search, make sure you do it
anonymously. By default, most browsers track your activity. Opt for Incognito modes
in the browser. Enable Privacy Badger (www.eff.org/privacybadger; free for Chrome
and Firefox) to make sure cookies are disabled and third-party trackers are not
secretly seeing what you check online. Install AdBlock Plus (Adblockplus.org; free
on Firefox, Chrome and Safari) to block banner ads, pop-up ads, tracking cookies and
scripts.
Another thing you can do is make sure you have opted out of Google
Analytics tracking. Go to Tools.google.com/dlpage/gaoptout and opt out. If you like
anonymity but do want to browse, consider the open-source anonymous Tor Project
(Torproject.org), which lets you browse online and communicate with others without
tracking you.
STEP 7: Reinvent
Some online companies don’t delete information on their servers even if you
delete your account with them. In that case, give misleading information, like the
wrong birth date, name, surname, age, profile photos, etc. Replace all genuine content
with fake content. Then, the information in the company’s account will not harm you.
STEP 8: Contact the webmaster
As mentioned, in the case of websites that have information about you but
don’t have a way for you to delete it, you can always write emails to webmasters,
requesting them to erase the information. If they don’t pay heed, you can go to court.
But remember, court jurisdiction is applicable only for unlawful acts, breach of
confidentiality and copyright infringements, says Mishi Choudhary, legal director at
the Software Freedom Law Center, which has offices in New York, US, and New
Delhi. By clicking on the “I accept” button and using the website, you have already
entered into a contract with the company wherein the company collects data about
you, so be prepared for the company to refuse to delete your data. Legally, they might
be covered, says Choudhary.
STEP 9: Delete your emails
Log into all the email accounts you have signed up for and deactivate them.
This needs to be the last activity as you will need your email ID for all the steps
mentioned above.
Now that you have all the free time in the world, head out into the sunlight and
figure out how you will utilize it.

More Related Content

What's hot

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15Naval OPSEC
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15Naval OPSEC
 
Social Login Myths for Businesses - LoginRadius
Social Login Myths for Businesses - LoginRadiusSocial Login Myths for Businesses - LoginRadius
Social Login Myths for Businesses - LoginRadiusLoginRadius
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014Naval OPSEC
 
IP Issues & Social Media - Look Before You Tweet
IP Issues & Social Media - Look Before You TweetIP Issues & Social Media - Look Before You Tweet
IP Issues & Social Media - Look Before You TweetNow Dentons
 
Instagram Policy primer
Instagram Policy primerInstagram Policy primer
Instagram Policy primerRhiJohn
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14Naval OPSEC
 
The Best Practices of Social Login Integration to Boost User Engagement
The Best Practices of Social Login Integration to Boost User EngagementThe Best Practices of Social Login Integration to Boost User Engagement
The Best Practices of Social Login Integration to Boost User EngagementLoginRadius
 
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015RapidSSLOnline.com
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websitesmaha5960
 
GOOGLE MANUAL PENALTY-10June16
GOOGLE MANUAL PENALTY-10June16GOOGLE MANUAL PENALTY-10June16
GOOGLE MANUAL PENALTY-10June16gldsingh1
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 
How to Delete Yourself from the Internet
How to Delete Yourself from the InternetHow to Delete Yourself from the Internet
How to Delete Yourself from the Internetcraig burr
 
9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebookKevin Sluss
 

What's hot (20)

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Do not track me
Do not track meDo not track me
Do not track me
 
How to automate your Affiliate FOREX marketing using LinkedIn
How to automate your Affiliate FOREX marketing using LinkedInHow to automate your Affiliate FOREX marketing using LinkedIn
How to automate your Affiliate FOREX marketing using LinkedIn
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Social Login Myths for Businesses - LoginRadius
Social Login Myths for Businesses - LoginRadiusSocial Login Myths for Businesses - LoginRadius
Social Login Myths for Businesses - LoginRadius
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
IP Issues & Social Media - Look Before You Tweet
IP Issues & Social Media - Look Before You TweetIP Issues & Social Media - Look Before You Tweet
IP Issues & Social Media - Look Before You Tweet
 
Instagram Policy primer
Instagram Policy primerInstagram Policy primer
Instagram Policy primer
 
Linkedln smart card
Linkedln smart cardLinkedln smart card
Linkedln smart card
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
The Best Practices of Social Login Integration to Boost User Engagement
The Best Practices of Social Login Integration to Boost User EngagementThe Best Practices of Social Login Integration to Boost User Engagement
The Best Practices of Social Login Integration to Boost User Engagement
 
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
 
Online Security
Online SecurityOnline Security
Online Security
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
LinkedIn Smart Card 070314
LinkedIn Smart Card 070314LinkedIn Smart Card 070314
LinkedIn Smart Card 070314
 
Test
TestTest
Test
 
GOOGLE MANUAL PENALTY-10June16
GOOGLE MANUAL PENALTY-10June16GOOGLE MANUAL PENALTY-10June16
GOOGLE MANUAL PENALTY-10June16
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
How to Delete Yourself from the Internet
How to Delete Yourself from the InternetHow to Delete Yourself from the Internet
How to Delete Yourself from the Internet
 
9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook
 

Similar to Log off from the internet, step by step

Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Raul Colon
 
Digital Footprint Management Plan 543
Digital Footprint Management Plan 543Digital Footprint Management Plan 543
Digital Footprint Management Plan 543KristiShain
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Explorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithmExplorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithmAnsgar Koene
 
2013 05 tips
2013 05 tips2013 05 tips
2013 05 tipsLiberteks
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptxLyndaWillett
 
Get Out of LinkedIn Jail (Do Not Pass Go!)
Get Out of LinkedIn Jail (Do Not Pass Go!)Get Out of LinkedIn Jail (Do Not Pass Go!)
Get Out of LinkedIn Jail (Do Not Pass Go!)Brynne Tillman
 
Managing your own data.pdf
Managing your own data.pdfManaging your own data.pdf
Managing your own data.pdfstirlingvwriters
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxjaggernaoma
 
Help Employees Socialize Your Brand
Help Employees Socialize Your BrandHelp Employees Socialize Your Brand
Help Employees Socialize Your BrandThe Safdar Group
 
Action Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc InformationAction Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc Informationebooker97
 
Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...Ida Olsson
 
10 best practices to drive on site engagement
10 best practices to drive on site engagement10 best practices to drive on site engagement
10 best practices to drive on site engagementAmanda Snyder
 
10 best practices to drive on site engagement
10 best practices to drive on site engagement10 best practices to drive on site engagement
10 best practices to drive on site engagementAmanda Snyder
 

Similar to Log off from the internet, step by step (20)

Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
security procedures
security procedures
security procedures
security procedures
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Digital Footprint Management Plan 543
Digital Footprint Management Plan 543Digital Footprint Management Plan 543
Digital Footprint Management Plan 543
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
Explorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithmExplorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithm
 
2013 05 tips
2013 05 tips2013 05 tips
2013 05 tips
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
 
it.pptx
it.pptxit.pptx
it.pptx
 
Facebook Smart Card 070314
Facebook Smart Card 070314Facebook Smart Card 070314
Facebook Smart Card 070314
 
Get Out of LinkedIn Jail (Do Not Pass Go!)
Get Out of LinkedIn Jail (Do Not Pass Go!)Get Out of LinkedIn Jail (Do Not Pass Go!)
Get Out of LinkedIn Jail (Do Not Pass Go!)
 
Facebook Smart Card
Facebook Smart CardFacebook Smart Card
Facebook Smart Card
 
Managing your own data.pdf
Managing your own data.pdfManaging your own data.pdf
Managing your own data.pdf
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Help Employees Socialize Your Brand
Help Employees Socialize Your BrandHelp Employees Socialize Your Brand
Help Employees Socialize Your Brand
 
Action Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc InformationAction Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc Information
 
Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...
 
10 best practices to drive on site engagement
10 best practices to drive on site engagement10 best practices to drive on site engagement
10 best practices to drive on site engagement
 
10 best practices to drive on site engagement
10 best practices to drive on site engagement10 best practices to drive on site engagement
10 best practices to drive on site engagement
 

More from niraj joshi

Social media marketing project
Social media marketing  projectSocial media marketing  project
Social media marketing projectniraj joshi
 
Social media marketing
Social media  marketingSocial media  marketing
Social media marketingniraj joshi
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackersniraj joshi
 
Why big data promises
Why big data promisesWhy big data promises
Why big data promisesniraj joshi
 
The power of persistence in your career
The power of persistence in your careerThe power of persistence in your career
The power of persistence in your careerniraj joshi
 
Strategic management » strategic outsourcing
Strategic management » strategic outsourcingStrategic management » strategic outsourcing
Strategic management » strategic outsourcingniraj joshi
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competitionniraj joshi
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competitionniraj joshi
 
Managerial economics » oligopolistic market
Managerial economics » oligopolistic marketManagerial economics » oligopolistic market
Managerial economics » oligopolistic marketniraj joshi
 
3 things to think about before changing careers
3 things to think about before changing careers3 things to think about before changing careers
3 things to think about before changing careersniraj joshi
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phoneniraj joshi
 
Facebook free basics
Facebook  free basicsFacebook  free basics
Facebook free basicsniraj joshi
 
How to stay relevant in an ever
How to stay relevant in an everHow to stay relevant in an ever
How to stay relevant in an everniraj joshi
 
Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham niraj joshi
 
Multidivisional organizational structure
Multidivisional organizational structureMultidivisional organizational structure
Multidivisional organizational structureniraj joshi
 
Total, average and marginal revenues
Total, average and marginal revenuesTotal, average and marginal revenues
Total, average and marginal revenuesniraj joshi
 
ISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVESISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVESniraj joshi
 

More from niraj joshi (20)

Social media marketing project
Social media marketing  projectSocial media marketing  project
Social media marketing project
 
Social media marketing
Social media  marketingSocial media  marketing
Social media marketing
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackers
 
Why big data promises
Why big data promisesWhy big data promises
Why big data promises
 
The power of persistence in your career
The power of persistence in your careerThe power of persistence in your career
The power of persistence in your career
 
Strategic management » strategic outsourcing
Strategic management » strategic outsourcingStrategic management » strategic outsourcing
Strategic management » strategic outsourcing
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competition
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competition
 
News in brief2
News in brief2News in brief2
News in brief2
 
News in brief
News in briefNews in brief
News in brief
 
Managerial economics » oligopolistic market
Managerial economics » oligopolistic marketManagerial economics » oligopolistic market
Managerial economics » oligopolistic market
 
3 things to think about before changing careers
3 things to think about before changing careers3 things to think about before changing careers
3 things to think about before changing careers
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Facebook
FacebookFacebook
Facebook
 
Facebook free basics
Facebook  free basicsFacebook  free basics
Facebook free basics
 
How to stay relevant in an ever
How to stay relevant in an everHow to stay relevant in an ever
How to stay relevant in an ever
 
Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham
 
Multidivisional organizational structure
Multidivisional organizational structureMultidivisional organizational structure
Multidivisional organizational structure
 
Total, average and marginal revenues
Total, average and marginal revenuesTotal, average and marginal revenues
Total, average and marginal revenues
 
ISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVESISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVES
 

Recently uploaded

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 

Recently uploaded (20)

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Log off from the internet, step by step

  • 1. LOG OFF FROM THE INTERNET, STEP BY STEP A 101 on removing your personal data from the Internet. But be warned: it’s a painful exercise Had enough of selfies, tweets, posts and searches? Tired of bots tracking and predicting every move of yours? If you want to get back to being anonymous, here’s how you can systematically delete personal information from the World Wide Web. STEP 1: Target social media Posts, photos, thoughts, tumblers, tweets.... We have all posted endless numbers of things online on various social media accounts. Start by deleting all these accounts: Facebook, Google Plus, LinkedIn, Instagram, Pinterest, YouTube. All of them have the option to deactivate an account. If you are still not able to figure out how to delete a particular social media account, head to DeleteYourAccount.com, which tells you the process for 34 social media accounts. STEP 2: Get hold of other accounts Remember that shopping site where you created an account because they had an offer you just couldn’t resist? Or that food app which had promised a free dinner if you signed up with them? Even that dating site you visited once? And that game you played for a day and then forgot about? It’s time to go through your emails and list all the obscure accounts you’ve created over the years. If you’re not sure, simply search for your name and the usernames you use in Google, Bing, Yahoo and other search engines. You may have forgotten the passwords or the account could have been deactivated simply because you haven’t used it in a long time. But if you really want to wipe that slate clean, you will need to reset the password, sign in to reactivate the account, and then proceed to delete it. Most of the online companies allow you to deactivate, but there’s no guarantee that all of them will actually delete all the data they have collected about you, says Thejesh G.N., a Bengaluru-based technologist and co-founder of DataMeet, a community of open-data
  • 2. enthusiasts. “Unfortunately, in India we don’t have any legal option to demand that the personal data be deleted by the online or telecommunication company,” he says. This is why the other steps that follow are important. STEP 3: Unsubscribe mailing lists There was a time before social media when we used to subscribe to the newsletters of different websites. You might still be old-fashioned and get emails from Google and Yahoo groups and various forums, as well as from associations and sundry accounts that you have subscribed to. Go through your Inbox, Spam and Junk folders and methodically unsubscribe from each of these groups. STEP 4: Dumb down your phone Every app that you downloaded on your smartphone collects some kind of data about you. “Apps send off location, geo-tags, your search patterns, contacts, and sometimes even read your messages,” says Rakshit Tandon, cyber-security consultant with the Internet and Mobile Association of India, who does workshops with law-enforcement agencies on Internet security. The ideal way is to remove the Internet factor—switch off 2G, 3G and 4G and use your smartphone only to make calls. If you don’t want to switch off the World Wide Web completely, start by controlling the apps. Uninstall the apps you don’t require and haven’t used for a while. Then head to the app websites and delete your personal account from there. Simply uninstalling the app won’t delete your personal information from the company’s servers. If you want to make sure personal data is removed by the app owners, email the webmasters of the companies running these apps and ask them to erase your personal content. If you don’t want to uninstall the app from the phone, make sure you know what permissions each of these apps is using. In most phones, you can head to App Settings and you’ll know what all you’ve said yes to. Switch off the permissions you don’t want to give, or uninstall if the app refuses to work without these. STEP 5: Remove search engine results Would you want your name to vanish from search engine results? If the answer is yes, then most of the search engines let you remove certain links—which come up when you search your name—that might be harming your reputation. However, if the mention is not harming your reputation in any way or isn’t a copyright infringement or harassment, as decided by the search engine company, it might be hard to get a search engine to remove links about you. In that case, click on each of the links, head to the individual websites that are using your name in news,
  • 3. mentions, or listings, and email each webmaster of these websites, requesting them to remove mentions about you from their sites. STEP 6: Become browser-anonymous When you next want to go online and search, make sure you do it anonymously. By default, most browsers track your activity. Opt for Incognito modes in the browser. Enable Privacy Badger (www.eff.org/privacybadger; free for Chrome and Firefox) to make sure cookies are disabled and third-party trackers are not secretly seeing what you check online. Install AdBlock Plus (Adblockplus.org; free on Firefox, Chrome and Safari) to block banner ads, pop-up ads, tracking cookies and scripts. Another thing you can do is make sure you have opted out of Google Analytics tracking. Go to Tools.google.com/dlpage/gaoptout and opt out. If you like anonymity but do want to browse, consider the open-source anonymous Tor Project (Torproject.org), which lets you browse online and communicate with others without tracking you. STEP 7: Reinvent Some online companies don’t delete information on their servers even if you delete your account with them. In that case, give misleading information, like the wrong birth date, name, surname, age, profile photos, etc. Replace all genuine content with fake content. Then, the information in the company’s account will not harm you. STEP 8: Contact the webmaster As mentioned, in the case of websites that have information about you but don’t have a way for you to delete it, you can always write emails to webmasters, requesting them to erase the information. If they don’t pay heed, you can go to court. But remember, court jurisdiction is applicable only for unlawful acts, breach of confidentiality and copyright infringements, says Mishi Choudhary, legal director at the Software Freedom Law Center, which has offices in New York, US, and New Delhi. By clicking on the “I accept” button and using the website, you have already entered into a contract with the company wherein the company collects data about you, so be prepared for the company to refuse to delete your data. Legally, they might be covered, says Choudhary. STEP 9: Delete your emails Log into all the email accounts you have signed up for and deactivate them. This needs to be the last activity as you will need your email ID for all the steps mentioned above.
  • 4. Now that you have all the free time in the world, head out into the sunlight and figure out how you will utilize it.