{"id":54209,"date":"2025-08-26T13:04:07","date_gmt":"2025-08-26T17:04:07","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=54209"},"modified":"2025-08-26T13:14:40","modified_gmt":"2025-08-26T17:14:40","slug":"how-to-remove-yourself-from-data-brokers-people-search-sites","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/54209\/","title":{"rendered":"Why data brokers build dossiers on you, and how to stop them doing so"},"content":{"rendered":"<p>Data brokers compile extensive dossiers on you to resell later. They\u2019re interested in all of us \u2014 hundreds of millions of folks worldwide \u2014 and they don\u2019t ask for our permission or pay us any compensation. Most of these companies aren\u2019t well known, and you\u2019ve likely never had any direct contact with them. But there are around a thousand of them in the U.S. alone, and five times as many worldwide. This market was estimated at <a href=\"https:\/\/www.grandviewresearch.com\/industry-analysis\/data-broker-market-report\" target=\"_blank\" rel=\"nofollow noopener\">nearly $300 billion<\/a> last year. Data brokers\u2019 clients include banks checking credit history, retailers looking for new customers, intelligence agencies, and many other organizations that need detailed data on individuals.<\/p>\n<h2>What do data brokers collect, and where from?<\/h2>\n<p>Data brokers collect anything and everything they can get their hands on. Most often:<\/p>\n<ul>\n<li>Personal information: full names, physical addresses, dates of birth, phone numbers, email addresses, identification numbers (passports, driver\u2019s licenses, social security numbers, etc.)<\/li>\n<li>Age, gender, origin, marital and financial status, level and type of education<\/li>\n<li>Number and type of pets<\/li>\n<li>Car make and mileage<\/li>\n<li>Geolocation data: likely places of work and residence, favorite stores, entertainment spots<\/li>\n<li>Details on online and offline purchases, membership in retailer loyalty programs, favorite brands<\/li>\n<li>Detailed financial information: creditworthiness, number and types of accounts, deposits, investments, mortgages, credit card habits, bankruptcy data<\/li>\n<li>Online behavior data: favorite websites, types of content frequently viewed on social media, hobbies, recently viewed ads, etc.<\/li>\n<\/ul>\n<ul>\n<li>Health information, including data on medication purchases, online symptom searches, data from fitness apps<\/li>\n<li>Habits, interests, political and religious beliefs, favorite media outlets<\/li>\n<li>Social connections: family members, coworkers, friends<\/li>\n<\/ul>\n<p>To compile such an intimidatingly detailed file, brokers download any publicly available data (social media profiles, business registries, real estate registries, online classified ads), request information from credit bureaus, and buy data from each other. They also purchase data from loyalty programs, and analytics from gadget vendors. And they collaborate with online advertising and tracking firms \u2014 especially those that place ads in mobile apps.<\/p>\n<p>All this information is cross-referenced using recurring identifiers (email addresses, phone numbers, names and addresses, ID numbers) to enrich each profile.<\/p>\n<h2>What\u2019s so bad about data collection?<\/h2>\n<p>Collected and resold data has an invisible yet significant impact on your life. Why were you denied a loan, or why did your insurance premium go up? How come real estate agents have your phone number when you only decided to buy a house yesterday? According to a U.S. Senate committee <a href=\"https:\/\/www.commerce.senate.gov\/services\/files\/bd5dad8b-a9e8-4fe9-a2a7-b17f4798ee5a\" target=\"_blank\" rel=\"nofollow noopener\">investigation<\/a>, some data brokers\u2019 collections are clearly designed to exploit people\u2019s difficult circumstances. The names of these datasets speak for themselves: \u201cRural and Barely Making It\u201d, \u201cRetiring on Empty: Singles\u201d, and \u201cTough Start: Young Single Parents\u201d. Information like this is often purchased by payday loan providers. Other collections are ominously named too, such as <a href=\"https:\/\/www.wired.com\/story\/data-brokers-tracking-abortion-clinics-security-news\/\" target=\"_blank\" rel=\"nofollow noopener\">\u201cIndividuals who recently visited abortion clinics\u201d<\/a>.<\/p>\n<p>In an extreme example from 2025, a killer <a href=\"https:\/\/www.lawfaremedia.org\/article\/data-brokers-are-a-killer's-best-friend\" target=\"_blank\" rel=\"nofollow noopener\">bought data on victims\u2019 residential addresses<\/a> from publicly available data broker websites to track and assassinate political targets in the U.S.<\/p>\n<p>The same Senate investigation highlights that brokers usually operate in secrecy. They collect data without directly interacting with consumers, often hide their data sources, and prohibit their buyers from revealing where contact lists were obtained.<\/p>\n<p>Note that data brokers, like any other companies, are vulnerable to cyberattacks. When they\u2019re breached, the data they\u2019ve collected falls into the hands of true cybercriminals. The scale of the consequences for victims of a data breach can be illustrated with just one case: last year, hackers stole a <a href=\"https:\/\/www.cbsnews.com\/news\/social-security-number-leak-npd-breach-what-to-know\/\" target=\"_blank\" rel=\"nofollow noopener\">database containing 2.7 billion records from a company named National Public Data.<\/a> The records included full names, addresses, dates of birth, phone numbers, and social security numbers (SSNs). It\u2019s believed that the breach affected <em>every<\/em> US citizen or resident with an SSN!<\/p>\n<h2>The challenges of getting your data removed<\/h2>\n<p>While the world is gradually introducing legislation to force data brokers to comply with user requests to find and remove personal information, the process can be quite challenging in practice.<\/p>\n<ul>\n<li>There\u2019s no centralization. You have to search for your own data on each data broker\u2019s website and make separate removal requests.<\/li>\n<li>Even locating data brokers \u2014 not to mention the page on their website where you can make a request \u2014 can be fraught with difficulty. According to a recent <a href=\"https:\/\/themarkup.org\/privacy\/2025\/08\/12\/we-caught-companies-making-it-harder-to-delete-your-data\" target=\"_blank\" rel=\"nofollow noopener\">study<\/a> by The Markup, in California alone \u2014 where local legislation mandates centralized registration of data brokers and requires data removal upon a user request under the <a href=\"https:\/\/en.wikipedia.org\/wiki\/California_Consumer_Privacy_Act\" target=\"_blank\" rel=\"nofollow noopener\">CCPA<\/a> \u2014 35 out of 499 registered data brokers prohibited search engines from indexing and displaying their data removal pages. The removal link itself is often buried deep in the website\u2019s footer or elsewhere (in one case it was found on page 15 of the privacy policy).<\/li>\n<li>Information removal requests are often complex and consist of multiple steps. They may even require <em>more<\/em> personal data from you to prove that you are indeed you, and you have the right to submit a request. A <a href=\"https:\/\/arxiv.org\/pdf\/2506.21914\" target=\"_blank\" rel=\"nofollow noopener\">study<\/a> by UC Irvine highlighted some exotic methods of identity verification, such as providing your zodiac sign or your monthly car loan payment amount. If the request isn\u2019t worded correctly or the verification data isn\u2019t provided, the request is ignored.<\/li>\n<li>The same study found that, out of 454 information removal requests submitted, 195 (43%) were ignored.<\/li>\n<\/ul>\n<h2>How to actually remove yourself from data brokers\u2019 databases<\/h2>\n<p>If you\u2019re up for a challenge, arm yourself with both patience and a spreadsheet (in Excel or similar), and follow our instructions:<\/p>\n<ul>\n<li>First, identify the data brokers you want to contact. You can find a <a href=\"https:\/\/privacyrights.org\/data-brokers\" target=\"_blank\" rel=\"nofollow noopener\">full up-to-date list<\/a> from the Privacy Rights Clearinghouse, but it\u2019s heavily focused on U.S.-based companies. While they\u2019re the biggest players in the market, be sure to find brokers specific to your region as well.<\/li>\n<li>Create and save a standard template for your removal request email. The message should include your key personal details and reference the applicable laws in your case: CCPA for California residents; GDPR for the EU; UK-GDPR for the UK; LGPD for Brazil; 152-FZ for Russia. Even if you don\u2019t live in one of these regions, you can still reference CCPA or GDPR \u2014 some providers will honor the request without verifying if the law directly applies to you.<\/li>\n<li>For each data broker, locate the page for submitting a request, which might be named \u201cOpt Out\u201d, \u201cDo Not Sell\u201d, \u201cPrivacy Request\u201d, \u201cRight to Delete\u201d, \u201cRight to Be Forgotten\u201d, or something along those lines. Your best bet is to start by looking for small-print links in the footer of the web page. If you can\u2019t find anything there, check the privacy policy section. You can also try a Google search.<\/li>\n<li>Carefully review the broker\u2019s specific requirements. If they require you to send a request via email, simply send your template to the provided address. If an online form is required, fill in the fields using snippets from the same template.<\/li>\n<li>In your spreadsheet, indicate the name of the broker, the date you submitted the request, and the URL of the request page (so you don\u2019t have to search for it again).<\/li>\n<li>Be patient \u2014 a response (if you get one at all) could take up to six weeks. This is where your spreadsheet comes in handy \u2014 you can use it to track response times and send follow-up requests as needed.<\/li>\n<li>For those who lack the time or patience, there are paid services that can automatically send these requests for you.<\/li>\n<li>Most importantly, this isn\u2019t a one-time process. Data about you is constantly being collected and sold to brokers, so you should go through the same list again every three to six months.<\/li>\n<\/ul>\n<h2>How to stay off data brokers\u2019 lists in the first place<\/h2>\n<p>It\u2019s near impossible to avoid getting noticed by data brokers altogether, but you can minimize the amount of data they collect.<\/p>\n<ul>\n<li>Use multiple email addresses and phone numbers. One for communicating with friends, family, banks, and government agencies. A different one for online stores and non-essential services. You can even use more than two email addresses.<\/li>\n<li>Provide minimal information to loyalty programs.<\/li>\n<li>Go through the settings in your online banking apps and on your favorite e-commerce sites. Make sure you\u2019ve turned off all permissions in sections like \u201cMarketing Data\u201d, \u201cAdvertising Preferences\u201d, and \u201cPartner Offers\u201d. Feeding data to brokers is often disguised under phrases like \u201cShow me ads based on my interests\u201d.<\/li>\n<li>Turn off and reset <a href=\"https:\/\/www.kaspersky.com\/blog\/disable-mobile-app-ad-tracking\/53096\/\" target=\"_blank\" rel=\"noopener nofollow\">advertising IDs<\/a> on your smartphone.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/gps-agps-supl-tracking-protection\/48175\/\" target=\"_blank\" rel=\"noopener nofollow\">Disable location tracking<\/a> for most of your apps.<\/li>\n<li>Use the privacy settings in <a href=\"https:\/\/www.kaspersky.com\/blog\/privacy-ten-tips-2018\/23022\/\" target=\"_blank\" rel=\"noopener nofollow\">social networks<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/messengers-101-safety-and-privacy-advice\/53300\/\" target=\"_blank\" rel=\"noopener nofollow\">messaging apps<\/a>.<\/li>\n<li>Use a private browser or an app that protects against <a href=\"https:\/\/www.kaspersky.com\/blog\/web-beacons-explained-and-how-to-stop-them\/47281\/\" target=\"_blank\" rel=\"noopener nofollow\">online tracking<\/a>. Special <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.22\/226949\" target=\"_blank\" rel=\"noopener\">privacy features<\/a> are available in <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>.<\/li>\n<li>Take advantage of our free <a href=\"https:\/\/privacy.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_kd-banner_ap0072&amp;utm_content=banner&amp;utm_term=gl_kdaily_organic_hwzuab72aq5ynvk\" target=\"_blank\" rel=\"noopener\">Privacy Checker<\/a>\u00a0service to adjust your privacy settings everywhere \u2014 from social networks to operating systems.<\/li>\n<li>Subscribe to our <a href=\"https:\/\/t.me\/+hfDEDRUTiLJlOGE8\" target=\"_blank\" rel=\"noopener nofollow\">read our Telegram channel<\/a>\u00a0to be the first to learn about new threats to your privacy and how to combat them. For example, we\u2019ll soon be publishing detailed instructions on how to minimize and clean up your digital footprint (for both adults and minors).<\/li>\n<\/ul>\n<blockquote><p>Other posts about how your personal data is collected and how to fight back:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/minimizing-digital-footprints-2025\/53762\/\" target=\"_blank\" rel=\"noopener nofollow\">How to shrink your digital footprint<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/safe-digital-detox-2025\/53473\/\" target=\"_blank\" rel=\"noopener nofollow\">Digital detox: How to take a safe break from screens<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/geolocation-data-broker-leak\/53050\/\" target=\"_blank\" rel=\"noopener nofollow\">Geolocation data brokers: What they do and what happens when they leak<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-find-airtag-and-other-location-trackers-on-android-2024\/51908\/\" target=\"_blank\" rel=\"noopener nofollow\">How to stop being tracked via Bluetooth beacons like AirTag<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/51019\/\" target=\"_blank\" rel=\"noopener nofollow\">Advertisers sharing data about you with\u2026 intelligence agencies<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener nofollow\">And others<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what&#8217;s already been collected?<\/p>\n","protected":false},"author":2722,"featured_media":54213,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,9],"tags":[810,14,22,1250,26,43,321,131,812],"class_list":{"0":"post-54209","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-ads","10":"tag-apple","11":"tag-google","12":"tag-ios","13":"tag-iphone","14":"tag-privacy","15":"tag-technology","16":"tag-tips","17":"tag-tracking"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/54209\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/29492\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/24600\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/12775\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/29429\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/28531\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/31369\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/30043\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/40354\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/13740\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/23129\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/24201\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/32620\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-remove-yourself-from-data-brokers-people-search-sites\/29609\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/35356\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/34985\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tracking\/","name":"tracking"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=54209"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54209\/revisions"}],"predecessor-version":[{"id":54216,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54209\/revisions\/54216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/54213"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=54209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=54209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=54209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}