Enterprise & Industry

A data removal service helped me reclaim my privacy - see if you need one, too

Automated services removed childhood addresses, old phone numbers, and relative data in bulk scans.

Deep Dive

ZDNET staff writer Cesar Cadenas conducted a personal test of two leading data removal services, PrivacyBee and DeleteMe, to combat the pervasive collection and sale of personal information by data brokers. These companies aggregate details like phone numbers, home addresses, and email from sources including social media, apps, and major data breaches, creating a sprawling ecosystem that profits from user data. Manual removal is described as "essentially impossible" due to the sheer number of brokers and the lack of a clear starting point, making automated services a critical tool.

During testing, the services successfully located and facilitated the removal of a significant amount of sensitive information, including current and former phone numbers, names, and even data on distant relatives. One scan shockingly resurfaced the address of Cadenas's childhood home, highlighting the depth of historical data collection. The core value proposition is automation: the services continuously scan obscure corners of the internet and systematically issue takedown requests to brokers, a process far more efficient than individual efforts. The article concludes that for anyone, especially those impacted by multiple data breaches, these services are a powerful and worthwhile response to a flawed data privacy landscape.

Key Points
  • Services like PrivacyBee and DeleteMe automate takedown requests from hundreds of data brokers, a task impractical to do manually.
  • In tests, removed data included current/old phone numbers, addresses (even a childhood home), and information on relatives.
  • They continuously scan for personal data spread from social media, apps, and breaches, offering ongoing protection.

Why It Matters

Automates the near-impossible task of manually removing your data from the broker ecosystem, a key step for post-breach privacy.