Every time you create an account, make a purchase, post on social media, or simply browse the web, you leave traces of personal information behind. Individually, these traces seem harmless. Combined, they form a detailed portrait of your life — where you live, where you work, what you earn, who you know, and what you do in your spare time.
For most people, this is a background concern. For executives, public figures, and their families, it's an operational risk. Nearly one in three Americans has faced an identity theft attempt, and the global cost of identity fraud is projected to exceed US$50 billion in 2025. Your digital footprint can be used for targeted phishing, social engineering, physical stalking, competitive intelligence, or reputational attacks.
This checklist walks through the most common areas where personal information leaks — and what to do about each one. You don't need to tackle everything in a weekend. Pick the sections that apply to you and work through them at your own pace.
1. Email accounts
Your email address is the skeleton key to your digital life. Most password resets, account verifications, and two-factor codes go through email. If someone gains access to your primary email, they can cascade into almost everything else.
- Use a unique, strong password for your primary email. It should not be reused anywhere else. A password manager makes this practical.
- Enable two-factor authentication (2FA) using an authenticator app (Google Authenticator, Authy, or Microsoft Authenticator). SMS-based 2FA is better than nothing but vulnerable to SIM swapping.
- Check for breaches. Search your email on HaveIBeenPwned.com, which indexes over 12 billion compromised records from nearly 1,000 breached sites. If your email appears, change the password immediately and check what other accounts use that same password.
- Use a secondary email for online shopping, newsletter signups, and anything non-essential. Keep your primary email for banking, work, and critical accounts only.
- Review connected apps. In Gmail, go to Security > Third-party apps with account access. In Outlook, go to Privacy > Apps & services. Revoke access for anything you don't recognise or no longer use.
2. Passwords
The average person has over 100 online accounts. If you're reusing passwords across any of them, a single breach can compromise dozens of accounts.
- Use a password manager. 1Password, Bitwarden, and Dashlane are all reputable options. They generate and store unique passwords for every account.
- Audit your existing passwords. Most password managers have a built-in audit feature that flags reused, weak, or breached passwords. Run it and fix the worst offenders first.
- Never share passwords via email or messaging. If you need to share credentials with a family member or assistant, use your password manager's secure sharing feature.
- Change passwords for critical accounts (email, banking, company systems) at least annually, and immediately after any breach notification.
3. Social media profiles
Social media is one of the largest sources of freely available personal information. Even if your account is private, certain information may still be visible.
- Audit your profile information. Remove your phone number, home address, birthday (or set it to private), workplace, and school from your profiles. This information is harvested by data brokers and social engineers.
- Review your friends/followers list. On platforms like Facebook, your connections list reveals your social network. Set it to "Only me" or "Friends only."
- Check tagged photos. Others may have tagged you in photos that reveal your location, daily routine, or associates. Review tags and remove any that concern you.
- Google yourself. Search your full name (in quotes), your usernames, and your email addresses. Note what appears and where. This is what anyone else sees when they look you up.
- Search for old accounts. That MySpace profile from 2006, the forum account you created in university, the dating profile you forgot about — these still exist and may contain personal information. Find them, delete them, or at least strip out identifying details.
4. Phone and devices
Your phone is likely the most data-rich device you own. It knows where you are, who you talk to, what apps you use, and how long you spend on each one.
- Review app permissions. Go through your phone's permission settings (Settings > Privacy on both iOS and Android). Revoke location access for apps that don't need it. Be particularly strict with camera and microphone access.
- Turn off location sharing for all social media apps. If an app needs location for navigation (maps, ride-sharing), set it to "Only while using."
- Disable advertising ID. On iOS: Settings > Privacy > Tracking > disable "Allow Apps to Request to Track." On Android: Settings > Privacy > Ads > Delete advertising ID.
- Update your operating system. Security patches close vulnerabilities. Enable automatic updates so you don't fall behind.
- Use a VPN on public Wi-Fi. Hotel, airport, and coffee shop networks are trivial to eavesdrop on. A reputable VPN (Mullvad, ProtonVPN, or NordVPN) encrypts your traffic.
5. Financial and shopping accounts
Every online purchase creates a trail of data — what you bought, when, how much you spent, and where it was delivered.
- Use a credit card, not a debit card for online purchases. Credit cards have stronger fraud protection, and a compromised number doesn't give access to your bank account.
- Enable transaction alerts for all cards and bank accounts. Immediate notification of unexpected charges catches fraud early.
- Use a secondary email for shopping accounts. This separates your purchase history from your primary identity.
- Opt out of data sharing. Most retailers share or sell purchase data. Check the privacy settings of accounts with Amazon, eBay, and any loyalty programmes you've joined.
- Delete accounts you no longer use. That online store you ordered from once in 2019 still has your credit card and delivery address. Close the account or at least remove stored payment methods.
6. Domain names and business registrations
If you own a personal website, your registration details may be publicly visible in the WHOIS database. This is one of the first places investigators, journalists, and data brokers look.
- Enable WHOIS privacy protection on all domain names. Most registrars offer this for free or a small fee. It replaces your name, address, and phone number with a proxy.
- Use a registered agent for business filings if possible. In many jurisdictions, the registered agent's address appears on public records instead of yours.
- Check what's on Companies House (UK), ASIC (Australia), or your local business registry. Your home address may be listed as a company address.
7. Data brokers
Even if you've locked down everything above, data brokers may already have historical information about you compiled from public records, commercial transactions, and other sources.
- Search for yourself on major people-search sites — Spokeo, WhitePages, BeenVerified, TruePeopleSearch, and PeopleFinder. Note which ones have your data.
- Submit opt-out requests starting with the sites that display the most sensitive information (home address, phone number).
- Set a calendar reminder to check back in 3–6 months. Brokers often re-acquire data, so removal needs to be periodic.
- Consider an automated removal service. Manually opting out of dozens of brokers is time-consuming and needs to be repeated. Automation services handle the submissions and follow-ups for you.
If you only have 30 minutes, these five actions will address your biggest exposures:
- Enable 2FA on your primary email account
- Install a password manager and save your most critical passwords
- Turn off location services for all social media apps
- Google your full name in quotes and note what appears
- Check your email on a breach database
Everything else on this list is important, but these five steps eliminate the most common attack vectors.
8. Ongoing monitoring
Privacy isn't a one-time project. New breaches happen constantly, data brokers re-acquire your information, and your family's digital footprint changes as children grow up and create their own accounts.
- Set up breach monitoring for all email addresses in your household. You want to know the same day a breach is reported, not weeks later.
- Monitor public mentions of your name and your family members' names. This catches impersonation, doxxing, and reputation threats early.
- Review this checklist quarterly. Privacy posture degrades over time as new accounts are created, new apps are installed, and new data is collected. A 15-minute review every three months keeps things in check.
Your digital footprint will never be zero. The goal is to make it small enough and controlled enough that it doesn't become a liability. Start with the biggest risks, automate what you can, and build it into your routine.