DeleteMe

DeleteMePrivacyPrivacy News

Privacy Matters in Vermont: State Passes Law to Regulate Data Brokers

Last week, Vermont became the first U.S. state to authorize and regulate data brokers that buy and sell personal information of consumers. The law is meant to provide an additional layer of protection to consumers as well as place accountability onto massive data brokers like White pages, Spokeo and Been Verified that up until now […]

Read More

DeleteMePrivacyPrivacy News

Is your privacy worth $560 Million?

Jane Doe Wins Lottery: $560 Million – won’t reveal identity After winning an astonishing $560 Million Powerball jackpot, “Jane Doe”, as she’s being called by the papers, is now the subject of intense stress as she refuses to give up her anonymity.It’s the classic “It could never happen to me” scenario: all of a sudden, […]

Read More

DeleteMeHow-TosPrivacy

Why do I need to renew DeleteMe?

Your information is always re-populating and reappearing on Spokeo, White Pages, Been Verified, Intelius. Renew DeleteMe.   Back in 2012, we published an article about why our DeleteMe service is a recurring subscription, why it’s recommended that you always renew DeleteMe, and it’s not simply a 1-time thing. Now it’s 2018, there’s more data brokers and people […]

Read More

DeleteMeFeaturesHow-TosPrivacy

What are data brokers? Spokeo, White Pages, Intelius, Been Verified, People Finders

Who are these Data Brokers? Spokeo, White Pages, Been Verified, People Finder Data Brokers: corporations that collect large swaths of personally identifiable information (PII) and package it all together to create “profiles” with identifying tags. These tags include everything from Social Security Numbers and birthdays, to the Type of Roof on your house and “motorcycle […]

Read More

BlurDeleteMeHacks and Data BreachesPrivacy

So, what happens if Abine’s servers get hacked?

These days, the next big data breach announcement is seemingly a weekly occurrence. Often, the companies getting hacked and their associated data breaches are a result of lax security protocols, but it increasingly appears that no one is immune to the growing number of threats, sneaky hacks, and unknown vulnerabilities latent everywhere in software running […]

Read More