I have not always had an interest in data privacy. Actually, it took me moving in to being a data engineer in the marketing world to really realise the intense nature of data capture.
Like, I am sure, a large proprotion of the privacy aware population, it is not that there is anything to hide, just that privacy of data should be a right. It is one of the reasons I stepped away from most social networks, try to de-Google as much as I can and take care in my data landscape.
But, how does everyone else manage theirs? It would be good to share some useful tips, resources, tools, etc. that the wider community (as it grows) can use.
For me, I use:
- A VPN (Mullvad in this case)
- Firefox with 'some' hardening (don't want to totally cripple the online experience)
- Windows OS with telemtry disabled across the system (never perfect but I am happy)
- Simplewall (Windows App) to manage some outbound traffic
- Random password generators (exact logic is incredibly unique to me)
- Android (mobile) with as much telemetry disabled as possible
- Privacy Guides, a great website to keep atop of new updates
- Various threat landscape blogs and podcasts
Listing it out, it sounds like I do a lot but this is pretty tame. I accept that there is a balance between user experience and privacy. Yes, I could totally de-Google my phone but then a lot of useful functionality is lost. Same with Windows, I could move to Linux full-time (and would if I could) but I am a gamer and, while Linux is improving in that landscape, it ain't great just yet.
It has already been said but the company is complying in the sense that it is providing a solution whereby you can delete your account. That said, where you are unable to follow that process, they should offer you the same ability via email. Each company does things slightly differently but I would hazard a guess that an email stating that you find it more reasonable for the action to be carried out via email, they would be likely to comply.
The reasons why companies put these in place is simply to avoid mass requests for deletion and, as stated, to also protect you.
While email spoofing has been mentioned, it is somewhat unlikely anyone would send a request for deletion after spoofing your email, yet, it is not impossible.
You may have to be persistent, could use services that support or even get some pointers from the ICO. Here is a really good link https://ico.org.uk/for-the-public/your-right-to-get-your-data-deleted/
I wish you luck