toolkit
Digital Cleanup Toolkit
A step-by-step guide to removing sensitive data, clearing devices, and reducing digital exposure.
toolkitdigital safety
DIGITAL SAFETY
Digital Cleanup Toolkit
1. Phone Cleanup
Options to reduce what someone else can see or access on your phone.
1.1 Call logs and messages
- Review recent calls and delete:
- Individual call entries
- Entire call history, if helpful
- Voicemail notifications and stored voicemails
- Check text and messaging apps:
- SMS/iMessage or default text app
- WhatsApp, Signal, Messenger, Telegram, or similar apps
- In‑app call histories and media (photos, audio)
- Decide whether to:
- Delete specific conversations only
- Archive chats (if your app supports this)
- Turn off message previews on lock screen
1.2 Apps and app history
- Review installed apps for:
- Safety or support apps you prefer to keep private
- Secondary messaging or email apps
- Cloud storage or hidden file apps
- Options:
- Delete apps you do not need
- Hide apps in folders or separate home screens (if your phone allows)
- Disable “recent apps” previews on lock screen (if available)
- Clear app “recent” lists where possible:
- App store search history
- Browser inside social media apps
- Recently opened documents in productivity apps
1.3 Location and privacy settings
- Check location settings:
- Turn off location sharing with specific contacts
- Review app‑by‑app location permissions (always / while using / never)
- Review location history and clear, if needed
- Review lock‑screen settings:
- What shows on lock screen notifications
- Whether messages display full content
- Whether voice assistants can be used when locked
- Check for remote‑control or tracking apps:
- Device‑management apps you did not install
- Unknown VPNs or security apps with extensive permissions
- Screen‑sharing or parental control tools you do not use
If you think someone might notice changes, consider gradual adjustments (for example, slowly reducing location access across multiple apps over time).
2. Computer Cleanup
Steps for clearing visible traces on laptops or desktop computers.
2.1 Browsing history and files
- Web browser:
- Check browsing history and decide what to remove
- Clear specific items instead of the full history if that looks more typical
- Clear download history (this does not always remove the actual files)
- Clear cached images, cookies, and form data if needed
- Downloads and documents:
- Review the Downloads folder for PDFs, images, or forms
- Move files to a safe place (encrypted drive or cloud) if you still need them
- Empty the Recycle Bin/Trash after deletion, if it is safe to do so
2.2 Programs and shortcuts
- Review recently opened:
- Documents and recent file lists in word processors or PDF readers
- Recent items in file explorer and “Quick Access” areas
- Pinned items on taskbars or docks
- Consider:
- Unpinning sensitive programs from taskbar/dock
- Removing shortcuts from the desktop
- Renaming generic folders without drawing attention
2.3 System privacy checks
- Check user accounts:
- Confirm who has administrator access
- Review guest accounts or shared accounts
- Look for remote‑access software (e.g., remote desktop tools) that you did not install
- Review sync settings:
- Browser sign‑in and sync across devices
- Cloud backup features that might copy files elsewhere
- Automatic sign‑in to shared devices
3. Account Cleanup
Options for tightening security on email, cloud, and other online accounts.
3.1 Passwords
- Identify high‑impact accounts:
- Email accounts used for password resets
- Banking, payroll, benefits, or shopping accounts
- Cloud storage, photo backups, and messaging accounts
- For each account, consider:
- Changing the password on a device only you can access
- Avoiding passwords that another person could guess easily
- Using different passwords for important accounts
- Check saved passwords:
- In browsers (Chrome, Safari, Edge, Firefox, etc.)
- In password managers
- On shared devices where you have allowed “remember this password”
3.2 Recovery options
- Check recovery email and phone numbers:
- Remove any recovery contact controlled by someone else
- Add a recovery method that only you can access
- Review security questions:
- Consider answers that are not easy for others to guess
- Use information that is not posted on social media
3.3 Login history and active sessions
- Many services show:
- Recent login locations
- Devices where you are currently signed in
- IP addresses or approximate cities
- Options:
- Sign out of all devices and sign back in only on devices you trust
- Revoke access for unknown apps or browser extensions
- Turn on sign‑in alerts for new logins, if safe
Be cautious with major account changes if another person closely monitors these accounts. Sudden logouts or password changes may be noticed.
4. Social Media Cleanup
Settings and content reviews for social platforms.
4.1 Profile and visibility
- Check profile details:
- Phone numbers, email addresses, and linked accounts
- Home, work, and school information
- Relationship status and family connections
- Review privacy settings for:
- Who can see past posts
- Who can find you by phone or email
- Who can send friend or follow requests
4.2 Posts, messages, and tags
- Posts:
- Scan recent posts for location details or plans
- Adjust audience (e.g., from “public” to “friends”)
- Use tools to bulk‑limit past posts if the platform offers this
- Messages:
- Review message requests or archived threads
- Consider deleting or archiving sensitive discussions
- Check if messages sync across multiple devices
- Tags and photos:
- Review tagged photos and untag if needed
- Adjust who can tag you or see tagged content
- Limit face‑recognition or similar features if available
4.3 Connections and blocking options
- Friend/follower list:
- Review for shared contacts who might share your information
- Use “restricted” or similar lists for people who see less from you
- Blocking and muting:
- Assess whether blocking could be noticed or escalate monitoring
- Consider muting or limiting interactions if that feels less visible
- Use “quiet mode” or activity‑status controls to appear less active online
5. Auto-Sync Removal
How to reduce unwanted automatic copying or sharing of your data.
5.1 Cloud backups and photo sync
- Identify which services are backing up:
- Photos and videos
- Contacts
- Messages and call logs
- Documents and notes
- For each service, consider:
- Turning off backup of specific folders (e.g., screenshots only)
- Turning off automatic upload from your camera roll
- Reviewing what is already stored and removing items you do not want there
5.2 Cross-device sync
- Check where accounts are signed in:
- Phones, tablets, work computers, shared home computers
- Smart TVs or streaming devices
- Game consoles and smart speakers
- Review what syncs automatically:
- Browser history and open tabs
- Passwords and autofill data
- Messaging or calling logs
- Options:
- Turn off sync entirely on shared devices
- Limit sync to only certain categories (e.g., bookmarks, not history)
- Remove your account from any shared device where you do not want visibility
5.3 App integrations
- In major accounts (email, social media, cloud), review:
- Third‑party apps that have access to your data
- What permissions each app has (read, write, full access)
- Whether any of these apps were set up by someone else
- Revoke access for:
- Apps you no longer use
- Services you do not recognize
- Devices you do not have anymore
6. Device Access Audit
A structured review of who can access your devices and accounts, and how.
6.1 Who has physical access
- List devices:
- Phones and tablets
- Laptops and desktops
- Shared or family computers
- Other: smart home devices, watches, cars with apps
- For each device, note:
- Who knows the PIN, pattern, or password
- Who uses the device regularly
- Where the device is usually stored (shared areas vs. private areas)
6.2 Screen locks and biometric access
- Review lock methods:
- PIN, password, or pattern
- Fingerprint or face recognition
- Smart‑unlock features (e.g., unlocks at home, when connected to certain devices)
- Options:
- Adjusting lock timers (shorter or longer)
- Removing biometric access for other people’s fingerprints or faces, if applicable
- Turning off smart‑unlock features that leave devices open around specific locations or devices
6.3 Account and app access
- Identify shared logins:
- Streaming services and smart TVs
- Shared email or social media accounts
- Shared cloud storage or photo libraries
- Check:
- Which apps on your phone are always signed in
- Whether notifications show full content on lock screens
- Which apps have “device admin” or similar elevated permissions
- Adjust as needed:
- Sign out of accounts on shared devices where privacy is a concern
- Change passwords after removing access, if safe
- Limit notification previews to basic info only
6.4 Logging and monitoring features
- Look for:
- “Family” or “parental control” apps with tracking features
- Work or school device‑management software
- Browser extensions that can read your activity
- Consider:
- What monitoring might be expected or required (e.g., work devices)
- Using a separate device for private tasks if possible
- Keeping sensitive activity off devices that others manage
For more structured digital safety planning, some people also explore trusted organizations and additional tools listed at DV.Support.