Blog

8 Steps To Help Mediate, Delete, Redact, or Bury Unwanted Online Posts 

September 26, 2023

In today’s onlife world where technology is ubiquitous, a teen’s online presence holds considerable sway in shaping their reputation, both in the online and offline world. Regrettably, teens can sometimes share content online that might seem amusing today but can have lasting repercussions on their personal and professional lives in the future. This includes embarrassing photos, negative comments, or outdated social media posts. A part of digital literacy education is to impart the knowledge of how to effectively mediate, and if necessary, delete, redact, or bury such undesirable content, if possible, from the public eye. 

While some may assert that the internet never forgets and has an indelible memory, it’s important to convey to teens that this isn’t an absolute truth. Presently, there exist strategies that can be employed to often help redact these problematic posts, gradually fade them from public view, or make them difficult to locate by others.

Yes – sometimes postings can’t be deleted, however, many times they can. The phrase “the internet never forgets” implies that any online action, regardless of its context or relevance, will leave an everlasting impact on an individual’s reputation especially when it comes to post-secondary and employment opportunities, which is not necessarily true. This can lead to unwarranted anxiety and fear among users who may feel they are forever burdened by their past online activities. 

However, with the rapid evolution of technology and data management practices, the philosophy of the internet never forgets, in our opinion, has become increasingly misleading in today’s onlife world for several reasons:

1/ With the rise of ephemeral content on various platforms, users have more control over the lifespan of the content they create, making the internet less permanent than before. Yes – this content could be copied and shared

2/ The internet is no longer a static repository of information; instead, it has become a dynamic landscape where content is constantly updated, modified, or replaced. Websites are frequently revised to reflect the most current information, and outdated content may be removed to ensure relevance and accuracy. In this context, the internet can be seen as a living organism that evolves over time, making the concept of perpetual memory obsolete.

3/ While the internet once lacked robust data management practices, today, many organizations and platforms are starting to create stringent data retention policies. These policies are designed to comply with privacy regulations and user demands for greater control over their data. Users can now request the deletion of their data from servers, ensuring that personal information does not linger indefinitely online.

4/ The concept of the “right to be forgotten” has gained traction globally, granting individuals the right to request the removal of outdated or irrelevant information about themselves from search engines and websites. This legal framework recognizes the need for individuals to move on from past events and not be perpetually burdened by historical online records. Consequently, the internet is becoming more respectful of people’s privacy and their desire to control their digital footprints

5/ Advancements in data erasure techniques have significantly contributed to rendering the statement misleading. As technology progresses, data can be permanently deleted from digital storage, ensuring that sensitive or undesirable information does not persist on the internet indefinitely.

6/ Web crawlers used by search engines might not index or archive all web pages, resulting in some content not being retained by the internet. This omission of information challenges the notion of a perpetually all-encompassing web memory.

In this article, we aim to provide guidance on the steps that we have found successful in either deleting or burying problematic teen content. However, it should be recognized that nothing is guaranteed in today’s onlife world.

Before following the steps below, it’s crucial to assess the content you want to remove or bury. Once reviewed, determine whether it violates a platform’s terms of service, infringes on your privacy, or poses a threat to your reputation. Here are some common types of unwanted online entries that teens and their families have brought to our attention:

  • Embarrassing photos or posts.
  • Negative comments or online harassment.
  • False or misleading information about the teen.
  • Outdated or irrelevant social media profiles

Step #1:

Delete It – If the unwanted content is on a social media platform, website, or forum that a teen controls, the first step is to delete it if they posted it, and if not, reach out to the source who did post it. Politely ask them to remove or edit the content in question, explaining your reasons for the request. Be respectful and concise in your communication, as a hostile approach may lead to the opposite result.

Step #2: 

Report Inappropriate Content – On many social media platforms, teens can report content that violates community guidelines or terms of service. Use the reporting feature to notify platform administrators about any inappropriate or harmful content. Be prepared to provide specific details, screenshots, and other evidence to support your case. However, don’t be surprised if the social media account responds back and advises that the content being requested to be removed does not violate their terms of service. Also be aware that this process can take weeks before content is taken down. We have provided a link from our friends at the Cyberbullying Research Center that provides links to many of the most popular social media platforms where you can report violations to their platform (1)

Step #3:

Request Removal from Search Engines – Search engines like Google can index and display information about you. If unwanted entries appear in search results, request their removal. Google, for instance, has a “Remove Content” tool for those under the age of 18yrs that allows you to request the removal of personal information (2). Keep in mind that search engines may not always honor removal requests, especially for legally posted content.

NOTE: you need to also request the removal of the content wanting to be deleted from the site where Google first indexed the posting. If not, Google may reindex the information/posting which will once again make it searchable.

Step #4:

Request a Digital Media Copyright Act (DMCA) Takedown (3) – if a picture or video that you produced is copied and posted online without your consent, consider initiating a DMCA takedown on the site where the picture or video appears.  Most websites have a DMCA takedown process that will explain how to initiate a DMCA takedown.

Step #5 

Bury Unwanted Entries – If removing the content proves challenging, you can work on burying it in search results thus driving it down into the internet cache making it harder to find – remember, most people only search the first three pages of Google. This involves creating and promoting positive content that pushes unwanted entries further down the search engine rankings. Here are some strategies:

  • Build a personal website or blog: Create a website or blog with your name as the domain and regularly publish positive and relevant content about your interests, achievements, and hobbies. A free way to do this is by using Google Sites (4)
  • Use social media strategically: Actively engage on social media platforms and share content that reflects your interests and values. Make sure to use your real name. Also chose social media platforms that we know Google indexes such as Instagram, Linkedin, and YouTube. The more frequently Google indexes a site, the more likely it will show up on the first or second page of Google.
  • Guest posting and content creation: Write articles or create content for reputable websites, blogs, or online communities that Google indexes such as Blogger, that are relevant to your interests or field of expertise.
  • Collaborate with others: Work with friends, mentors, or colleagues to co-create content or projects that feature your name prominently.

Step #6:

Sign up for a Google Account – Once you sign up for a Google account, copy and paste your website link, and your social media links in the “about me” section of your Google account.  By doing this, it expedites Google to index those sites in their search results.

Step #7 

Adjust Privacy Settings – To maintain better control over your online presence, regularly review and update your privacy settings on social media platforms (5). Adjust your settings to limit who can see your posts, tag you in photos, or send you messages. Remember that even with strict privacy settings, some content may still be visible to a limited audience who could screen capture and post such content publicly.

Step #8:

Monitor your digital reputation – Create a Google Alerts page (6) – place your name in the Google Alerts search block using quotation marks – “John Doe”.  By creating a Google Alert, if anyone posts anything online and tags it with your name, Google Alerts will often pick up on it and send you an alert to your Gmail account that will provide you with a link to where the posting is located. 

In today’s onlife world where technology is ubiquitous, a teenager’s online presence can wield significant influence, shaping both their virtual and real-world reputation. Regrettably, teens may occasionally share content online that, while amusing in the present, can have lasting consequences as they mature digitally. These consequences may flow into their personal and professional lives down the road. 

Whether it’s an embarrassing photograph, a negative comment, or an outdated social media post, learning how to manage, and if necessary, delete or bury such postings is an important digital literacy skill. While the notion that the internet never forgets has been widely circulated, it’s not entirely accurate – such a narrative has the potential to further instill anxiety in teens who might begin to believe that rectifying past mistakes is beyond their control. Such a perception alone can act as a catalyst, leading to additional emotional, psychological, physical, and social distress. As mentioned in this article, there are strategies available today that can help mitigate a less-than-desirable posting, cause such posts to fade over time, or make such a posting a challenge for others to discover.

Managing online reputation is an ongoing process. While it is essential to learn how to remove or bury unwanted entries, it’s equally important to maintain a positive online presence that accurately reflects who you are in the first instance when posting online. Remember, the internet is a powerful tool for self-expression and personal growth, and with the right strategies, you can take control of your online image and protect your reputation.

Digital Food For Thought

The White Hatter

References:

1/ https://cyberbullying.org/report?platform=hootsuite

2/ https://support.google.com/websearch/troubleshooter/9685456#ts=2889054%2C2889099

3/ https://www.termsfeed.com/blog/dmca/

4/ https://support.google.com/sites/answer/6372878?hl=en

5/ https://thewhitehatter.ca/digital-privacy-guide/

6/ https://support.google.com/websearch/answer/4815696?hl=en

Related Resource:

https://ln5.sync.com/dl/d501b6eb0/view/doc/11052102520005#jb2gyj5r-9p8yyu4d-vkd5j56s-n7bvc5ky

Support The White Hatter Resources

Free resources we provide are supported by you the community!

Lastest on YouTube
Latest Podcast Episode
Latest Blog Post
The White Hatter Presentations & Workshops

Ask Us Anything. Anytime.

Looking to book a program?

Questions, comments, concerns, send us an email! Or we are available on Messenger for Facebook and Instagram

Your subscription could not be saved. Please try again.
Your subscription has been successful.

The White Hatter Newsletter

Subscribe to our newsletter and stay updated.

We use Sendinblue as our marketing platform. By Clicking below to submit this form, you acknowledge that the information you provided will be transferred to Sendinblue for processing in accordance with their terms of use