Dealing with Search Engines

Search engines like Google and Bing play a pivotal role in how information is discovered and shared online. They are the gateways through which vast amounts of data, including personal information, are accessed by users worldwide. For individuals in Switzerland, understanding the interaction with these search engines is crucial, not only to maintain an online presence but also to protect personal privacy.

Switzerland, renowned for its strong stance on privacy and individual rights, provides a unique landscape for managing online information. The country’s legal framework offers protections and avenues for individuals seeking to control how their personal data is handled by search engines. However, navigating this terrain requires a clear understanding of both your rights under Swiss law and the operational mechanisms of search engines.

As the internet continues to evolve, so do the challenges associated with keeping personal information private. Information that was once considered harmless or insignificant can have unforeseen consequences when accessible via a simple search query. This makes the management of online information a critical task for individuals concerned about their privacy and online reputation.

This section of the Swiss Online Information Removal Guide is dedicated to empowering you with the knowledge and tools necessary to effectively manage your digital footprint on search engines. Whether it’s identifying personal data that has been indexed, understanding how to request its removal, or knowing your legal rights in Switzerland, this guide aims to provide you with comprehensive, actionable information.

How Search Engines Index and Display Information

Search engines like Google, Bing, and others operate by crawling the internet to index web pages. This process involves using bots to systematically browse the web, collect information from websites, and store it in a database. When a user enters a query into a search engine, it sifts through this database to present the most relevant results. Here’s a simplified view of how this works:

  1. Crawling: Search engines use automated programs, known as crawlers or spiders, to visit web pages.
  2. Indexing: The content found by crawlers, including text, images, and video content, is analyzed and stored in a large database.
  3. Ranking: When a search query is entered, the search engine uses algorithms to rank the indexed information based on various factors like relevance, website authority, and user engagement.
  4. Displaying Results: The search engine displays the results in an ordered list, often with advertisements and other featured content.

This process is continuous and automated, meaning that new content can be indexed rapidly, and the availability of information can change frequently.

The Legal Framework in Switzerland Governing Search Engine Operations

In Switzerland, the operations of search engines are subject to various laws and regulations, particularly concerning data protection and privacy. The key legal frameworks include:

  1. Federal Act on Data Protection (FADP): The FADP governs the processing of personal data by private individuals and federal bodies. It ensures that personal data is processed lawfully, in good faith, and in a manner that is not excessively invasive to privacy.
  2. Revisions to the FADP: Switzerland is in the process of revising its data protection laws to align more closely with the EU’s General Data Protection Regulation (GDPR). This includes stronger rights for individuals regarding their personal data and stricter obligations for those processing it.
  3. Right to be Forgotten: Under Swiss law, individuals have a degree of “right to be forgotten,” which means they can request the deletion of personal data under certain conditions. This right is particularly relevant when dealing with search engines, as it can be used to request the removal of search results that link to personal information.
  4. Swiss Federal Supreme Court Rulings: There have been notable court rulings in Switzerland that impact how search engines operate in regard to personal data. For instance, courts have sometimes sided with individuals requesting the removal of search results under specific circumstances.
  5. International Laws and Agreements: As global entities, search engines operating in Switzerland must also navigate international laws and agreements, especially when Swiss data is processed or stored in other countries.

Understanding these aspects of how search engines work and the legal framework in Switzerland is crucial for anyone looking to manage their online presence. It provides the foundation for taking informed actions, whether it’s to enhance one’s digital footprint or to initiate the removal of personal information from search results.

Overview of Swiss Laws and Regulations Related to Online Privacy and Data Removal

Switzerland has established a robust legal framework to protect individual privacy and data, particularly in the digital realm. Understanding these laws is essential for effectively managing and asserting your rights regarding online information. The key legislations and regulations include:

  1. Federal Act on Data Protection (FADP): This act is the cornerstone of data protection in Switzerland. It sets out the principles for data processing, stipulating that personal data must be processed lawfully, in good faith, and proportionately. It also requires that personal data be accurate and, where necessary, kept up to date.
  2. Revisions to the FADP: The revised FADP, which aligns more closely with the EU’s GDPR, enhances the rights of individuals. This includes clearer consent requirements for data processing and stronger protections for sensitive personal data.
  3. Ordinance to the Federal Act on Data Protection (OFADP): The OFADP provides more detailed guidelines on implementing the FADP, including specifics on data processing and the rights of data subjects.
  4. Swiss Civil Code and Swiss Code of Obligations: These codes provide the basis for privacy protection in Switzerland, allowing individuals to take civil action against invasion of privacy or unauthorized data processing.

Specific Rights Individuals Have Regarding the Removal of Their Information from Search Engines

Under Swiss law, individuals have specific rights concerning the management and removal of their personal information from search engines:

  1. Right to Access: You have the right to request information from search engines about whether and how your personal data is being processed.
  2. Right to Rectification: If the information about you is incorrect or outdated, you can request its correction.
  3. Right to Erasure or ‘Right to be Forgotten’: Under certain conditions, you can demand the deletion of your personal data. This is especially pertinent if the data is no longer necessary for the purpose for which it was collected, or if the processing is based on your consent which you have withdrawn.
  4. Right to Object: You have the right to object to the processing of your personal data, particularly for marketing purposes or when the processing is based on a public interest or legitimate interest of the data processor.
  5. Legal Recourse: If a search engine refuses your request to remove information, you can file a complaint with the Federal Data Protection and Information Commissioner (FDPIC) or pursue legal action through Swiss courts.

Identifying Personal Information on Search Engines

  1. Define the Scope of Your Search:
    • Determine what type of personal information you want to find (e.g., name, address, phone number, email, photos).
    • Consider variations of your name and any pseudonyms you may have used.
  2. Choose the Right Search Engines:
    • Use multiple search engines for a comprehensive search (e.g., Google, Bing, Yahoo).
    • Consider using Swiss-specific search engines or services for more localized results.
  3. Utilize Advanced Search Techniques:
    • Employ quotation marks to search for exact phrases (e.g., “John Doe Zurich”).
    • Use minus (-) to exclude certain terms (e.g., John Doe -Facebook).
    • Try different combinations and permutations of your personal information.
  4. Check Image Search:
    • Use image search features to find personal photos or images.
    • Reverse image search can help identify where your images are being used online.
  5. Explore Social Media Platforms:
    • Search for your information on platforms like Facebook, Instagram, LinkedIn.
    • Remember to check platforms where you have inactive accounts.
  6. Search Data Broker Sites:
    • Identify and search through popular data broker websites that might hold your personal data.
    • Examples include Spokeo, Whitepages, and Pipl.
  7. Document Your Findings:
    • Keep a record of where and what information you find.
    • Note the URLs of pages containing your personal information.

Tools and Methods for Effective Searching

  1. Search Alerts:
    • Set up Google Alerts for your name and variations to monitor new mentions online.
  2. Privacy-Focused Search Engines:
    • Use engines like DuckDuckGo for privacy-focused searching.
  3. Browser Extensions:
    • Consider browser extensions that help anonymize your search or track personal data leaks.
  4. Professional Services:
    • If necessary, consider hiring a professional service specializing in online data tracking and removal.
  5. Regular Checks:
    • Make it a habit to periodically search for your personal information online.

Tools for Identifying Online Personal Information

In the digital age, effectively identifying and monitoring personal information on the internet is crucial for maintaining privacy and security. Several tools have been developed to assist in this process. Below is an overview of some of these tools, including fact detection tools, PimEyes, and others, that are particularly useful for identifying personal information online.

1. PimEyes:

  • Function: A facial recognition search engine.
  • How it Works: Upload a photo, and PimEyes scans the internet for faces matching the image.
  • Usefulness: Particularly effective for finding photos of yourself or someone else across various websites.
  • Limitations: Ethical concerns about privacy and consent should be considered.

2. Fact-Checking Tools:

  • Examples: Snopes, FactCheck.org, and PolitiFact.
  • Function: These tools are typically used for verifying news, but they can also be helpful in identifying false claims about individuals.
  • Application: Useful for debunking false personal information or rumors spread online.

3. Google Alerts:

  • Function: A content change detection and notification service.
  • How it Works: Set up alerts for your name or other personal information to receive notifications when new content appears online.
  • Usefulness: Keeps you informed about new mentions or appearances of your information on the web.

4. Data Broker Removal Tools:

  • Examples: DeleteMe, OneRep.
  • Function: These services specialize in removing personal information from data broker sites.
  • How it Works: They systematically request data removal on your behalf from various databases.
  • Benefit: Reduces the visibility of personal information on people search websites and databases.

5. Reverse Image Search Engines:

  • Examples: Google Images, TinEye.
  • Function: Search the internet using images instead of text.
  • How it Works: Upload an image to find where it appears online.
  • Usefulness: Helps in locating unauthorized use of personal images.

6. Social Media Monitoring Tools:

  • Examples: Brandwatch, Hootsuite.
  • Function: These tools monitor social media for mentions of your name or other personal identifiers.
  • Usefulness: Effective for keeping track of what is being said about you on social media platforms.

Requesting Removal of Information

Google:

  1. Removal Policy: Google allows the removal of sensitive, personally identifiable information from search results under certain conditions, such as cases of doxxing or financial fraud risks. They have expanded this policy to include personal contact information and information posing a risk for identity theft. More about Google’s policy.
  2. Evaluation of Requests: Google evaluates the content on the entire web page and the nature of the information, such as whether it’s part of a public record or useful in news articles. More about Google’s evaluation.
  3. Additional Help Page: For more detailed information and to request removal, visit Google’s help page.

Unfortunately, I wasn’t able to find specific contact details for Google support in Switzerland.

Bing:

  1. Reporting and Removal: Users can report concerns about URLs or information in Bing search results. Bing limits removal to specific circumstances and advises contacting the webmaster of the site where the content is published. Reporting to Bing.
  2. Content Control: Bing does not control website content. Removal from Bing search results does not mean removal from the internet. More about Bing’s approach.
  3. URL Removal Request: For URL removal requests, you can use this Bing URL removal request form.

Checking for Leaked Passwords

Passwords and login credentials are highly sensitive. With billions of passwords being stolen and leaked online, including on the Dark Web, it’s crucial to check if yours have been compromised. Major data breaches have impacted companies like Uber, Samsung, DoorDash, Twitter, and Verizon in the past year.

Action Steps:

  1. Use Password Leak Scanners: Start with Aura’s free leaked password scanner. It checks the Dark Web and other known sites for any exposed passwords associated with your email.
  2. Employ Additional Tools: Utilize other scanners like Identity Guard’s Dark Web scanner and HaveIBeenPwned.com to broaden your search scope, including checking your phone number.
  3. Secure Compromised Accounts: For any exposed passwords, immediately change them. Implement strong digital security practices, such as:
    • Creating unique passwords for each account.
    • Storing these passwords in a secure password manager.
    • Enabling two-factor authentication (2FA) via an authenticator app for added protection.

Additional Tools for Enhanced Security:

  • Bitwarden: An open-source password manager offering secure password storage.
  • Dashlane: Provides password management and digital identity protection.
  • 1Password: Offers secure password management and privacy tools.

Regularly updating your digital security practices is essential to safeguard your online presence

 

Utilizing Anti-Tracking Tools for Online Data Protection

Websites often track and share user data, mostly for advertising, but these capabilities can also be exploited by threat actors for scams and identity theft. It’s challenging to distinguish between legitimate tracking and malicious activities, making it essential to proactively prevent data collection.

Steps to Enhance Privacy:

  1. Manually Refuse Data Sharing: You can opt out of data sharing on websites, although this method is not foolproof, especially against malicious sites.
  2. Use Professional Anti-Tracking Software: Consider using comprehensive tools that offer anti-tracking capabilities, including browser extensions and VPNs. Aura, for instance, provides these features as part of its membership.

Additional Anti-Tracking Tools:

  • DuckDuckGo Privacy Essentials: A browser extension focused on blocking trackers and providing private searches.
  • Ghostery: Offers tracker blocking and a private search engine.
  • Privacy Badger: An extension that automatically learns to block invisible trackers.
  • NordVPN: A VPN service known for its strong privacy features.
  • ExpressVPN: Provides robust encryption and IP masking to enhance online anonymity.

By integrating these tools into your digital routine, you can significantly improve your online privacy and safeguard against data collection and tracking​