What Personal Information Is Worth Protecting?
Not all personal information carries the same risk if it falls into the wrong hands. Understanding what is most valuable to bad actors helps you prioritize what to protect most carefully.
Highest risk: Social Security number, bank account and routing numbers, credit card numbers, passwords, driver's license number, passport number, date of birth combined with full name, and photos that could be used for sextortion.
Moderate risk: Home address, workplace and schedule information, phone number, email address, family member names, and details about your daily routine.
Lower risk but still worth being thoughtful about: General location, employer name, general lifestyle and interest information that could be used for targeted manipulation.
The FTC estimates that identity theft costs Americans billions of dollars per year. Much of it begins not with technical hacking but with simple social manipulation — someone convincing a target to willingly share information they should have protected.
The Verification-Before-Sharing Rule
A useful framework: your level of identity verification before sharing personal information should scale with the sensitivity of the information being shared.
Before sharing your phone number: At minimum, confirm the person's photos are authentic (reverse image search) and that they have some verifiable digital presence. This is a low bar for a common early exchange.
Before sharing your address: You should have completed a full verification — photos checked, username searched across platforms, at least one live video call completed. Your address combined with your name and daily routine gives someone the tools to stalk, harm, or defraud you.
Before sharing financial information: You should have an established, verified, in-person relationship. There is almost no legitimate reason for an online-only acquaintance to need your financial account details. Romantic interest does not create a legitimate need for your bank information.
Before sharing intimate photos or video: This requires the highest level of established trust and should only happen when you are genuinely confident about who you are sharing with. Once shared, you lose control over that content permanently.
How to Verify Before Sharing
The verification process described throughout this guide applies here directly. The key steps:
Reverse image search their photos to confirm they are not using a stolen identity. This is always the first step because it can immediately reveal a fundamental deception.
Search their username or email across platforms using a tool like Deep Checker Pro. A genuine person has digital history. A fresh scam account does not. The age, breadth, and consistency of their online presence is informative.
Request a live video call before sharing any information above the phone number threshold. A video call with real-time interaction confirms you are dealing with a real, accessible person who looks like their photos.
Verify their claimed professional identity through independent channels if they are making professional claims that will influence your level of trust.
Recognizing Pressure Tactics
Bad actors who want your personal information frequently use specific pressure tactics to overcome your hesitation. Recognizing these helps you stand firm:
Urgency: "I need this information right now." "If you do not send this tonight, the opportunity will be gone." Real relationships and legitimate requests can wait for you to feel comfortable.
Emotional leverage: "If you trusted me you would share this." "I thought we were closer than this." Trust is earned through consistent honest behavior over time, not granted in exchange for emotional demands.
Reciprocal disclosure: "I shared something personal with you — now you should share with me." Genuine mutual disclosure happens organically; pressured reciprocity is a manipulation tactic.
Minimization: "It is just your address, it is not sensitive." If they are framing your caution as excessive, consider why they care so much about overcoming it.
What to Do If You Already Shared Too Much
If you have already shared sensitive information with someone you now suspect of bad faith, act quickly:
For financial information: contact your bank immediately to report potential fraud and discuss monitoring or account changes. Place a fraud alert on your credit report through any of the three major bureaus (Equifax, Experian, TransUnion) — it is free and triggers additional identity checks on new credit applications.
For your address or location: update your home security, vary your routines, and consider telling neighbors to watch for strangers. If you have genuine safety concerns, contact local law enforcement.
For intimate photos or video: document who received the content and when. If extortion follows, do not pay — paying rarely stops the demands. Contact the FBI (ic3.gov), the NCMEC CyberTipline, and if you are a minor, contact law enforcement immediately. The Cyber Civil Rights Initiative (cybercivilrights.org) provides resources for non-consensual intimate image victims.
Frequently Asked Questions
Is it okay to share my email address with someone I met online?
They sent me money first — does that make them trustworthy?
How do I tell someone I need to verify them before sharing personal information?
Ready to search?
Try Deep Checker Pro free — scan 100+ platforms with no credit card required.
Get Started Free