Back to Blog
privacysecuritypersonal dataonline safety

What Information Should You Never Share Online?

A comprehensive guide to the personal information you should protect online. Learn what data criminals want and how to keep it private.

By RedactID Team6 min read

In our connected world, sharing information online is constant. Social media, job applications, online shopping, account signups - every interaction asks for data. But some information should never be shared casually, and knowing the difference can protect you from identity theft, fraud, and worse.

Here's what you should guard most carefully.

The "Never Share Publicly" List

1. Social Security Number (SSN) / National ID Numbers

Your SSN is the master key to your identity in the US. Equivalent numbers exist in other countries (National Insurance Number in the UK, SIN in Canada, etc.).

Why it's dangerous:
  • Opens credit cards and loans in your name
  • Files fraudulent tax returns
  • Enables complete identity takeover
  • Extremely difficult to change if compromised
When it's legitimately needed:
  • Employment (for tax purposes)
  • Credit applications
  • Government services
  • Tax filing
Never share: Via email, social media, unsecured forms, or to anyone who can't prove they legitimately need it.

2. Full Date of Birth

Your complete DOB (day, month, year) is a key identifier used by financial institutions and government agencies.

Why it's dangerous:
  • Combined with name, used to verify identity
  • Security question answer at many institutions
  • Part of the identity theft toolkit
Safer alternatives:
  • Share year only when age verification is needed
  • Use month/year for less sensitive verifications
  • Question why full DOB is required

3. Home Address

Your physical address reveals where you live, sleep, and keep your belongings.

Why it's dangerous:
  • Enables physical stalking
  • Used for identity verification
  • Package theft and mail fraud
  • Combined with other data, enables account takeovers
Safer alternatives:
  • Use PO Box for online shopping when possible
  • Be cautious about sharing on social media
  • Use work address or alternative when appropriate

4. Financial Account Numbers

Bank account numbers, credit card numbers, and investment account numbers give direct access to your money.

Why it's dangerous:
  • Enables direct theft
  • Facilitates fraudulent transactions
  • Can be used to verify identity at financial institutions
When sharing bank statements:
  • Show only last 4 digits of account numbers
  • Redact routing numbers
  • Keep transaction details minimal

5. Passport and Driver's License Numbers

These government-issued ID numbers are gold for identity thieves.

Why it's dangerous:
  • Creates fraudulent identity documents
  • Used for identity verification
  • Can be sold on dark web markets
When sharing ID documents:
  • Redact the ID number when not specifically required
  • Ask if photo + name is sufficient
  • Never post ID photos on social media

6. Medical Information

Health data is deeply personal and increasingly valuable to criminals.

Why it's dangerous:
  • Medical identity theft (someone gets treatment using your insurance)
  • Blackmail potential for sensitive conditions
  • Insurance fraud
  • Employment discrimination
Protect it by:
  • Limiting social media health discussions
  • Questioning medical form requirements
  • Redacting records when sharing

7. Biometric Data

Fingerprints, facial recognition data, and other biometrics can't be changed if compromised.

Why it's dangerous:
  • Permanent - you can't get new fingerprints
  • Increasingly used for authentication
  • Enables sophisticated fraud
Be cautious about:
  • Apps requesting facial recognition
  • Fingerprint sharing for non-essential services
  • High-resolution photos that capture iris patterns

8. Passwords and Security Answers

This seems obvious, but people still share these.

Why it's dangerous:
  • Direct account access
  • Security questions are often reused
  • "What's your mother's maiden name" is public on social media
Best practices:
  • Never share passwords, even with "tech support"
  • Use password managers
  • Make security answers random (not real answers)

The "Think Twice" List

These are less critical but still worth protecting:

Email Address

  • Primary email should be guarded
  • Use aliases for signups
  • Separate personal/financial/junk email accounts

Phone Number

  • Enables SIM swap attacks
  • Used for account recovery
  • Consider Google Voice or similar for signups

Employment Details

  • Job title, employer, salary
  • Useful for spear phishing
  • Don't overshare on LinkedIn for strangers

Family Information

  • Children's names, schools
  • Spouse details
  • Pet names (common passwords!)

Travel Plans

  • "We're in Hawaii for two weeks!" = "Our house is empty!"
  • Share after, not during

How Criminals Use Your Information

Understanding the threat helps you protect yourself:

Identity Theft

Combining your name, DOB, SSN, and address to become you - opening accounts, filing taxes, taking loans.

Account Takeover

Using your personal details to pass security questions and reset passwords on existing accounts.

Spear Phishing

Crafting convincing emails using your personal details: "Hi [Name], regarding your account at [Bank]..."

Social Engineering

Calling your bank, employer, or family pretending to be you or someone helping you.

Physical Crimes

Using your address and travel schedule for burglary, stalking, or harassment.

Practical Protection Steps

1. Audit Your Digital Footprint

Search your own name and see what's publicly available. You might be surprised.

2. Lock Down Social Media

  • Review privacy settings quarterly
  • Limit public profile information
  • Be selective about friend/connection requests

3. Redact Before Sharing Documents

When you must share IDs or financial documents:

  • Remove unnecessary information
  • Use proper redaction tools
  • Verify the redaction worked

4. Question Every Request

When asked for personal information:

  • Why do you need this?
  • Is this the minimum necessary?
  • How will it be stored and protected?
  • When will it be deleted?

5. Use Privacy Tools

  • Password managers
  • VPNs for public WiFi
  • Email aliases
  • Virtual credit card numbers
  • Local-processing document tools

The Convenience vs. Privacy Tradeoff

Many services ask for more data than they need because:

  • It's convenient for them
  • They might monetize it later
  • It's how they've always done it

You have the right to push back. Ask for alternatives. Provide minimums. Redact what isn't needed.

Conclusion

In the digital age, personal information is currency - and criminals are always looking for an easy score. The information you protect today prevents the identity theft, fraud, and harassment of tomorrow.

Not every piece of information needs Fort Knox protection. But knowing what's truly sensitive and guarding it accordingly is one of the most valuable habits you can develop.

Share thoughtfully. Redact liberally. Stay safe.

---

RedactID helps you share documents while protecting sensitive information. 100% private - everything processes on your device.

Ready to Protect Your Privacy?

RedactID lets you redact sensitive information from documents 100% privately - everything is processed on your device, nothing is uploaded.

Try RedactID Free