Guide | How To Remove Personal metadata from Files to Protect Your Privacy

The associated guide may contain user-generated or external content.

Kate_L

in memoriam
Thread author
Verified
Top Poster
Well-known
Jun 21, 2014
1,044
Remove Personal metadata from Files to Protect Your Privacy

Metadata within a file can tell a lot about you. Cameras record data about when a picture was taken and what camera was used. Microsoft Office automatically adds author and company information to documents and spreadsheets. With user-created tags, you can add personal and business details that might be useful on a local copy but are unwise to disclose to the wider world.

To scrub a file of unwanted metadata in Windows:
  • Select one or more files in Windows Explorer.
  • Right-click and then click Properties.
  • Go to the Details tab and click Remove Properties and Personal Information.

This opens the Remove Properties dialog box. You now have two choices. The default option creates a copy of your file (using the original file name with the word Copy appended to it) and removes all properties it can change, based on the file type. The second option, Remove The Following Properties From This File, allows you to select the check boxes next to individual properties and permanently remove those properties from the file when you click OK. (If no check box is visible, the property is not editable.)

Of course, common sense should prevail when it comes to issues of privacy. This option zeroes out metadata, but it does nothing with the contents of the file itself. You’ll need to be vigilant to ensure that digital photos and other documents don’t contain potentially sensitive data.
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
TECHNET.MICROSOFT.COM - Remove Personal metadata from Files to Protect Your Privacy

SUPPORT.OFFICE.COM - Remove hidden data and personal information by inspecting documents

Thanks for sharing. Remember to add a Source when posting Tutorials, when copied from the web. I have posted an additional link for Office documents (above).

Examples of Metadata:

Here are some high-profile examples where someone sending an electronic document to someone else forgot that hidden metadata exists (SOURCE).

October 2000: The Wall Street Journal reports that a candidate running for the U.S. Senate began receiving anonymous emails containing messages written in MS Word criticizing and attacking the candidate. A savvy aide looked at the document properties and discovered they were authored by the chief-of-staff of the opposing party.

February 2003: A dossier on Iraq's security and intelligence organizations, cited by Colin Powell and published by 10 Downing Street, is discovered to have been plagiarized from a U.S. researcher on Iraq. Since the dossier was published on their website in MS Word format, researchers also discovered the four people in the British government who edited the document. They were subsequently called to Parliament for a hearing.

March 2004: SCO Group , seller of UNIX and Linux, sent out a warning letter to 1,500 of the world's largest companies threatening legal liability for using Linux if they failed to obtain a license from the Utah-based company. After filing suit against Daimler-Chrysler, metadata in a MS Word version of the suit revealed that the SCO's attorneys had spent a good deal of time aiming the suit at Bank of America instead.

May 2005: Derrick Max, the head of two supposedly independent, nonpartisan groups who support overhauling Social Security, e-mailed his testimony on Social Security to the Senate but forgot to turn off "track changes". Turns out the associate commission of the Social Security Administration, who was on loan, working out of the White House, edited Max's "independent" testimony.

October 2005: United Nations issued report on Syria's suspected involvement in the assassination of Lebanon's former prime minister, Rafik Hariri. Recipients of a version of the report were able to track the editing changes, which included the deletion of names of officials allegedly involved in the plot, including the Syrian president's brother and brother-in-law

December 2005: President Bush delivers speech at the U.S. Naval Academy outlining a new "National Strategy for Victory in Iraq", which was posted on the White House website. The New York Times, using Adobe System's Acrobat software that shows the document was created by "feaver-p" reveals that the speech was largely written by a Duke University political scientist, Peter D. Feaver.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top