$5M Identity Theft Insurance ·Now included with Hush. Learn more

The Issue with B2C Data Removers

White Paper9 min readDec 10, 2025

The paper explains how the data broker industry makes personal data removal difficult and insecure, argues that most consumer data removal services worsen the problem by collecting and re-feeding personal data to brokers, and positions Hush's AI-driven approach as a safer, more effective alternative that avoids sharing PII altogether.

7 pages

Inside the report

What you'll learn

Recommended for privacy officers and advisors evaluating digital risk management solutions on behalf of clients.

01

Data removal is structurally difficult

Even with comprehensive privacy laws in 20 states and CCPA applied as industry standard for DSARs, removing personal information from data brokers remains surprisingly difficult by design.

02

The industry is riddled with conflicts of interest

The data broker ecosystem is characterized by redundancy, poor data quality, and systemic information security failures, creating an environment where removal requests are routinely undermined.

03

Consumer tools often worsen the exposure

Most B2C data removal services require submitting personal information to process requests, effectively feeding the same data they claim to remove back into the broker ecosystem.

04

Verified breaches illustrate systemic risk

Incidents like the National Public Data theft and the PeopleConnect breach highlight the security vulnerabilities endemic to the data broker industry and the risks of trusting it with your PII.

Key takeaways

  • 01

    Data removal is not as simple as submitting a request, the industry is designed to make removal difficult.

  • 02

    Many consumer removal services collect and redistribute the personal data they are hired to remove.

  • 03

    Sharing PII to remove PII compounds exposure rather than resolving it.

  • 04

    Effective data removal requires approaches that avoid submitting personal information to data brokers altogether.

Risk framework

Executive

Principal exposure surface

Risk vectors

Data brokers

Public records

Social exposure

Family vectors

Enterprise risk

Institutional impact

M&A, capital events, reputation