Your Privacy Action Plan

Prioritized, Practical, Doable

This chapter organizes everything in the book into a prioritized action plan. Start with the quick wins, work through the essentials, and tackle the advanced steps as time allows.

You don't need to do everything. Even completing just the "Today" section puts you ahead of 90% of internet users.

Today (30 Minutes)

These actions have the highest impact-to-effort ratio.

1. Check HaveIBeenPwned.com. Enter your email addresses. See which breaches include your data. Change passwords for any compromised accounts immediately.

2. Install a password manager. Download Bitwarden or 1Password. Create a strong master password. Save your current most-important passwords (email, banking).

3. Enable 2FA on your email. Your email is the skeleton key to everything. Enable two-factor authentication using an authenticator app (not SMS if possible).

4. Freeze your credit. Visit the three bureau websites (Chapter 9). Freeze your credit at all three. Save the PINs in your password manager.

This Week (2–3 Hours Total)

5. Enable 2FA everywhere important. Banking, social media, cloud storage, shopping accounts with saved payment info.

6. Migrate passwords to your manager. As you log into sites this week, save each one to your password manager. Replace reused passwords with unique generated ones. Prioritize financial and email accounts.

7. Audit your phone permissions. Review location, camera, microphone, and contacts permissions for every app. Revoke unnecessary access. Delete apps you don't use.

8. Install uBlock Origin. Add it to your browser. It blocks ads and trackers automatically.

9. Switch your default search engine. Set DuckDuckGo or Startpage as your default in your browser settings.

This Month (1–2 Hours Per Week)

10. Google yourself. Search your name, phone number, and email. Note what's publicly visible.

11. Submit data broker removal requests. Check the major data brokers (Chapter 2) and request removal. Or sign up for DeleteMe/Optery if you prefer to automate it.

12. Lock down social media. Go through each platform's privacy settings (Chapter 6). Tighten everything. Review old posts and remove anything you wouldn't share today.

13. Secure your router. Change the default admin password. Update firmware. Enable WPA3. Set up a guest network for smart devices.

14. Review financial accounts. Enable transaction alerts. Verify contact information. Close unused accounts. Switch to credit cards for online purchases.

15. Set up credit monitoring. AnnualCreditReport.com for free reports. Credit Karma or your bank's free monitoring for ongoing alerts.

Ongoing (Monthly Maintenance)

Review and update passwords for any accounts flagged in new breaches.

Check your credit report at least quarterly.

Audit app permissions when updating your phone.

Review data broker listings (they re-list you periodically).

Update router firmware quarterly.

Clear browser data and review extensions monthly.

Check social media privacy settings after platform updates (they often reset).

AI Prompt: Personalized Privacy Plan

Create a personalized privacy action plan for me.

My current privacy level: [haven't done anything / some basics / moderately protected / advanced]
Completed actions: [list anything you've already done from this book]
My biggest concerns: [identity theft / surveillance / data brokers / scams / all of the above]
Time I can dedicate: [hours per week]
Technical comfort level: [beginner / comfortable / advanced]
Devices: [list your devices — phone, computer, smart home]
Budget for privacy tools: [free only / up to $X/month]

Please create:
1. A prioritized action plan specific to my situation
2. This week's top 5 actions
3. This month's goals
4. A monthly maintenance checklist
5. Tools and services to use (within my budget)
6. What I can safely skip given my risk profile

The Privacy Mindset

Think Before You Share

Before posting, signing up, granting permission, or entering information, pause and ask: who gets this data? Do they need it? What could they do with it? Am I comfortable with that?

Assume Breach

Assume that any data you provide to a company will eventually be breached. This isn't paranoia — it's statistics. Act accordingly: don't provide information unnecessarily, use unique passwords so one breach doesn't cascade, freeze your credit so stolen data can't be used to open accounts, and monitor your accounts for unauthorized activity.

Privacy Is a Practice

Like fitness or healthy eating, privacy isn't something you achieve once and forget. It's an ongoing practice of making slightly better decisions, staying informed about new threats, and maintaining the systems you've set up.

The landscape changes. New threats emerge. Platforms change settings. Laws evolve. Stay engaged, even if it's just 30 minutes per month reviewing your setup.

Perfect Privacy Doesn't Exist

You can't be completely private while participating in modern society. The goal isn't perfection — it's making informed trade-offs. You might choose to use Instagram despite its data practices because the social value is worth it to you. That's fine — as long as it's a conscious choice with locked-down settings, not a default you never examined.

You've Already Won

If you've read this book and taken even a few of the actions described, you're dramatically better protected than the average person. Most people use the same password everywhere, never check their credit, click links without thinking, and have no idea who has their data.

You do know. And knowing is the first step to control.