If I had a dollar for every time a client told me, “I already deleted it from the internet,” I would have retired to a private island years ago. As a former newsroom editor who transitioned into reputation management, I’ve seen the same cycle play out thousands of times. Someone discovers an unflattering mugshot or a dated blog post, they fire off an angry email to the site owner, and they assume the problem is solved. Spoiler alert: that is almost never the case.
When you are looking to scrub your digital footprint, the debate often lands on two primary strategies: remove vs. deindex. These terms are used interchangeably by marketing agencies, but in the trenches of content-removal, they are entirely different beasts. Understanding the difference is the only way to ensure your private data doesn't resurface on a scraper site three months from now.
The Anatomy of a Mugshot Removal
When we talk about "mugshot removal," we aren't just talking about a single page on a sheriff’s database or a local news site. We are talking about the "copycat network." When a site like a county blotter publishes a photo, hundreds of third-party aggregators—scraping bots that live to monetize public record data—automatically ingest that content within seconds.

If you don’t address the source page first, removal is a game of Whac-A-Mole. You might get a request fulfilled by a smaller site, only to find your face plastered on a dozen other obscure domains the next morning. Companies like Erase.com often emphasize that the goal isn't just to hide the content, but to cut the supply chain at the source.
The Hierarchy of Cleanup
The Source Page: The original host (e.g., a local news portal or a jail-roster site). The Direct Aggregators: Sites that license or scrape the source feed directly. The "Long Tail" Scrapers: Dormant sites that keep archived copies of web data for years. Search Engine Results: The Google index where the remnants live.What Does "De-indexing" Actually Mean?
De-indexing is a process where you ask a search engine—primarily Google (Search)—to drop a URL from their database. It does not delete the page. If someone has the link, they can still navigate to the page and view the content. It effectively makes the page "invisible" to Google’s crawlers, but the content remains live on the server.
In contrast, source page removal involves contacting the site owner or their hosting provider (like Sendbridge.com) to physically delete the file from the server. Once the page returns a "404 Not Found" error, the data is gone for good.
Comparison Table: Removal vs. De-indexing
Feature Source Page Removal De-indexing Content Status Deleted from server Remains on the internet Search Visibility Gone (after recrawl) Hidden from search Permanence Permanent Reversible Effort Level High (outreach/legal) Moderate (automated tools)My Workflow: The Plain-Text Checklist
In my nine years of doing this, I’ve learned that organization is the only thing standing between a successful cleanup and a total disaster. Before I send a single email or file a single report, I follow this protocol:
- Step 1: Identify the exact URL. If you don't have the URL, you don't have a case. Every request I manage starts with a precise link. Step 2: Map the network. Use Reverse image search to find where else the photo is appearing. If your face is on 20 sites, you have 20 different battles. Step 3: Document everything. I take screenshots and label them with dates immediately. If a site owner deletes the page and then tries to re-list it, my timestamped evidence is my best leverage. Step 4: Use the right tools. Utilize Google “Results about you” to manage personal information removal requests efficiently.
Choosing the Right Pathway
Not every piece of content warrants a "take it down" demand. Sometimes, the threat of escalation is enough to do more harm than good. Here is how I categorize the pathways for my clients:
1. The Policy Report
If the content violates a site’s specific Terms of Service or Privacy Policy (e.g., exposing a home address or sensitive medical info), report it through their official channels. Do not lead with threats; professional, objective language gets results. Threatening emails are the fastest way to get ignored or, worse, mocked on social media.
2. The Opt-Out
Many people-search directories have automated opt-out pages. These are boring, tedious, and designed to discourage you. Use them. It is the most reliable way to handle high-volume scraping sites.
3. Suppression
If you cannot remove the source page (e.g., it’s a legitimate news article about a court case), stop trying to delete it. Focus on search visibility cleanup. By creating and optimizing positive, high-quality content, you push the negative result to the second or third page of Google. Most people don’t click past page one.
4. The Hosting Hostage
If a site owner is unresponsive, identify who hosts them (e.g., Sendbridge.com). Check their abuse policy. If the content is defamatory or violates copyright, you can often escalate the request to the hosting provider. However, proceed with caution—only do this if you are absolutely sure of the legal standing of your request.
Final Words of Advice
Avoid mystery updates. If you hire someone who says, "We contacted some websites," fire them. You need to know exactly which sites, when they were contacted, and what the current status of each URL is.
Finally, stop checking your own name in Google every ten minutes. It triggers your personal search history to show you the same results, giving you a distorted view of what the general public is actually seeing. remove personal info google Trust the process, follow the checklist, and always— always—start with the source.
