← Back to all posts

How to Remove Inappropriate Images of Yourself Online: A Self-Help Guide

January 28, 2025 • Second Dawn Team

Taking back control of your digital identity, whether on your own, or with SecondDawn


If you've discovered that intimate or inappropriate images of yourself have been shared online without your consent, know this: you are not alone, and you have options. What happened to you is a violation of your privacy and trust. It says nothing about you as a person.

Non-consensual intimate image (NCII) abuse affects millions of people worldwide. According to research from the UK Revenge Porn Helpline, reported incidents have grown from 521 cases in 2015 to over 22,264 in 2024, a more than fortyfold increase. Studies indicate that approximately 1 in 4 young adults (28.5%) have experienced some form of NCII victimization. Yet despite these staggering numbers, many people don't know that effective removal tools exist and that the law increasingly sides with victims.

This guide walks you through the practical steps to remove unwanted images from the internet, reclaim your privacy, and move forward with confidence.


Step 1: Immediate Actions: Document Everything First

Before you begin the removal process, take a deep breath. Then, counterintuitive as it may feel, you need to preserve evidence before anything disappears.

Create a Secure Evidence Folder

Save all evidence to a password-protected folder on your device or a secure cloud storage service that only you can access. For each piece of content you find, document:

  • The full URL (web address) of the page
  • Screenshots showing the content and the URL bar
  • The date and time you discovered it
  • The username or account name of anyone who posted it

Why Documentation Matters

Evidence preservation serves multiple purposes:

  • It supports platform removal requests by proving the content existed
  • It provides crucial documentation if you later decide to involve law enforcement
  • It helps you track which requests you've submitted and to whom

Important: If you're dealing with images of yourself as a minor, the content may constitute child sexual abuse material (CSAM), which is illegal regardless of who shares it. In this case, use Take It Down, a free service specifically for removing nude or sexually explicit images taken when you were under 18.


Step 2: Platform-Specific Removal Requests

Most major platforms have dedicated processes for removing non-consensual intimate content. Here's how to navigate them:

Google Search

Google doesn't host images but indexes them from across the web. Removing content from Google Search results significantly reduces its visibility.

For intimate images shared without consent:

  1. Visit Google's personal content removal request page
  2. Select "Involuntary fake pornography or intimate personal images" from the options
  3. Provide the URLs of the specific search results or images, along with screenshots showing the content
  4. Google typically responds within days to weeks

What Google removes:

  • Search results showing nude or sexually explicit imagery distributed without your consent
  • AI-generated or manipulated intimate imagery (deepfakes)
  • Content that associates your name with sexual material without reason

Meta (Facebook & Instagram)

Both platforms prohibit non-consensual intimate imagery and have streamlined reporting processes.

To report on Facebook:

  1. Navigate to the image or video you want reported
  2. Click the three dots in the upper right corner and select "Report"
  3. Follow the prompts to specify it's non-consensual intimate content
  4. You can also access reporting through Facebook's Help Center

To report on Instagram:

  1. Tap the three dots above the post
  2. Select "Report"
  3. Choose "Nudity or sexual activity" and then "Involves me or someone I know"
  4. Follow the remaining prompts

TikTok

TikTok prohibits NCII and responds to reports through their in-app reporting system:

  1. Long-press on the video
  2. Tap "Report"
  3. Select the appropriate category related to nudity or sexual content

X (Twitter)

X has a dedicated process for intimate media:

  1. Go to help.twitter.com
  2. Search for "non-consensual nudity"
  3. Complete their reporting form with the specific tweet URLs

Reddit

Use Reddit's report function on the specific post or comment. Reddit also participates in StopNCII.org, meaning hashes you submit there will also be checked against Reddit content.


Other Image Hosting Sites

Many smaller platforms have reporting mechanisms:

  • Look for "Report" or "Flag" buttons
  • Check the site's Terms of Service page for abuse reporting
  • Find contact information for their abuse or trust and safety team

Step 3: StopNCII.org: Proactive Protection Across Platforms

StopNCII.org is a free tool that represents one of the most powerful innovations in combating image-based abuse. Operated by the UK Revenge Porn Helpline, it allows you to protect your images across multiple platforms simultaneously without ever uploading the actual image.

How It Works

  1. The tool generates a unique "hash," essentially a digital fingerprint, of your intimate image directly on your device
  2. This hash (not your actual image) is shared with partner platforms including Meta (Facebook/Instagram), Google, Microsoft (Bing), TikTok, Reddit, Bumble, and others
  3. If anyone tries to upload an image matching that hash to a participating platform, it will be automatically blocked or removed

To Use StopNCII.org

  1. Visit stopncii.org and click "Create Your Case"
  2. Select the intimate images from your device that you want to protect
  3. The system generates a hash locally. Your images never leave your device
  4. You'll receive a case number and PIN to track your case status

Key Details

  • StopNCII.org is for adults (18+) only
  • For images of minors, use takeitdown.ncmec.org
  • The Revenge Porn Helpline reports a 90% success rate in removing content, having removed over 300,000 individual images since 2015

Step 4: Legal Tools

When platform requests aren't enough, legal mechanisms provide additional leverage.

DMCA Takedown Notices

If you took the photos or videos yourself, you likely own the copyright. Under the Digital Millennium Copyright Act (DMCA), you can issue takedown notices to websites and their hosting providers.

How to file a DMCA notice:

  1. Identify the hosting provider of the website (use a WHOIS lookup service)
  2. Draft a takedown notice that includes:
    • Your identification
    • The specific URLs of infringing content
    • A statement that you own the copyright
    • Your signature (electronic is acceptable)

Many hosting providers have online DMCA submission forms. For websites hosted in the US, providers must respond to valid DMCA requests or risk liability.


Right to Be Forgotten (EU/UK Residents)

If you're in the European Union or United Kingdom, you have the "right to erasure" under GDPR. You can request that:

  • Search engines de-list results containing your personal data
  • Websites delete content about you under certain conditions
  • Data controllers remove your personal information

Google's EU privacy removal request form is available at reportcontent.google.com.


When to Involve Law Enforcement

Consider filing a police report if:

  • The images were shared with intent to harass, harm, or extort you (this is illegal in most jurisdictions)
  • You're receiving threats related to the images
  • You're being blackmailed or extorted
  • The images involve a minor

In the United States, 48 states plus Washington D.C. now have laws specifically criminalizing non-consensual pornography. Many countries have similar legislation. A police report also creates an official record that may strengthen civil legal action.


Consulting an Attorney

For persistent or severe cases, an attorney specializing in cyber civil rights or internet law can:

  • Send cease and desist letters carrying legal weight
  • File civil lawsuits for invasion of privacy or intentional infliction of emotional distress
  • Seek court orders compelling removal
  • Pursue damages from perpetrators

Many lawyers offer free initial consultations. The Cyber Civil Rights Initiative maintains resources for finding qualified legal help.


Step 5: Follow-up & Ongoing Monitoring

Content removal isn't always instant, and images can resurface. Set up systems to monitor and respond.

Set Up Google Alerts

Visit google.com/alerts and create alerts for:

  • Your name
  • Any usernames associated with you
  • Any other identifying information

Google will email you when new content matching these terms appears online.

Use Reverse Image Search

Periodically search for your images using:

  • Google Images (images.google.com) by uploading the image directly
  • TinEye (tineye.com)
  • Yandex Images, which sometimes finds results other engines miss

Verify Removals

After you've submitted removal requests:

  1. Check back in 1-2 weeks to confirm the content is gone
  2. Clear your browser cache before checking, as your browser may show a cached version
  3. If content reappears, file new removal requests immediately

Maintain Your StopNCII Case

Keep your case number and PIN in a secure location. Your case remains active, protecting against future uploads of the same images.


Step 6: Prevention Strategies for the Future

While no strategy is foolproof, these practices reduce risk.

Digital Safety Practices

  • Before sharing intimate content, have explicit conversations about expectations and consent
  • Use platforms with disappearing messages for sensitive content (while understanding nothing is truly temporary online)
  • Keep devices password-protected and enable two-factor authentication on all accounts

If You're in a Relationship

  • Recognize that healthy partners don't threaten to share intimate images
  • If you're leaving an abusive relationship, consider changing passwords, reviewing shared cloud storage, and consulting with a domestic violence advocate about digital safety planning

Know Your Rights

Familiarize yourself with NCII laws in your jurisdiction. Many places now recognize image-based abuse as a serious crime.


You Deserve Support

Dealing with non-consensual image sharing can feel isolating, but you don't have to navigate this alone.

Support Resources


Remember: What happened to you reflects the choices of whoever violated your trust, not your worth as a person. With persistence and the right tools, you can take back control of your digital presence.


This guide empowers you to take action on your own terms. If the process feels overwhelming or you'd prefer professional assistance and peace of mind, services like SecondDawn.ai can handle this process as your dedicated agent, managing removal requests and monitoring on your behalf.