Personal Safety

Privacy Defense for Teachers, Nurses, Judges, and Election Workers (2026)

Since 2020, four groups of public-facing workers have faced a sharp rise in targeted harassment. Most of the material used to dox them was never hacked—it was pulled off people-search sites. Here is the four-layer defense and the statutes that actually give you leverage.

OfflistMe Privacy Team logo
Offlist Privacy Team
Read our story & mission →
Privacy Defense for Teachers, Nurses, Judges, and Election Workers (2026)
Privacy Defense for Teachers, Nurses, Judges, and Election Workers (2026)

# Privacy Defense for Teachers, Nurses, Judges, and Election Workers (2026)

Since 2020, four groups of public-facing workers have seen a documented sharp increase in targeted harassment: election workers, judges, teachers, and healthcare workers. The mechanism is the same in every case. A public incident — a contested election, a controversial ruling, a classroom video, a clinical decision — goes viral, and within hours the target's home address, family members, and personal phone number are being circulated. None of that information had to be hacked. It was already on people-search sites.

This post is for workers in high-risk roles, and for employers who should be doing more to protect them.

Who is at elevated risk

The CISA guidance on election worker security documents a sustained increase in threats to election officials since 2020. Similar trends across other roles:

  • Educators — the NEA's 2023 survey reported that roughly one in three teachers has experienced threats or harassment, with a sharp uptick since 2021.
  • Nurses and healthcare workers — the American Nurses Association lists workplace violence and doxxing among its top industry concerns.
  • Judges — after the 2020 home attack that killed Daniel Anderl, son of a federal judge, every state has reviewed home-address protections for judicial officers.

Doxxing of these roles is usually not sophisticated. Most of it is a public search on Whitepages, Spokeo, or BeenVerified, combined with a scrape of public social media posts.

Legal protections by role

The protective statutes vary by state and profession. If you are covered, they are a meaningful legal lever with statutory damages.

Judges, prosecutors, law enforcement

Daniel's Law (NJ, 2020) is the model. It grants a right to demand takedown of home address and unlisted phone number from any website that publishes it, applies to judges, prosecutors, law enforcement, and their immediate families, provides statutory damages of $1,000 per violation plus attorney's fees, and covers data brokers explicitly.

Similar statutes exist in Pennsylvania (2022), New York (2022, narrower), Maryland (2023), Florida (2022), and Texas (Judith Miranda Act, 2023). The private right of action varies by state.

Election workers

  • State analogs in California (AB 884), Colorado (HB 23-1273), Minnesota, and others cover addresses of election workers on public records and voter rolls.

Most state programs allow opt-in address redaction from voter rolls for election workers, administered by the Secretary of State.

Healthcare workers

California SB 1477 (2022) allows reproductive health care workers to enroll in Safe at Home. Several states have followed. Hospital employers in some states (NY, WA) are required to maintain workplace violence prevention plans that cover external threats.

Educators

Protections are weaker and patchier. Most educator protection relies on general stalking statutes and the district's internal policies. A few large districts (LAUSD, NYC DOE) have formal programs to remove educator personal information from district websites and internal directories after incidents. Federal law does not yet provide teacher-specific protections.

The four-layer defense

Whether you are covered by a specific statute or not, the defensive stack is the same.

Layer 1: Workplace records

Start with what the employer publishes.

  • Remove your personal email and phone number from any public-facing staff directory.
  • If your employer lists you on a public roster, request removal or limit the listing to a role title without a photo.
  • For court staff, hospital systems, and school districts, the compliance office usually has a formal takedown process. Use it.

Layer 2: Data broker opt-out

This is where the majority of doxxing material actually comes from. The ten highest-exposure sites for most US residents:

Each has a free opt-out process. Doing all ten manually takes a few hours. Our directory covers 200+ brokers in total. Offlist.me generates the removal requests for the full list in one pass.

Layer 3: Address Confidentiality Program

If you qualify — most election workers, judges, prosecutors, law enforcement, healthcare workers (state-dependent), and survivors of named threats do — enroll. Our ACP guide covers eligibility and the application process.

ACP does not fix data broker exposure, which is why layer 2 matters. ACP fixes the ongoing leak from government records.

Layer 4: Social media hardening

Doxxers piece together addresses from photos and posts as much as from broker lookups.

  • Remove geotags from Instagram and Facebook posts. Turn off location sharing by default going forward.
  • Audit old posts for photos of your home exterior, your license plate, school mascots, and identifiable neighborhood landmarks.
  • Remove your employer from public-facing profiles if name plus employer gives an attacker enough.
  • Set Facebook friend lists to private. Your friend graph is as identifying as your address.
  • On LinkedIn, consider removing your city.

What employers should provide

If you are an employer reading this, the minimum program that materially reduces risk for staff:

  • A budgeted data broker removal service for all public-facing staff and their listed family members. This is the single highest-leverage action. Costs range from $2 one-time per employee (tools like Offlist.me) to $100–150 per employee per year for subscription services.
  • A formal takedown request process through legal, handling both Daniel's-Law-style statutory takedowns where applicable and informal broker requests where not.
  • A workplace violence prevention plan compliant with relevant state statutes.
  • An incident-response playbook for doxxing events, including a pre-identified ACP enrollment path for staff at risk.
  • Regular training on personal OPSEC — geotag management, social media audit, mail forwarding.

Most of this costs less than the legal exposure from a single doxxing-triggered incident. It is unusual that it is not yet standard.

If you are being actively doxxed right now

  • Document everything. Screenshot the posts, URLs, and timestamps.
  • File a police report in your local jurisdiction. Even if nothing is prosecuted, the report matters for protective orders and for most employer assistance programs.
  • Contact your state AG's office if you are covered by a statute like Daniel's Law.
  • If your employer has a protective program, activate it now, not after the weekend.
  • Start the data broker takedown sweep immediately. The longer the address stays up, the more actors cache it.

The structural lesson of the past five years is that personal exposure is now a workplace safety issue for a widening set of professions. Treating it that way — budgeted, policied, and trained for — is the right response.

Start a 200+ broker opt-out sweep →

Take back your privacy today

Remove your personal information from data brokers and platforms in seconds.

Remove Your Personal Data Now

From $2 one-time · 200+ data brokers · No subscription