Frequently Asked Questions

1. How did you get my email?

We came across your email while scanning public breach files during a project. These files are freely available in cybersecurity forums and open-source communities. We do not buy, steal, or scrape data.

2. Why did you email me?

If we emailed you, it's because your email appeared in a publicly available leak. We built this free tool to help people check if their information was exposed. If you prefer not to be contacted again, you can opt out anytime.

3. Do you store or share my data?

No. We do not store, log, or share your email or any search activity. This tool simply cross-references public breach datasets and shows the result on your screen — nothing is saved.

4. Is this safe?

Yes. We don't ask for passwords or personal information. The tool only checks if your email was exposed in known public breaches and displays what kind of data was leaked.

5. What should I do if my email was found?

We recommend changing your passwords, enabling two-factor authentication, and reviewing any accounts tied to the affected email. Our tool tells you which breach your email was in, so you can take the right steps.

6. Where do your data sources come from?

We use verified public data breach sources like HaveIBeenPwned and open-source breach archives shared for cybersecurity awareness and education.

7. Who are you?

We're a small team of devs working on cybersecurity tools. This project started as an experiment and is now open for public use — free, anonymous, and awareness-focused.

8. Can I request removal?

Yes. If you'd like to opt out of future contact or report abuse, email us at support@dataleakscan.com.

9. Is this legal?

We do not collect or use personal data in violation of any regulations. The tool checks publicly available datasets, and any outreach is made with good intention. If you feel otherwise, please reach out and we will address it immediately.