Skip to main content

デジタルデトックスとセキュリティ - 使わないアカウントの危険性

About 12 min read

Do you have accounts you created years ago and never use anymore? Abandoned social media, services you signed up for just to try, accounts tied to old email addresses. These "digital leftovers" actually carry significant security risks. Dormant accounts can be caught up in data breaches without you noticing, and if you reuse the same password, your active accounts are also at risk. This article explains the specific risks of unused accounts and provides a step-by-step guide for safely conducting a digital declutter.

Risks of Dormant Accounts

Becoming an Invisible Victim of Data Breaches

Data breaches occur thousands of times each year, and even major services are not exempt. When a dormant account is caught in a breach, notification emails may go to an old address you no longer check, leaving you unaware of the damage. Attackers use leaked email and password combinations to launch credential stuffing attacks against other services.

The most dangerous scenario is when you use the same password for both dormant and active accounts. Attackers use automated tools to try leaked passwords against major services one after another. From a single dormant account, your bank account, email, and social media could all be compromised in a chain reaction. For more on password reuse risks, see our article on the dangers of password reuse.

Secondary Damage from Account Takeover

When a dormant social media account is taken over, spam and phishing messages are sent to your friends under your name. Friends are likely to click malicious links believing the message is from you, causing damage to spread in a chain reaction. Cases of hijacked accounts being used for impersonation fraud have also been reported.

How to Conduct an Account Inventory

Identifying All Registered Accounts

Start by understanding how many accounts you actually have. Search your email inbox for keywords like "registration complete," "account created," or "welcome" to reveal services you signed up for in the past. If you use a password manager, the list of saved login credentials serves as your inventory list. Also check passwords saved in your browser.

Google and Apple account settings show a list of third-party apps connected via OAuth. Services where you used "Sign in with Google" or "Sign in with Apple" can be found here. You will often discover services you had forgotten about, so regular checks are recommended.

Criteria for Prioritization

You do not need to process all accounts at once. Prioritize using these criteria: highest priority goes to accounts linked to financial information (credit cards, bank accounts). Next are services where you registered personal information (address, phone number, ID documents). Then come email accounts and social login connections that could be used to access other accounts.

Steps for Safe Account Deletion

What to Do Before Deletion

Before deleting an account, some preparation is needed. First, export any important data stored in the service (photos, documents, purchase history, etc.). Many services offer a "download your data" feature. Next, verify that you are not using that account to log into other services. If you have services using "Sign in with Google," you need to change their login method first.

Once deletion is complete, also remove the entry from your password manager and record it as "deleted" in your inventory list. Making regular account inventories a habit (once or twice a year) prevents the accumulation of dormant accounts. <AmazonLink keyword="パスワードマネージャー" locale={locale} className="amazon-inline-link">Password management books (Amazon)</AmazonLink> provide more detailed best practices for account management.

Digital Declutter Checklist

Use the following checklist to proceed with your digital declutter: (1) Search emails to identify registered services. (2) Check your password manager and browser saved passwords. (3) Review connected apps in Google/Apple/Facebook settings. (4) Process accounts linked to financial information first. (5) For services that cannot be deleted, change passwords to strong ones and minimize personal information. (6) Remove completed deletions from your list. (7) Repeat this process once or twice a year.

What to Do When Deletion Is Not Possible

Neutralizing Accounts

Not all services offer account deletion. When deletion is not possible, "neutralize" the account. First, change the password to a random long string (generated by your password manager). Next, replace registered personal information (name, address, phone number) with dummy data. Remove any registered credit card information. Also delete profile photos and posted content.

For services subject to GDPR (EU General Data Protection Regulation), you can send a "Right to Erasure" request to demand complete deletion of your data. Japanese services also allow suspension requests based on the Personal Information Protection Act. Use these rights to maintain control over your data. It is also important to be conscious of the data minimization principle and develop the habit of registering only the minimum necessary information going forward.

Was this article helpful?

Related Terms

XHatena