2016 dating site email contacts


02-Dec-2020 07:40

” this is so weird - i got so many emails this morning i finally was like i guess ill try to log in and see whats up?

and i did and my profile from 10 YEARS AGO was fully up - and I haven't paid https://t.co/c3WFx Pl T7f a cent since i canceled!

“Something came up [on my phone] and I usually try not to check my email, but I checked my email and it said, ‘You have 10 new matches on ’ I was like... ” Debiak’s long-forgotten — and, he assumed, long-deleted — dating profile from over a decade ago had suddenly been reactivated.

“I log in, and there I am, from 15 years prior, with less gray hair,” he said.

In the past, it hasn’t been uncommon for dating websites to use and retain your data for research, marketing, or, as Match.com’s current privacy policy says, “record-keeping integrity.” In a 2009 Computer World report, e Harmony’s then-VP of technology Joseph Essas said, “We have an archiving strategy, but we don’t delete you out of our database.

We’ll remember who you are.” Herb Vest, the founder and CEO of the now-defunct dating website True.com, said in the same report: “The data just sits there.” Even if the profile reactivations were just a glitch in Match’s system, they’re a stark reminder that the internet doesn’t easily forget.

She’s concerned about data privacy, but also the more immediate impact that a new dating profile could have on her current relationship.

In 2015, California resident Zeke Graf filed a class action lawsuit against Match claiming the company was knowingly violating a California civil code which requires every dating service contract to include a statement allowing the buyer to cancel their subscription.

Although there is no federal data destruction law in the US, 32 states — including Texas, where Match Group is headquartered — have data disposal laws that require “entities to destroy, dispose, or otherwise make personal information unreadable or undecipherable.” In addition to that, 13 states, also including Texas, have laws that require private companies to maintain reasonable cybersecurity practices. “A lot of this is still, I don’t want to call it amorphous, but it’s still being defined, frankly,” explains Scott Shackelford, an associate professor and Cybersecurity Program chair at Indiana University-Bloomington.