For what its worth, here are my 6 ways to claim ownership: 1) Register as a databroker and sell your own PI to companies who 'mistakenly' claim they don't have it; 2) Master personal data returned in KNOW requests by companies who verified it is YOUR data; 3) File sworn complaints with enforcement agencies which *might* verify your identity is associated with YOUR data; 4) File lawsuits against companies who are buying stolen information from data brokers, as verified by companies like DarkOwl who monitor the dark web or against companies who have shared your PI with unauthorized cybercriminals; 5) publish authoritative document sources of mastered data elements showing the data lineage / provenance; 6) File claims against a company's cybersecurity insurance along with its estimated value from an independent actuary. Good luck!
I assume you're joking, because I'm not sure that any of these steps are actually achievable or likely to affect your data use. I also think that the last example is ... not a thing. If you're not joking, then pray tell how this works in practice, because I'm honestly confused.
For what its worth, here are my 6 ways to claim ownership: 1) Register as a databroker and sell your own PI to companies who 'mistakenly' claim they don't have it; 2) Master personal data returned in KNOW requests by companies who verified it is YOUR data; 3) File sworn complaints with enforcement agencies which *might* verify your identity is associated with YOUR data; 4) File lawsuits against companies who are buying stolen information from data brokers, as verified by companies like DarkOwl who monitor the dark web or against companies who have shared your PI with unauthorized cybercriminals; 5) publish authoritative document sources of mastered data elements showing the data lineage / provenance; 6) File claims against a company's cybersecurity insurance along with its estimated value from an independent actuary. Good luck!
I assume you're joking, because I'm not sure that any of these steps are actually achievable or likely to affect your data use. I also think that the last example is ... not a thing. If you're not joking, then pray tell how this works in practice, because I'm honestly confused.