Back to insights
·8 min

How to send a CV without leaking your ID number, home address, or GPS data

A practical checklist for removing hidden metadata from a CV, profile photo, and PDF before you send it — locally, without uploading the file.

A CV looks simple: a few pages, a profile photo, maybe a PDF export from Word, Pages, Canva, or Google Docs. But the visible page is only part of the file. The file can also contain hidden metadata: author names, software versions, timestamps, editing history, and sometimes GPS data from an image.

That does not mean every recruiter is trying to inspect your file. It means the information travels with the document unless you remove it. If the CV is forwarded, archived, parsed by an applicant tracking system, or later exposed in a breach, the metadata travels too.

What a CV file can reveal

  • Author fields from Word, Pages, or PDF export tools.
  • Original document titles, such as a draft filename or employer-specific version.
  • Creation and modification times, including late-night edits before a deadline.
  • Producer software, which can reveal your workflow or workplace device.
  • Image EXIF data, including camera model, timestamp, and sometimes GPS coordinates.

The profile photo is often the riskiest part

Phone photos commonly include EXIF metadata. If location services were enabled, the image may include the exact place where it was taken: your home, your office, or another private location. Once that image is embedded in a CV or uploaded to a hiring portal, the metadata can be copied and stored in systems you do not control.

A 5-minute cleanup checklist

  1. Remove national ID numbers from the visible CV. Employers rarely need them at the application stage. Provide them later through a secure HR system if required.
  2. Strip metadata from your profile photo. Use Remove image metadata before placing the image into the CV.
  3. Export a fresh PDF. Avoid reusing old files with strange draft names or previous employer references.
  4. Remove PDF metadata. Run the exported file through Remove PDF metadata.
  5. Redact sensitive text properly. If something is already inside the PDF, use Redact PDF. Drawing a black box over text is not enough.
  6. Compress if needed. Hiring portals often reject large files. Use Compress PDF after cleanup.

Why local tools matter here

Uploading a sensitive CV to a random website in order to make it more private is a strange trade. With local processing, the browser reads and edits the file on your own machine. No server receives the document. Open the browser Network tab before running a tool and you can verify it yourself: no file upload.

Short version

  • Remove ID numbers from the visible CV.
  • Strip GPS and EXIF metadata from profile photos.
  • Remove PDF author, title, software, and timestamp metadata.
  • Use proper redaction for anything visible on the page.
  • Prefer tools that process locally and can be verified in the Network tab.