Skip to main content

Opt out of Windows privacy consent

Apply Now
Works with Windows 10 and 11Works with Windows Vista, XP, 7, 8, 10, 11, and Windows Server 2008 or newer.
  • Single actionThis page belongs to a script, containing basic changes to achieve a task.
  • Windows onlyThis script improves your privacy on Windows
  • Impact: MinimumSystem Functionality Loss Risk: Low
    This action improves privacy with minimal impact when you run the recommended script.
  • Batch (batchfile)These changes use Windows system commands to update your settings.
  • Fully reversible

    You can fully restore this action (revert back to the original behavior) using this website.

    The restore/revert methods provided here can help you fix issues.

Overview

Missing Good Quality Documentation

This page does not yet meet PrivacyLearn's documentation standards. However, the script/action is stable and verified by community. Here are some options for you to understand its functionality:

Computer-generated docs (PREVIEW)

This documentation may be low quality but still useful.
Read computer-generated explanation

This documentation is automatically extracted from the code implementation.

Windows sensitive data privacy integration: opt out of Windows privacy consent in a few steps on this page that outlines how to create a safe and private environment through the use of important privacy management. On top of that, this section demystifies how to revert the adjustments done.

A strong sense of sensitive privacy protection is essential for personal security in today's digital world. Start enhanced through optimization for personal privacy handling settings: check these steps and choose what fits. Ensure each command is entered as instructed.

References

Technical Details

The tweak here changes registry entries to gain precise privacy configurations and this customization can also help to maintain stricter online privacy control. This can help improve overall system responsiveness subsequent to efficient setting management.

Explore similar guides

Gives more context about the goal of the changes

Review code

Requires technical knowledge about Batch (batchfile)

Edit this page to improve

Requires technical knowledge about YAML and Git
Safe for General Use
All actions in this script is recommended for all users. This is recommended for all users to improve without any noticeable impact on the system functionality.

Apply Now

Choose one of three ways to apply:

Download script

Download and run the script directly
  • No app needed
  • Offline usage
  • Easy-to-apply
  • Free
  • Open-source

Apply with privacy.sexy

Guided, automated application with safety checks
  • Recommended for most users
  • Includes safety checks
  • Free
  • Open-source
  • Popular
  • Offline/Online usage
Open privacy.sexy

Run commands

Copy and run commands manually Requires technical knowledge
Apply changes
:: Set the registry value: "HKCU\SOFTWARE\Microsoft\Personalization\Settings!AcceptedPrivacyPolicy"
PowerShell -ExecutionPolicy Unrestricted -Command "$registryPath = 'HKCU\SOFTWARE\Microsoft\Personalization\Settings'; $data = '0'; reg add 'HKCU\SOFTWARE\Microsoft\Personalization\Settings' /v 'AcceptedPrivacyPolicy' /t 'REG_DWORD' /d "^""$data"^"" /f"

Similar Guides


About the Creators

These people have authored this documentation and written its scripts:

  • Avatar of undergroundwires. The creator of PrivacyLearn and privacy.sexy. Black and white portrait showing a person wearing a polka dot tie and suit jacket, reflecting the professional expertise behind the privacy protection tools.
    • Certified security professional
    • 7+ years experience securing banks
    • Open-source developer since 2005
    • EU advisor, Public Speaker, Moderator
    • Hundreds across the globe
    • Testers, reviewers, developers
    • Companies, military agencies
    • Community since 2017

Reviewed By

This guide has undergone comprehensive auditing and peer review:
  • Expert review by undergroundwires

    • Verified technical accuracy and editorial standards
    • Assessed system impact and user privacy risks
    • Audited and verified using automated security tests
  • Public review by large community

    • Privacy enthusiasts and professionals peer-reviewed
    • Millions of end-users tested across different environments
    • Audited and verified using third-party security software

History

We continually monitor our guides, their impact and other potential privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.