SlideShare a Scribd company logo
App Privacy
   Larry Magid
   Co-director,
 ConnectSafely.org

      Founder
    SafeKids.com

Revised: Feb 26, 2012
More than a million apps
As of February, 2012
•     500,000 iPhone/iPad apps
•     382,000 Android apps
•     Around 500,000 Facebook apps

Almost all from “third parties” (other than
Apple/Facebook or Google)
Apps can be all powerful
• An “app” is a piece of software that can do practically anything that
  it’s programmed to do

• While not necessarily for evil purposes apps, in theory, can:
  – Control your device and access anything on it
  – Access your contact list
  – Know & even share your location
  – Record incoming and outgoing text messages
  – Track incoming & outgoing calls
  – Send text messages & make calls from your account
  – Trace web sites visited
  – Post to your Facebook or Twitter account
  – Anything you do with your phone can be recorded by an app

   But they’re not supposed to do any of these things without permission
Guidelines are a start



• Facebook and Apple have guidelines & rules about
  app privacy, but can they really police thousands of
  app developers?
• Revelations about apps uploading user data to
  servers may be the tip of the iceberg
Reviews and Ratings
                               • App stores offer user reviews
                                 and ratings
                               • They’re not perfect but they give
                                 you a sense of what others
                                 think.
                                 – Look for apps with lots of reviews
                                   & high ratings
                               • Use a search engine to research
Apple App Store provides
ratings and user reviews but     apps or review sites like
you have to scroll down to
see them                         AppReviews
Only Install “Reputable” Apps
• Download from legitimate app stores - Apple,
  Android & Amazon
• Read reviews & ratings in App store or marketplace
• Search for info about apps
• Look at what permissions they’re asking for
Pay Careful Attention to “Permissions”

Apps will typically ask you permission before running
for things like:
   – Uploading your contact information
   – Tracking your location
   – Posting to your Facebook or Twitter account


Does the the app really needs this information to serve
you? If not, don’t install it
Be especially careful about:
• Apps that disclose your location
• Apps that access your contact list
• Apps that send photos to others




                                              One of many apps that
                                              share your location with
                                              friends or others

 Pay close attention to permissions such as
 uploading your contacts or disclosing your
 location
And Don’t Forget To
• Understand the privacy settings of your mobile
  operating system
• Look for age or content rating on any apps for kids
• Lock (PIN protect) your phone
Privacy Disclosure Agreement
On February 23, 2012 California’s Attorney General
announced a deal with Apple, Google, Microsoft & others
to require app developers to disclose their privacy policies
before users download them. This should benefit users
throughout the world
“Consumer Privacy Bill of Rights”
  On February 23, 2012 The Obama Administration weighed-in with
  its “Consumer Data Privacy in the Networked World” report & “Bill
  of Rights” giving consumers the right to:

  •   Individual Control
  •   Transparency
       – Easily understandable
  •   Respect for Context
       – Companies will collect, use & disclose in context of how data
           is to be used
  •   Security
  •   Access and Accuracy
       – Right to access our own data
  •   Focused Collection
       – Reasonable limits on data that companies collect and retain
  •   Accountability
       – Companies accountable to enforcement authorities
Thank you!
      Larry Magid
larry@connectsafely.org

More Related Content

PPTX
Privacy Primer
PPTX
How to Create (use use) Strong & Unique Passwords
PPTX
Media etiquette 2021
PPTX
User's Guide to Online Privacy
PDF
Cyber security awareness presentation nepal
PDF
Cyber security
PPTX
Internet security
PDF
Cyber safety
Privacy Primer
How to Create (use use) Strong & Unique Passwords
Media etiquette 2021
User's Guide to Online Privacy
Cyber security awareness presentation nepal
Cyber security
Internet security
Cyber safety

What's hot (18)

PPTX
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
PPT
[PPT] Webinar on Cyber Safety Training for Young Students
PDF
10 most important cyber security tips for your users
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PPSX
Cyber security awareness for students
PPTX
Safe Internet Banking Cyber Security
PDF
What happened on October 21
PPTX
LIFARS - Financial Cybercrime
PDF
Securityguide
PPTX
An Introduction To IT Security And Privacy for Librarians and Libraries
PDF
How to make yourself hard to hack! slide share presentation
PPT
Information technology powerpoint
PPT
Cyber Security and Cyber Awareness
PPTX
Reining in the Data ITAG tech360 Penn State Great Valley 2015
PDF
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
PDF
Internet Safety for Kids and Parents
PDF
How Can you Identify your Next Insider Threat?
PDF
Cyber security; one banker s perspective
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
[PPT] Webinar on Cyber Safety Training for Young Students
10 most important cyber security tips for your users
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Cyber security awareness for students
Safe Internet Banking Cyber Security
What happened on October 21
LIFARS - Financial Cybercrime
Securityguide
An Introduction To IT Security And Privacy for Librarians and Libraries
How to make yourself hard to hack! slide share presentation
Information technology powerpoint
Cyber Security and Cyber Awareness
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Internet Safety for Kids and Parents
How Can you Identify your Next Insider Threat?
Cyber security; one banker s perspective
Ad

Similar to App Privacy (20)

PPTX
AppTo
PPTX
App Promo Android Toronto Session 10/25
PPT
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
PDF
Rooftop Overview
PDF
9 Key Mobile App Marketing Elements
PPTX
Insights on Android App Development, Marketing and Monetization
PDF
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
PPTX
Mapping the social media technology stack
PPTX
Mobile Healthcare Apps: 7 things to remember to get your app noticed
PDF
Deep linking - a fundamental change in the mobile app ecosystem
PDF
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
PDF
Introduction to App Stores
PDF
You installed what Thierry Sans
PDF
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
PDF
Introducing the Portability Policy
PDF
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
 
PDF
The ten commandments of app marketing
PPTX
Mining apps for anomalies
PDF
Angellist Deck
PDF
App testing and publishing
AppTo
App Promo Android Toronto Session 10/25
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Rooftop Overview
9 Key Mobile App Marketing Elements
Insights on Android App Development, Marketing and Monetization
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
Mapping the social media technology stack
Mobile Healthcare Apps: 7 things to remember to get your app noticed
Deep linking - a fundamental change in the mobile app ecosystem
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
Introduction to App Stores
You installed what Thierry Sans
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
Introducing the Portability Policy
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
 
The ten commandments of app marketing
Mining apps for anomalies
Angellist Deck
App testing and publishing
Ad

More from ConnectSafely (16)

PPTX
Online Safety for Seniors
PPTX
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
PPTX
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
PPTX
Digital Citizenship Redefined
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PPTX
A Brief Guide to Facebook Privacy
PPTX
Online Safety 3.0: From Fear to Empowerment
PPT
A (very) brief history of Internet safety
PPT
Internet Safety: Some Context
PPT
Digital literacy, digital citizenship
PPTX
Filters and monitoring: Panacea or band-aid
PPT
Digital reputations
PPT
Making the case for digital citizenship
PPT
Digital citizenship, briefly
PPTX
Putting online risks into perspective
PPT
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
Online Safety for Seniors
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
Digital Citizenship Redefined
How to Protect Yourself From Heartbleed Security Flaw
A Brief Guide to Facebook Privacy
Online Safety 3.0: From Fear to Empowerment
A (very) brief history of Internet safety
Internet Safety: Some Context
Digital literacy, digital citizenship
Filters and monitoring: Panacea or band-aid
Digital reputations
Making the case for digital citizenship
Digital citizenship, briefly
Putting online risks into perspective
ConnectSafely Slide Show for Ministry of Communications and Information Techn...

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
gpt5_lecture_notes_comprehensive_20250812015547.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf

App Privacy

  • 1. App Privacy Larry Magid Co-director, ConnectSafely.org Founder SafeKids.com Revised: Feb 26, 2012
  • 2. More than a million apps As of February, 2012 • 500,000 iPhone/iPad apps • 382,000 Android apps • Around 500,000 Facebook apps Almost all from “third parties” (other than Apple/Facebook or Google)
  • 3. Apps can be all powerful • An “app” is a piece of software that can do practically anything that it’s programmed to do • While not necessarily for evil purposes apps, in theory, can: – Control your device and access anything on it – Access your contact list – Know & even share your location – Record incoming and outgoing text messages – Track incoming & outgoing calls – Send text messages & make calls from your account – Trace web sites visited – Post to your Facebook or Twitter account – Anything you do with your phone can be recorded by an app But they’re not supposed to do any of these things without permission
  • 4. Guidelines are a start • Facebook and Apple have guidelines & rules about app privacy, but can they really police thousands of app developers? • Revelations about apps uploading user data to servers may be the tip of the iceberg
  • 5. Reviews and Ratings • App stores offer user reviews and ratings • They’re not perfect but they give you a sense of what others think. – Look for apps with lots of reviews & high ratings • Use a search engine to research Apple App Store provides ratings and user reviews but apps or review sites like you have to scroll down to see them AppReviews
  • 6. Only Install “Reputable” Apps • Download from legitimate app stores - Apple, Android & Amazon • Read reviews & ratings in App store or marketplace • Search for info about apps • Look at what permissions they’re asking for
  • 7. Pay Careful Attention to “Permissions” Apps will typically ask you permission before running for things like: – Uploading your contact information – Tracking your location – Posting to your Facebook or Twitter account Does the the app really needs this information to serve you? If not, don’t install it
  • 8. Be especially careful about: • Apps that disclose your location • Apps that access your contact list • Apps that send photos to others One of many apps that share your location with friends or others Pay close attention to permissions such as uploading your contacts or disclosing your location
  • 9. And Don’t Forget To • Understand the privacy settings of your mobile operating system • Look for age or content rating on any apps for kids • Lock (PIN protect) your phone
  • 10. Privacy Disclosure Agreement On February 23, 2012 California’s Attorney General announced a deal with Apple, Google, Microsoft & others to require app developers to disclose their privacy policies before users download them. This should benefit users throughout the world
  • 11. “Consumer Privacy Bill of Rights” On February 23, 2012 The Obama Administration weighed-in with its “Consumer Data Privacy in the Networked World” report & “Bill of Rights” giving consumers the right to: • Individual Control • Transparency – Easily understandable • Respect for Context – Companies will collect, use & disclose in context of how data is to be used • Security • Access and Accuracy – Right to access our own data • Focused Collection – Reasonable limits on data that companies collect and retain • Accountability – Companies accountable to enforcement authorities
  • 12. Thank you! Larry Magid larry@connectsafely.org