SlideShare a Scribd company logo
User Data, App Development,
GDPR, Ethics and you
CocoaCoders 

April 26th, 2018
Disclaimer
• I am not a lawyer

• Viewer discretion
advised
Interactivity
This is not supposed to be me
lecturing

Stop me and ask questions or
interject
Disclaimer
What is GDPR?
• European Union regulation on Privacy (more detail later)

• Takes effect May 25th 2018

• Penalties: The greater of €10 million or 2% of global annual revenue
Does this matter here?
Some people think so
Will (something like) this come to U.S.?
What do you think?
What Data is Affected?
• Basic identity information such as name, address and ID numbers

• Web data such as location, IP address, cookie data and RFID tags

• Health and genetic data

• Biometric data

• Racial or ethnic data

• Political opinions

• Sexual orientation
https://www.csoonline.com/article/3202771/data-protection/general-data-protection-regulation-gdpr-requirements-deadlines-and-facts.html
GDPR Principles (1/4)
• "Easier access to your own data: individuals will have
more information on how their data is processed and
this information should be available in a clear and
understandable way."
GDPR Principles (2/4)
• "A right to data portability: it will be easier to transfer
your personal data between service providers."
GDPR Principles (3/4)
• "A clarified 'right to be forgotten': when you no longer
want your data to be processed, and provided that
there are no legitimate grounds for retaining it, the
data will be delete."
GDPR Principles (4/4)
• "The right to know when your data has been hacked:
For example, companies and organizations must
notify the national supervisory authority of serious
data breaches as soon as possible so that users can
take appropriate measures.”

• (“The 72-hour reporting window that the GDPR
requires makes it especially important that vendors
know how to properly report a breach.")
https://www.csoonline.com/article/3202771/data-protection/general-data-protection-regulation-gdpr-requirements-deadlines-and-facts.html
New Apple APIs
• Providing User Access to CloudKit Data

• https://developer.apple.com/documentation/cloudkit/
providing_user_access_to_cloudkit_data/

• Responding to Requests to Delete Data

• https://developer.apple.com/documentation/cloudkit/
responding_to_requests_to_delete_data/
GreyKey
Cracks a phones passkey

Provides complete Keychain contents…
Blue’s Suggestions
•I recommend Apple's WWDC privacy sessions for Best Practices on obvious(?) concepts
such as transparency, consent, and user control. The videos also cover ways to re-think
data collection, trading firehoses for eye-droppers (and/or muddy water). For instance ...

•"Privacy and Your Apps" (2017) https://developer.apple.com/videos/play/wwdc2017/702/

•"Engineering Privacy for Your Users" (2016) https://developer.apple.com/videos/play/
wwdc2016/709/

•The first video includes discussion (6:15) of how to back-away from raw data in order to
get just the information you need.

•The second video has a nice description (14:00) of Differential Privacy: adding noise to
collected data.
Strategies
• 1. Determine whether the app really needs all the requested personal data

• 2. Encrypt all personal data and inform users about it

• 3. Think OAUTH for data portability

• 4. Enforce secure communications through HTTPS

• 5. Inform users about and encrypt personal data from ‘contact us' forms
https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant-apps
Strategies (cont)
• 6. Make sure sessions and cookies expire and are destroyed after logout

• 7. Do not track user activity for business intelligence 

• 8. Tell users about logs that save location or IP addresses 

• 9. Store logs in a safe place, preferably encrypted

• 10. Security questions should not turn on users' personal data
https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant-apps
Strategies (cont)
• 11. Create clear terms and conditions and make sure users read them

• 12. Inform users about any data sharing with third parties  

• 13. Create clear policies for data breaches

• 14. Delete data of users who cancel their service

• 15. Patch web/dependency vulnerabilities 
https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant-apps
Get Apple’s data on you
• https://www.cnbc.com/2018/04/25/how-to-download-a-copy-of-apple-
data-about-me.html
Since We’re on the Subject
Big Data is Everywhere…
Further Reading
• https://www.prnewswire.com/news-releases/lookout-report-84-of-it-
executives-expect-data-accessed-on-mobile-to-cause-gdpr-
violations-300555381.html

• https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant-
apps 

• http://europa.eu/rapid/press-release_IP-15-6321_en.htm

• https://www.schneier.com/blog/archives/2018/03/greykey_iphone_.html

• https://www.wsj.com/articles/how-europes-new-privacy-rules-favor-google-
and-facebook-1524536324

More Related Content

PDF
Privacy by Design and by Default + General Data Protection Regulation with Si...
PPTX
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
PDF
Big data contains valuable information - Protect It!
PDF
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
PDF
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
PPTX
Information Leakage & DLP
PPTX
The REAL Impact of Big Data on Privacy
PPTX
Privacy by Design: White Papaer
Privacy by Design and by Default + General Data Protection Regulation with Si...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Big data contains valuable information - Protect It!
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Information Leakage & DLP
The REAL Impact of Big Data on Privacy
Privacy by Design: White Papaer

What's hot (20)

PPT
Avoid Privacy by Disaster by Adopting Privacy by Design
PPTX
Privacy by design for peerlyst meetup
PDF
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
PPTX
Privacy by Design as a system design strategy - EIC 2019
PDF
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
PPT
Enlightened Privacy – by Design for a Smarter Grid
PDF
Introduction to Ethics of Big Data
PPTX
Privacy by Design - taking in account the state of the art
PDF
Data Privacy
PPT
Data Leakage Presentation
PPTX
Ethics of Big Data
PDF
Data Analytics Governance and Ethics
PDF
BigID IAPP webinar on data-driven enterprise privacy management
PDF
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
PDF
Internet of Things With Privacy in Mind
PPTX
Big data security the perfect storm
PDF
Privacy and Security by Design
PDF
How privacy by design can be the key of your success at the time of the digit...
PDF
Storgrid-Encryption-White-Paper
PPTX
Privacy by design
Avoid Privacy by Disaster by Adopting Privacy by Design
Privacy by design for peerlyst meetup
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Privacy by Design as a system design strategy - EIC 2019
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Enlightened Privacy – by Design for a Smarter Grid
Introduction to Ethics of Big Data
Privacy by Design - taking in account the state of the art
Data Privacy
Data Leakage Presentation
Ethics of Big Data
Data Analytics Governance and Ethics
BigID IAPP webinar on data-driven enterprise privacy management
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
Internet of Things With Privacy in Mind
Big data security the perfect storm
Privacy and Security by Design
How privacy by design can be the key of your success at the time of the digit...
Storgrid-Encryption-White-Paper
Privacy by design
Ad

Similar to GDPR, User Data, Privacy, and Your Apps (20)

PPTX
Privacy on Mobile Apps
PPTX
GDPR for developers
PPTX
Helping Developers with Privacy
PDF
Golden Gekko, 10 burning questions on privacy
 
PPTX
Designing for Privacy NY Studio—10/04/21
PPTX
Global Data Privacy Regulation
PPTX
Designing for Privacy in an Increasingly Public World
PDF
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
PDF
GDPR - Applift firstscreen june 2016
PPTX
Fostering an Ecosystem for Smartphone Privacy
PPTX
My Privacy at Risk, is it Safe?
PDF
GDPR for Things - ThingsCon Amsterdam 2017
PPTX
Why We Require GDPR?
PDF
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
PDF
Toreon adding privacy by design in secure application development oss18 v20...
PDF
Applying Innovative Tools for GDPR Success
PPTX
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
PPTX
Helping Developers with Privacy, Distinguished Lecture at University of Wisco...
PPTX
Helping Developers with Privacy
PDF
Over The Air 2010: Privacy for Mobile Developers
Privacy on Mobile Apps
GDPR for developers
Helping Developers with Privacy
Golden Gekko, 10 burning questions on privacy
 
Designing for Privacy NY Studio—10/04/21
Global Data Privacy Regulation
Designing for Privacy in an Increasingly Public World
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
GDPR - Applift firstscreen june 2016
Fostering an Ecosystem for Smartphone Privacy
My Privacy at Risk, is it Safe?
GDPR for Things - ThingsCon Amsterdam 2017
Why We Require GDPR?
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
Toreon adding privacy by design in secure application development oss18 v20...
Applying Innovative Tools for GDPR Success
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Helping Developers with Privacy, Distinguished Lecture at University of Wisco...
Helping Developers with Privacy
Over The Air 2010: Privacy for Mobile Developers
Ad

More from Carl Brown (20)

PDF
New in iOS 11.3b4 and Xcode 9.3b4
PDF
Managing Memory in Swift (Yes, that's a thing)
PDF
Better Swift from the Foundation up #tryswiftnyc17 09-06
PDF
Generics, the Swift ABI and you
PDF
Swift GUI Development without Xcode
PDF
what's new in iOS10 2016-06-23
PDF
Open Source Swift: Up and Running
PDF
Parse migration CocoaCoders April 28th, 2016
PDF
Swift 2.2 Design Patterns CocoaConf Austin 2016
PDF
Advanced, Composable Collection Views, From CocoaCoders meetup Austin Feb 12,...
PDF
Gcd cc-150205
PDF
Cocoa coders 141113-watch
PDF
iOS8 and the new App Store
PDF
Dark Art of Software Estimation 360iDev2014
PDF
Intro to cloud kit Cocoader.org 24 July 2014
PDF
Welcome to Swift (CocoaCoder 6/12/14)
PDF
Writing Apps that Can See: Getting Data from CoreImage to Computer Vision - ...
PPT
Introduction to Git Commands and Concepts
PDF
REST/JSON/CoreData Example Code - A Tour
KEY
360iDev iOS AntiPatterns
New in iOS 11.3b4 and Xcode 9.3b4
Managing Memory in Swift (Yes, that's a thing)
Better Swift from the Foundation up #tryswiftnyc17 09-06
Generics, the Swift ABI and you
Swift GUI Development without Xcode
what's new in iOS10 2016-06-23
Open Source Swift: Up and Running
Parse migration CocoaCoders April 28th, 2016
Swift 2.2 Design Patterns CocoaConf Austin 2016
Advanced, Composable Collection Views, From CocoaCoders meetup Austin Feb 12,...
Gcd cc-150205
Cocoa coders 141113-watch
iOS8 and the new App Store
Dark Art of Software Estimation 360iDev2014
Intro to cloud kit Cocoader.org 24 July 2014
Welcome to Swift (CocoaCoder 6/12/14)
Writing Apps that Can See: Getting Data from CoreImage to Computer Vision - ...
Introduction to Git Commands and Concepts
REST/JSON/CoreData Example Code - A Tour
360iDev iOS AntiPatterns

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PPTX
Spectroscopy.pptx food analysis technology
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
Cloud computing and distributed systems.
Spectroscopy.pptx food analysis technology
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Understanding_Digital_Forensics_Presentation.pptx

GDPR, User Data, Privacy, and Your Apps

  • 1. User Data, App Development, GDPR, Ethics and you CocoaCoders April 26th, 2018
  • 2. Disclaimer • I am not a lawyer • Viewer discretion advised
  • 3. Interactivity This is not supposed to be me lecturing Stop me and ask questions or interject
  • 5. What is GDPR? • European Union regulation on Privacy (more detail later) • Takes effect May 25th 2018 • Penalties: The greater of €10 million or 2% of global annual revenue
  • 6. Does this matter here? Some people think so
  • 7. Will (something like) this come to U.S.? What do you think?
  • 8. What Data is Affected? • Basic identity information such as name, address and ID numbers • Web data such as location, IP address, cookie data and RFID tags • Health and genetic data • Biometric data • Racial or ethnic data • Political opinions • Sexual orientation https://www.csoonline.com/article/3202771/data-protection/general-data-protection-regulation-gdpr-requirements-deadlines-and-facts.html
  • 9. GDPR Principles (1/4) • "Easier access to your own data: individuals will have more information on how their data is processed and this information should be available in a clear and understandable way."
  • 10. GDPR Principles (2/4) • "A right to data portability: it will be easier to transfer your personal data between service providers."
  • 11. GDPR Principles (3/4) • "A clarified 'right to be forgotten': when you no longer want your data to be processed, and provided that there are no legitimate grounds for retaining it, the data will be delete."
  • 12. GDPR Principles (4/4) • "The right to know when your data has been hacked: For example, companies and organizations must notify the national supervisory authority of serious data breaches as soon as possible so that users can take appropriate measures.” • (“The 72-hour reporting window that the GDPR requires makes it especially important that vendors know how to properly report a breach.") https://www.csoonline.com/article/3202771/data-protection/general-data-protection-regulation-gdpr-requirements-deadlines-and-facts.html
  • 13. New Apple APIs • Providing User Access to CloudKit Data • https://developer.apple.com/documentation/cloudkit/ providing_user_access_to_cloudkit_data/ • Responding to Requests to Delete Data • https://developer.apple.com/documentation/cloudkit/ responding_to_requests_to_delete_data/
  • 14. GreyKey Cracks a phones passkey Provides complete Keychain contents…
  • 15. Blue’s Suggestions •I recommend Apple's WWDC privacy sessions for Best Practices on obvious(?) concepts such as transparency, consent, and user control. The videos also cover ways to re-think data collection, trading firehoses for eye-droppers (and/or muddy water). For instance ... •"Privacy and Your Apps" (2017) https://developer.apple.com/videos/play/wwdc2017/702/ •"Engineering Privacy for Your Users" (2016) https://developer.apple.com/videos/play/ wwdc2016/709/ •The first video includes discussion (6:15) of how to back-away from raw data in order to get just the information you need. •The second video has a nice description (14:00) of Differential Privacy: adding noise to collected data.
  • 16. Strategies • 1. Determine whether the app really needs all the requested personal data • 2. Encrypt all personal data and inform users about it • 3. Think OAUTH for data portability • 4. Enforce secure communications through HTTPS • 5. Inform users about and encrypt personal data from ‘contact us' forms https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant-apps
  • 17. Strategies (cont) • 6. Make sure sessions and cookies expire and are destroyed after logout • 7. Do not track user activity for business intelligence  • 8. Tell users about logs that save location or IP addresses  • 9. Store logs in a safe place, preferably encrypted • 10. Security questions should not turn on users' personal data https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant-apps
  • 18. Strategies (cont) • 11. Create clear terms and conditions and make sure users read them • 12. Inform users about any data sharing with third parties   • 13. Create clear policies for data breaches • 14. Delete data of users who cancel their service • 15. Patch web/dependency vulnerabilities  https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant-apps
  • 19. Get Apple’s data on you • https://www.cnbc.com/2018/04/25/how-to-download-a-copy-of-apple- data-about-me.html
  • 20. Since We’re on the Subject Big Data is Everywhere…
  • 21. Further Reading • https://www.prnewswire.com/news-releases/lookout-report-84-of-it- executives-expect-data-accessed-on-mobile-to-cause-gdpr- violations-300555381.html • https://techbeacon.com/15-steps-developing-eu-privacy-policy-compliant- apps • http://europa.eu/rapid/press-release_IP-15-6321_en.htm • https://www.schneier.com/blog/archives/2018/03/greykey_iphone_.html • https://www.wsj.com/articles/how-europes-new-privacy-rules-favor-google- and-facebook-1524536324