SlideShare a Scribd company logo
1 of 12
App Privacy
   Larry Magid
   Co-director,
 ConnectSafely.org

      Founder
    SafeKids.com

Revised: Feb 26, 2012
More than a million apps
As of February, 2012
•     500,000 iPhone/iPad apps
•     382,000 Android apps
•     Around 500,000 Facebook apps

Almost all from “third parties” (other than
Apple/Facebook or Google)
Apps can be all powerful
• An “app” is a piece of software that can do practically anything that
  it’s programmed to do

• While not necessarily for evil purposes apps, in theory, can:
  – Control your device and access anything on it
  – Access your contact list
  – Know & even share your location
  – Record incoming and outgoing text messages
  – Track incoming & outgoing calls
  – Send text messages & make calls from your account
  – Trace web sites visited
  – Post to your Facebook or Twitter account
  – Anything you do with your phone can be recorded by an app

   But they’re not supposed to do any of these things without permission
Guidelines are a start



• Facebook and Apple have guidelines & rules about
  app privacy, but can they really police thousands of
  app developers?
• Revelations about apps uploading user data to
  servers may be the tip of the iceberg
Reviews and Ratings
                               • App stores offer user reviews
                                 and ratings
                               • They’re not perfect but they give
                                 you a sense of what others
                                 think.
                                 – Look for apps with lots of reviews
                                   & high ratings
                               • Use a search engine to research
Apple App Store provides
ratings and user reviews but     apps or review sites like
you have to scroll down to
see them                         AppReviews
Only Install “Reputable” Apps
• Download from legitimate app stores - Apple,
  Android & Amazon
• Read reviews & ratings in App store or marketplace
• Search for info about apps
• Look at what permissions they’re asking for
Pay Careful Attention to “Permissions”

Apps will typically ask you permission before running
for things like:
   – Uploading your contact information
   – Tracking your location
   – Posting to your Facebook or Twitter account


Does the the app really needs this information to serve
you? If not, don’t install it
Be especially careful about:
• Apps that disclose your location
• Apps that access your contact list
• Apps that send photos to others




                                              One of many apps that
                                              share your location with
                                              friends or others

 Pay close attention to permissions such as
 uploading your contacts or disclosing your
 location
And Don’t Forget To
• Understand the privacy settings of your mobile
  operating system
• Look for age or content rating on any apps for kids
• Lock (PIN protect) your phone
Privacy Disclosure Agreement
On February 23, 2012 California’s Attorney General
announced a deal with Apple, Google, Microsoft & others
to require app developers to disclose their privacy policies
before users download them. This should benefit users
throughout the world
“Consumer Privacy Bill of Rights”
  On February 23, 2012 The Obama Administration weighed-in with
  its “Consumer Data Privacy in the Networked World” report & “Bill
  of Rights” giving consumers the right to:

  •   Individual Control
  •   Transparency
       – Easily understandable
  •   Respect for Context
       – Companies will collect, use & disclose in context of how data
           is to be used
  •   Security
  •   Access and Accuracy
       – Right to access our own data
  •   Focused Collection
       – Reasonable limits on data that companies collect and retain
  •   Accountability
       – Companies accountable to enforcement authorities
Thank you!
      Larry Magid
larry@connectsafely.org

More Related Content

What's hot

OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber SecurityKushantha Gunawardana
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationGriffin LaFleur
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingRob Ragan
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?John Wallix
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspectiveMohammad Ibrahim Fheili
 

What's hot (18)

OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 

Similar to App Privacy

App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25Gary Yentin
 
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law LessonBrands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law LessonBrian Heidelberger
 
Rooftop Overview
Rooftop OverviewRooftop Overview
Rooftop OverviewRooftop
 
9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing Elements9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing ElementsVarun Gambhir
 
Insights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and MonetizationInsights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and MonetizationJayneel Patel
 
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...bogwonch
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stackNexgate
 
Mobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticedMobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticedScott Hague
 
Deep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemDeep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemTUNE
 
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategies#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategiesJennifer Wong
 
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital ProductsUCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital ProductsNiall Roche
 
Introducing the Portability Policy
Introducing the Portability PolicyIntroducing the Portability Policy
Introducing the Portability PolicyPhil Wolff
 
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth DayThe Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth DayOMN
 
The ten commandments of app marketing
The ten commandments of app marketingThe ten commandments of app marketing
The ten commandments of app marketingBig Ideas Machine
 
Angellist Deck
Angellist DeckAngellist Deck
Angellist DeckMara Lewis
 
App testing and publishing
App testing and publishingApp testing and publishing
App testing and publishingNiall Roche
 

Similar to App Privacy (20)

AppTo
AppToAppTo
AppTo
 
App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25
 
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law LessonBrands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
 
Rooftop Overview
Rooftop OverviewRooftop Overview
Rooftop Overview
 
9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing Elements9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing Elements
 
Insights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and MonetizationInsights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and Monetization
 
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stack
 
Mobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticedMobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticed
 
Deep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemDeep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystem
 
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategies#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
 
Introduction to App Stores
Introduction to App StoresIntroduction to App Stores
Introduction to App Stores
 
You installed what Thierry Sans
You installed what  Thierry SansYou installed what  Thierry Sans
You installed what Thierry Sans
 
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital ProductsUCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
 
Introducing the Portability Policy
Introducing the Portability PolicyIntroducing the Portability Policy
Introducing the Portability Policy
 
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth DayThe Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
 
The ten commandments of app marketing
The ten commandments of app marketingThe ten commandments of app marketing
The ten commandments of app marketing
 
Mining apps for anomalies
Mining apps for anomaliesMining apps for anomalies
Mining apps for anomalies
 
Angellist Deck
Angellist DeckAngellist Deck
Angellist Deck
 
App testing and publishing
App testing and publishingApp testing and publishing
App testing and publishing
 

More from ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

More from ConnectSafely (16)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

App Privacy

  • 1. App Privacy Larry Magid Co-director, ConnectSafely.org Founder SafeKids.com Revised: Feb 26, 2012
  • 2. More than a million apps As of February, 2012 • 500,000 iPhone/iPad apps • 382,000 Android apps • Around 500,000 Facebook apps Almost all from “third parties” (other than Apple/Facebook or Google)
  • 3. Apps can be all powerful • An “app” is a piece of software that can do practically anything that it’s programmed to do • While not necessarily for evil purposes apps, in theory, can: – Control your device and access anything on it – Access your contact list – Know & even share your location – Record incoming and outgoing text messages – Track incoming & outgoing calls – Send text messages & make calls from your account – Trace web sites visited – Post to your Facebook or Twitter account – Anything you do with your phone can be recorded by an app But they’re not supposed to do any of these things without permission
  • 4. Guidelines are a start • Facebook and Apple have guidelines & rules about app privacy, but can they really police thousands of app developers? • Revelations about apps uploading user data to servers may be the tip of the iceberg
  • 5. Reviews and Ratings • App stores offer user reviews and ratings • They’re not perfect but they give you a sense of what others think. – Look for apps with lots of reviews & high ratings • Use a search engine to research Apple App Store provides ratings and user reviews but apps or review sites like you have to scroll down to see them AppReviews
  • 6. Only Install “Reputable” Apps • Download from legitimate app stores - Apple, Android & Amazon • Read reviews & ratings in App store or marketplace • Search for info about apps • Look at what permissions they’re asking for
  • 7. Pay Careful Attention to “Permissions” Apps will typically ask you permission before running for things like: – Uploading your contact information – Tracking your location – Posting to your Facebook or Twitter account Does the the app really needs this information to serve you? If not, don’t install it
  • 8. Be especially careful about: • Apps that disclose your location • Apps that access your contact list • Apps that send photos to others One of many apps that share your location with friends or others Pay close attention to permissions such as uploading your contacts or disclosing your location
  • 9. And Don’t Forget To • Understand the privacy settings of your mobile operating system • Look for age or content rating on any apps for kids • Lock (PIN protect) your phone
  • 10. Privacy Disclosure Agreement On February 23, 2012 California’s Attorney General announced a deal with Apple, Google, Microsoft & others to require app developers to disclose their privacy policies before users download them. This should benefit users throughout the world
  • 11. “Consumer Privacy Bill of Rights” On February 23, 2012 The Obama Administration weighed-in with its “Consumer Data Privacy in the Networked World” report & “Bill of Rights” giving consumers the right to: • Individual Control • Transparency – Easily understandable • Respect for Context – Companies will collect, use & disclose in context of how data is to be used • Security • Access and Accuracy – Right to access our own data • Focused Collection – Reasonable limits on data that companies collect and retain • Accountability – Companies accountable to enforcement authorities
  • 12. Thank you! Larry Magid larry@connectsafely.org