SlideShare a Scribd company logo
App Privacy
   Larry Magid
   Co-director,
 ConnectSafely.org

      Founder
    SafeKids.com

Revised: Feb 26, 2012
More than a million apps
As of February, 2012
•     500,000 iPhone/iPad apps
•     382,000 Android apps
•     Around 500,000 Facebook apps

Almost all from “third parties” (other than
Apple/Facebook or Google)
Apps can be all powerful
• An “app” is a piece of software that can do practically anything that
  it’s programmed to do

• While not necessarily for evil purposes apps, in theory, can:
  – Control your device and access anything on it
  – Access your contact list
  – Know & even share your location
  – Record incoming and outgoing text messages
  – Track incoming & outgoing calls
  – Send text messages & make calls from your account
  – Trace web sites visited
  – Post to your Facebook or Twitter account
  – Anything you do with your phone can be recorded by an app

   But they’re not supposed to do any of these things without permission
Guidelines are a start



• Facebook and Apple have guidelines & rules about
  app privacy, but can they really police thousands of
  app developers?
• Revelations about apps uploading user data to
  servers may be the tip of the iceberg
Reviews and Ratings
                               • App stores offer user reviews
                                 and ratings
                               • They’re not perfect but they give
                                 you a sense of what others
                                 think.
                                 – Look for apps with lots of reviews
                                   & high ratings
                               • Use a search engine to research
Apple App Store provides
ratings and user reviews but     apps or review sites like
you have to scroll down to
see them                         AppReviews
Only Install “Reputable” Apps
• Download from legitimate app stores - Apple,
  Android & Amazon
• Read reviews & ratings in App store or marketplace
• Search for info about apps
• Look at what permissions they’re asking for
Pay Careful Attention to “Permissions”

Apps will typically ask you permission before running
for things like:
   – Uploading your contact information
   – Tracking your location
   – Posting to your Facebook or Twitter account


Does the the app really needs this information to serve
you? If not, don’t install it
Be especially careful about:
• Apps that disclose your location
• Apps that access your contact list
• Apps that send photos to others




                                              One of many apps that
                                              share your location with
                                              friends or others

 Pay close attention to permissions such as
 uploading your contacts or disclosing your
 location
And Don’t Forget To
• Understand the privacy settings of your mobile
  operating system
• Look for age or content rating on any apps for kids
• Lock (PIN protect) your phone
Privacy Disclosure Agreement
On February 23, 2012 California’s Attorney General
announced a deal with Apple, Google, Microsoft & others
to require app developers to disclose their privacy policies
before users download them. This should benefit users
throughout the world
“Consumer Privacy Bill of Rights”
  On February 23, 2012 The Obama Administration weighed-in with
  its “Consumer Data Privacy in the Networked World” report & “Bill
  of Rights” giving consumers the right to:

  •   Individual Control
  •   Transparency
       – Easily understandable
  •   Respect for Context
       – Companies will collect, use & disclose in context of how data
           is to be used
  •   Security
  •   Access and Accuracy
       – Right to access our own data
  •   Focused Collection
       – Reasonable limits on data that companies collect and retain
  •   Accountability
       – Companies accountable to enforcement authorities
Thank you!
      Larry Magid
larry@connectsafely.org

More Related Content

What's hot

OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber SecurityKushantha Gunawardana
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationGriffin LaFleur
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingRob Ragan
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?John Wallix
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspectiveMohammad Ibrahim Fheili
 

What's hot (18)

OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 

Similar to App Privacy

App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25Gary Yentin
 
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law LessonBrands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law LessonBrian Heidelberger
 
Rooftop Overview
Rooftop OverviewRooftop Overview
Rooftop OverviewRooftop
 
9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing Elements9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing ElementsVarun Gambhir
 
Insights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and MonetizationInsights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and MonetizationJayneel Patel
 
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...bogwonch
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stackNexgate
 
Mobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticedMobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticedScott Hague
 
Deep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemDeep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemTUNE
 
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategies#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategiesJennifer Wong
 
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital ProductsUCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital ProductsNiall Roche
 
Introducing the Portability Policy
Introducing the Portability PolicyIntroducing the Portability Policy
Introducing the Portability PolicyPhil Wolff
 
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth DayThe Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth DayOMN
 
The ten commandments of app marketing
The ten commandments of app marketingThe ten commandments of app marketing
The ten commandments of app marketingBig Ideas Machine
 
Angellist Deck
Angellist DeckAngellist Deck
Angellist DeckMara Lewis
 
App testing and publishing
App testing and publishingApp testing and publishing
App testing and publishingNiall Roche
 

Similar to App Privacy (20)

AppTo
AppToAppTo
AppTo
 
App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25App Promo Android Toronto Session 10/25
App Promo Android Toronto Session 10/25
 
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law LessonBrands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
Brands Using Apps - What You Legally Need to Know - Ad Age Mini Law Lesson
 
Rooftop Overview
Rooftop OverviewRooftop Overview
Rooftop Overview
 
9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing Elements9 Key Mobile App Marketing Elements
9 Key Mobile App Marketing Elements
 
Insights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and MonetizationInsights on Android App Development, Marketing and Monetization
Insights on Android App Development, Marketing and Monetization
 
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
IFIP Summer School 2015 - Using Authorization Logic to Capture User Policies ...
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stack
 
Mobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticedMobile Healthcare Apps: 7 things to remember to get your app noticed
Mobile Healthcare Apps: 7 things to remember to get your app noticed
 
Deep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemDeep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystem
 
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategies#CMOUS Staying ahead on mobile - challenges, measurement and strategies
#CMOUS Staying ahead on mobile - challenges, measurement and strategies
 
Introduction to App Stores
Introduction to App StoresIntroduction to App Stores
Introduction to App Stores
 
You installed what Thierry Sans
You installed what  Thierry SansYou installed what  Thierry Sans
You installed what Thierry Sans
 
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital ProductsUCL M.Sc. Technology Entrepreneurship 2015 -  Launching Digital Products
UCL M.Sc. Technology Entrepreneurship 2015 - Launching Digital Products
 
Introducing the Portability Policy
Introducing the Portability PolicyIntroducing the Portability Policy
Introducing the Portability Policy
 
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth DayThe Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
The Ten Commandments of App Marketing - Big Ideas Machine at Digital Growth Day
 
The ten commandments of app marketing
The ten commandments of app marketingThe ten commandments of app marketing
The ten commandments of app marketing
 
Mining apps for anomalies
Mining apps for anomaliesMining apps for anomalies
Mining apps for anomalies
 
Angellist Deck
Angellist DeckAngellist Deck
Angellist Deck
 
App testing and publishing
App testing and publishingApp testing and publishing
App testing and publishing
 

More from ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

More from ConnectSafely (16)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 

App Privacy

  • 1. App Privacy Larry Magid Co-director, ConnectSafely.org Founder SafeKids.com Revised: Feb 26, 2012
  • 2. More than a million apps As of February, 2012 • 500,000 iPhone/iPad apps • 382,000 Android apps • Around 500,000 Facebook apps Almost all from “third parties” (other than Apple/Facebook or Google)
  • 3. Apps can be all powerful • An “app” is a piece of software that can do practically anything that it’s programmed to do • While not necessarily for evil purposes apps, in theory, can: – Control your device and access anything on it – Access your contact list – Know & even share your location – Record incoming and outgoing text messages – Track incoming & outgoing calls – Send text messages & make calls from your account – Trace web sites visited – Post to your Facebook or Twitter account – Anything you do with your phone can be recorded by an app But they’re not supposed to do any of these things without permission
  • 4. Guidelines are a start • Facebook and Apple have guidelines & rules about app privacy, but can they really police thousands of app developers? • Revelations about apps uploading user data to servers may be the tip of the iceberg
  • 5. Reviews and Ratings • App stores offer user reviews and ratings • They’re not perfect but they give you a sense of what others think. – Look for apps with lots of reviews & high ratings • Use a search engine to research Apple App Store provides ratings and user reviews but apps or review sites like you have to scroll down to see them AppReviews
  • 6. Only Install “Reputable” Apps • Download from legitimate app stores - Apple, Android & Amazon • Read reviews & ratings in App store or marketplace • Search for info about apps • Look at what permissions they’re asking for
  • 7. Pay Careful Attention to “Permissions” Apps will typically ask you permission before running for things like: – Uploading your contact information – Tracking your location – Posting to your Facebook or Twitter account Does the the app really needs this information to serve you? If not, don’t install it
  • 8. Be especially careful about: • Apps that disclose your location • Apps that access your contact list • Apps that send photos to others One of many apps that share your location with friends or others Pay close attention to permissions such as uploading your contacts or disclosing your location
  • 9. And Don’t Forget To • Understand the privacy settings of your mobile operating system • Look for age or content rating on any apps for kids • Lock (PIN protect) your phone
  • 10. Privacy Disclosure Agreement On February 23, 2012 California’s Attorney General announced a deal with Apple, Google, Microsoft & others to require app developers to disclose their privacy policies before users download them. This should benefit users throughout the world
  • 11. “Consumer Privacy Bill of Rights” On February 23, 2012 The Obama Administration weighed-in with its “Consumer Data Privacy in the Networked World” report & “Bill of Rights” giving consumers the right to: • Individual Control • Transparency – Easily understandable • Respect for Context – Companies will collect, use & disclose in context of how data is to be used • Security • Access and Accuracy – Right to access our own data • Focused Collection – Reasonable limits on data that companies collect and retain • Accountability – Companies accountable to enforcement authorities
  • 12. Thank you! Larry Magid larry@connectsafely.org