Privacy Protections for Mobile App Users Pledged By Vendors
The Attorney General of California is working with major mobile-app movers and shakers to ensure end-user privacy is respected.
California's Attorney General, Kamala D. Harris, is working with six major players in the mobile applications market to create a set of privacy-protection standards for users of smartphone apps.
In turn, there will also be a push to educate app developers who write for the platforms about how to respect user privacy and how to handle information gathered from users. App developers that fail to comply with the law could be prosecuted under California laws governing unfair competition and false advertising.
A recent FTC report entitled "Mobile Apps Are Disappointing" expressed dismay at how little respect for privacy there was amongst apps that were created for and marketed to children. They cited not just the breadth of data that can be automatically collected from phones that run apps--geolocation, call histories, contact lists, etc.--but how unclear it was what any given app might be doing with that information, or where to find out such things.
The FTC report made recommendations similar to what was agreed upon by Harris and the six companies in question: that app stores and developers should provide more detailed information about data practices.
What's more, the report also noted that the policy should be written in the plainest possible language, and in ways that are particularly suited to mobile devices with small screens. A footnote that is nominally visible on a web page might well vanish on a cellphone's smaller screen, so mobile users may need a different way of being notified effectively.
Online privacy issues remain a constant concern, with each season bringing a new wrinkle to the issue. Most recently, Google was recently chastised for allegedly bypassing privacy settings on the Safari web browser by exploiting a bug in said browser. Google claims that was a mischaracterization of what happened, and that they were simply using a known workaround to allow signed-in Google users access to certain Google-specific features like the "+1" button.
The vagaries of who is responsible and to what extent make it clear that proper protection of end-user privacy--regardless of the law's specific wording about it--requires a more all-hands-on-deck approach. The sheer number of parties involved in mobile apps ensure it: the app makers, the providers of services, the handset manufacturers, the carriers, and the end users. Harris's attempts to bring many major players to the same table is a step in the right direction, but still only one step.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.