You Have Little Control With Smartphone App Privacy - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile
Commentary
12/20/2010
12:08 AM
Ed Hansberry
Ed Hansberry
Commentary
50%
50%

You Have Little Control With Smartphone App Privacy

People often go to great lengths on their PC to maintain some level of privacy but those options are rarely available on smartphones. What's worse is smartphone apps usually work best when connected, so tend to share more personal data than a PC app ever would.

People often go to great lengths on their PC to maintain some level of privacy but those options are rarely available on smartphones. What's worse is smartphone apps usually work best when connected, so tend to share more personal data than a PC app ever would.Users on a PC have access to firewalls, cookie blockers and rich browser settings that can aid them in remaining at least somewhat anonymous, though everyone should know once you connect your machine to the internet, you lose total anonymity immediately.

Smartphones, however, don't have those same tools. Even if they did, they wouldn't really help. For example, a firewall that blocked an app from phoning home would likely render the app useless as so many apps are dependant on online connections that connect to their home server. Think Facebook, Pandora, Twitter, 4Square and more.

The Wall Street Journal has analyzed 101 Android and iPhone apps and found that 56 of them transmitted the unique device ID of the phone back to various companies, including those that specialize in advertising. Pandora was one of the worst.

Testers found that Pandora sent information to eight different tracking companies. It sent the phone's location to seven of them, the device's ID to three of them and demographic data to two of them. Do you recall giving Pandora permission to do that? No? I didn't think so.

Even apps that shouldn't require much if any online access share information. Bejeweled 2 sends your user ID and password back to the application creator and the same info plus your phone number to third parties.

Don't count on Apple or Google to monitor this for you. Apple contends that apps cannot send user data without the user's express permission, but when confronted with these apparent violations, Apple clammed up. Google took the approach that if you don't want to let an app send data about you, just don't install the app.

For a detailed report on what the 56 apps disclose, see this page. Will that cause you to uninstall any of those apps, or not buy them in the first place?

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Slideshows
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
Commentary
Preparing for the Upcoming Quantum Computing Revolution
John Edwards, Technology Journalist & Author,  6/3/2021
News
How SolarWinds Changed Cybersecurity Leadership's Priorities
Jessica Davis, Senior Editor, Enterprise Apps,  5/26/2021
White Papers
Register for InformationWeek Newsletters
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll