The meteoric rise of apps—a business that barely existed 10 years ago but now dominates daily life and conversation—is here to stay. Entire businesses now revolve around them and fortunes have been made on them.
As useful and entertaining as apps have become, so fully integrated into our daily lives that we now can’t imagine functioning without them, users need to be weary of their full capabilities. Our age, interests, purchasing habits, frequented locations, health, and social maps are all up for grabs by developers. This invaluable information creates our digital shadow, which can be packaged and sold to the highest bidder.
According to Me and My Shadow, “When we use digital services through our laptops or mobile phones, we actively and/or passively leave digital traces. On a daily basis, we might browse the Internet, access news websites, rant on Twitter, post photos on Facebook, comment under YouTube videos, publish blog posts, receive phone calls or send SMS messages. In some cases, our data is collected without our knowledge or consent – like when our browsing habits and IP address are collected while we visit a website. In other cases, we choose to hand over our data to third parties – when we share photos on Facebook, or book a flight ticket, for example. Through all such activity, we leave digital traces which result in the creation of our digital shadow.”
It’s tempting to download the fast-food restaurant app to make ordering ahead easy. But knowing exactly what data that app is collecting, however, isn’t. That’s because many apps engage in irresponsible practices. Once you know how to identify them, you can decide which apps are worth an invasion of privacy – and which aren’t.
Often, apps collect way more information than is necessary – and sometimes share or sell it. Consider the curious case of flashlight apps. It would seem, at least at the first glance, that they exist for a sole purpose: to turn on the LED flash of mobile phones. But surprisingly, many have access to a lot of unnecessary data and phone functions, including your calendars, location and camera.
Such apps that inexplicably request access to your personal photos, camera, location service, camera or microphone usually do so for less-than-helpful reasons, so users are warned to be wary.
In fact, in response to such practices, Google now plans to remove apps that handle personal or sensitive data from the Google Play Store if they don’t have privacy policies.
In 2014, the Starbucks app was discovered to be storing passwords, email address, and previous GPS information unencrypted, leaving it exposed. Starbucks addressed the vulnerability shortly thereafter – but it was far from the only app to have faced this issue.
Facebook is another power player that has found a way to access users’ information – even when they don’t have the Facebook app. While users can still access Facebook from their mobile browser, they are required to download the Messenger app for it to have any functionality – thus circumventing the need for users to even download the Facebook app itself. As The Guardian explained, “The real reason that Facebook is pushing chat into its Messenger is to create another platform or silo from which Facebook can access you as a user.”
Even the perhaps lesser-known ‘The Brightest Flashlight’ app, for example, shared its users’ exact location and device ID with third parties – without disclosing it – and was charged by the Federal Trade Commission in 2013. But that’s not often the case.
For all their perceived convenience, it may feel understandably hopeless when it comes to having apps and privacy protection, too. But it is possible to take control of yourinformation. The FTC offers a host of information on how you can protect yourself from data collection, and here are four simple steps to help you maintain your digital autonomy.
The modern conveniences of the digital age have made astounding strides in how we learn, travel, eat, stay healthy, entertain ourselves, stay connected – and more. But such conveniences come at a cost. With a little research and a few simple steps, you can take control of your data, cybersecurity and privacy online when using mobile apps.
About Gary Weisenborn
Author’s Bio: Gary Weisenborn is the Chief Information Officer for Vector Solutions. He is responsible for managing the Company’s technology systems and operations. Weisenborn has several years of leadership experience as a senior IT executive, CIO and head of product development with MCI, Verizon (Bell Atlantic), ADP, Convergys and Syniverse Technologies.
Read the full story here.