All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1007609",
"signature": "Article:1007609",
"url": "https://staging.dailymaverick.co.za/article/2021-08-12-the-privacy-by-design-approach-for-mobile-apps-why-its-not-enough/",
"shorturl": "https://staging.dailymaverick.co.za/article/1007609",
"slug": "the-privacy-by-design-approach-for-mobile-apps-why-its-not-enough",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "The ‘privacy by design’ approach for mobile apps: why it’s not enough",
"firstPublished": "2021-08-12 23:00:28",
"lastUpdate": "2021-08-12 23:00:28",
"categories": [
{
"id": "1215",
"name": "Magazine",
"signature": "Category:1215",
"slug": "magazine",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/magazine/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "1825",
"name": "Maverick Life",
"signature": "Category:1825",
"slug": "maverick-life",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-life/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 7031,
"contents": "<a href=\"https://theconversation.com/the-privacy-by-design-approach-for-mobile-apps-why-its-not-enough-164090\"><i><span style=\"font-weight: 400;\">This story was first published in </span></i><span style=\"font-weight: 400;\">The Conversation.</span></a>\r\n\r\n<span style=\"font-weight: 400;\">The consent model on which privacy laws are based doesn’t work. App users remain concerned about privacy, as a recent </span><a href=\"https://www.yellowbrick.com/press-releases/yellowbrick-survey-pandemic-era-consumers-love-apps-but-have-security-concerns/\"><span style=\"font-weight: 400;\">survey</span></a><span style=\"font-weight: 400;\"> shows, but they still aren’t very good at protecting it. They may lack the technical know-how or the time to review privacy terms, or they may lack the willpower to resist the lure of trending apps and personalised in-app offers.</span>\r\n\r\n<span style=\"font-weight: 400;\">As a result privacy laws have become more detailed, imposing additional requirements about notice, data minimisation, and user rights. Penalties have become harsher. And the laws are often global in reach, such as the </span><a href=\"https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule\"><span style=\"font-weight: 400;\">US Children’s Online Privacy Protection Rule</span></a><span style=\"font-weight: 400;\"> and the EU’s </span><a href=\"https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679\"><span style=\"font-weight: 400;\">General Data Protection Regulation</span></a><span style=\"font-weight: 400;\">. For instance, a South African developer of an app downloaded by children in the US and the EU must comply with both and with </span><a href=\"https://www.gov.za/documents/protection-personal-information-act#:%7E:text=The%20Protection%20of%20Personal%20Information,by%20public%20and%20private%20bodies%3B&text=to%20regulate%20the%20flow%20of,provide%20for%20matters%20connected%20therewith.\"><span style=\"font-weight: 400;\">South Africa’s Protection of Personal Information Act</span></a><span style=\"font-weight: 400;\">. This complexity can create a significant compliance burden.</span>\r\n\r\n<span style=\"font-weight: 400;\">But the real problem, according to a </span><a href=\"https://www.enisa.europa.eu/publications/privacy-and-data-protection-in-mobile-applications\"><span style=\"font-weight: 400;\">report</span></a><span style=\"font-weight: 400;\"> by the EU Agency for Cybersecurity, is that lawyers and app developers don’t speak the same language. An app developer may have no idea how to translate abstract legal principles into concrete engineering steps.</span>\r\n\r\n<span style=\"font-weight: 400;\">As a result regulators have looked to the concept of </span><a href=\"https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf\"><span style=\"font-weight: 400;\">“privacy by design”</span></a><span style=\"font-weight: 400;\"> as a way to bridge this divide. The concept was coined in the late 1990s by Ann Cavoukian when she was the Information and Privacy Commissioner for Ontario, Canada. Privacy by design goes beyond privacy policies and in-app permission settings. It requires developers to think about privacy from the first moment of the design process.</span>\r\n\r\n<span style=\"font-weight: 400;\">Cavoukian set out seven foundational principles for a privacy by design approach. But it is the second principle, “privacy as a default setting”, that really sets the bar for a privacy-friendly app.</span>\r\n\r\n<span style=\"font-weight: 400;\">Build in the maximum degree of privacy into the default settings for any system or business practice. Doing so will keep a user’s privacy intact, even if they choose to do nothing.</span>\r\n\r\n<span style=\"font-weight: 400;\">This places the responsibility on the app developer to think about the user’s privacy upfront, and design the app in such a way that privacy is protected automatically, while still offering a fully functional app experience.</span>\r\n\r\n<span style=\"font-weight: 400;\">But </span><a href=\"https://researchspace.ukzn.ac.za/xmlui/handle/10413/19431\"><span style=\"font-weight: 400;\">my research</span></a><span style=\"font-weight: 400;\"> showed that design decisions made by app developers are constrained by existing technologies and platform rules designed by others. These include the device hardware and operating system, the software development kit, ad libraries and app store review policies.</span>\r\n\r\n<span style=\"font-weight: 400;\">The answer is </span><a href=\"https://iapp.org/resources/article/06-22-2012-privacy-by-redesign-a-practical-framework-for-implementation/\"><span style=\"font-weight: 400;\">privacy by (re)design</span></a><span style=\"font-weight: 400;\">, where all role players in the ecosystem take privacy seriously and redesign existing platforms and technologies. But enforcing that approach will require tighter legal regulation of third party data sharing.</span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-1007611\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2021/08/hacker-1944688_1280.jpeg\" alt=\"\" width=\"1280\" height=\"853\" /> Image: madartzgraphics / Pixabay</p>\r\n\r\n<b>Change of mindset</b>\r\n\r\n<span style=\"font-weight: 400;\">Applying a privacy by design approach requires a change of mindset by developers. They must be proactive, rather than responding after the fact to a data breach that could have been prevented. The days of collecting as much personal data as possible in the hope that it might prove valuable later are gone. Developers must align data collection to a specific purpose for which the data is needed and communicate that to app users. They should also anonymise or delete the data as soon as possible.</span>\r\n\r\n<span style=\"font-weight: 400;\">Privacy should become a key component of design methodology, selection of technical tools, and organisational value statements.</span>\r\n\r\n<span style=\"font-weight: 400;\">These are important changes, endorsed in guidelines for mobile app developers published by the </span><a href=\"https://iapp.org/media/pdf/resource_center/gsmaprivacydesignguidelinesformobileapplicationdevelopmentv1%20%281%29.pdf\"><span style=\"font-weight: 400;\">Global System for Mobile Communications</span></a><span style=\"font-weight: 400;\"> and by regulators in the </span><a href=\"https://www.ftc.gov/sites/default/files/documents/public_statements/privacy-design-and-new-privacy-framework-u.s.federal-trade-commission/120613privacydesign.pdf\"><span style=\"font-weight: 400;\">US</span></a><span style=\"font-weight: 400;\">, the </span><a href=\"https://ico.org.uk/media/for-organisations/documents/1596/privacy-in-mobile-apps-dp-guidance.pdf\"><span style=\"font-weight: 400;\">UK</span></a><span style=\"font-weight: 400;\">, </span><a href=\"https://www.oaic.gov.au/privacy/guidance-and-advice/mobile-privacy-a-better-practice-guide-for-mobile-app-developers/\"><span style=\"font-weight: 400;\">Australia</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://www.ipc.on.ca/wp-content/uploads/Resources/pbd-asu-mobile.pdf\"><span style=\"font-weight: 400;\">Canada</span></a><span style=\"font-weight: 400;\">, among others. In the EU “data protection by design and by default” is now </span><a href=\"https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679\"><span style=\"font-weight: 400;\">a legal obligation</span></a><span style=\"font-weight: 400;\"> of the General Data Protection Regulation.</span>\r\n\r\n<span style=\"font-weight: 400;\">But, as my research shows, this might not be enough without the redesign of the app ecosystem to address data sharing, a view supported by other research. According to </span><a href=\"https://dl.acm.org/doi/10.1145/3201064.3201089\"><span style=\"font-weight: 400;\">one study</span></a><span style=\"font-weight: 400;\"> most apps transmit data directly to third parties, like Google, Facebook and ad exchanges, via trackers embedded in the app code. But I found that privacy laws do not comprehensively or consistently address this third party sharing.</span>\r\n\r\n<span style=\"font-weight: 400;\">The term “third party” is not defined in the Protection of Personal Information Act, but would include ad networks, content-sharing sites and social networking platforms. Third parties are thus distinguished from downstream processors who may perform specified data processing on your behalf under a contract.</span>\r\n\r\n<span style=\"font-weight: 400;\">It is difficult to enforce legal liability against these third parties, who are often outside the country where the app was developed. Their terms and conditions typically place full responsibility for privacy compliance by the app on the app developer. This may leave app users unprotected. But it could also expose the app developer to unforeseen legal liability.</span>\r\n\r\n<span style=\"font-weight: 400;\">Liability for the app developer arises because under both the Protection of Personal Information Act and General Data Protection Regulation if you played a role in determining “the purpose or means” of data processing you are a “joint” responsible party (data controller) for the data processed by the third party.</span>\r\n\r\n<span style=\"font-weight: 400;\">The European Court of Justice has twice held small businesses liable as “joint controllers” for Facebook’s collection of data, via a </span><a href=\"https://curia.europa.eu/juris/liste.jsf?num=C-210/16\"><span style=\"font-weight: 400;\">fan page</span></a><span style=\"font-weight: 400;\"> and a </span><a href=\"https://curia.europa.eu/juris/liste.jsf?num=C-40/17\"><span style=\"font-weight: 400;\">like</span></a><span style=\"font-weight: 400;\"> button. Although the judgments stress that joint control is not necessarily “equal liability”, this should still be a concern for app developers.</span>\r\n\r\n<span style=\"font-weight: 400;\">For example, app developers using the Facebook Software Development Kit are sharing personal data with Facebook. Event logs such as “app installed”, “SDK initialised” and “app deactivated” give detailed demographic and behavioural insights about an app user. In 2018 Privacy International </span><a href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\"><span style=\"font-weight: 400;\">reported</span></a><span style=\"font-weight: 400;\"> that the setting to delay transmission of logged events until after the user has consented was only added by Facebook 35 days after General Data Protection Regulation came into force, and then only if enabled by the developer for SDK version 4.34 or higher. This change appears to have followed repeated bug reports filed on the developer’s platform.</span>\r\n\r\n<b>Take aways</b>\r\n\r\n<span style=\"font-weight: 400;\">The takeaway here for developers following a privacy by design approach is to “</span><a href=\"https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf\"><span style=\"font-weight: 400;\">trust but verify</span></a><span style=\"font-weight: 400;\">”:</span>\r\n<ul>\r\n \t<li>Check contract terms and third party code carefully;</li>\r\n \t<li>Monitor developer platforms for security and privacy updates;</li>\r\n \t<li>Only work with organisations that offer adequate privacy guarantees;</li>\r\n \t<li>Notify your users about data transfers to third parties and provide easy to use privacy controls.</li>\r\n \t<li>Keep logs so that you can respond promptly if an app user requests details of the personal data you hold and the recipients (or categories of recipients) of that data.</li>\r\n</ul>\r\n<span style=\"font-weight: 400;\">Prosecuting app developers who breach data laws is important but not enough. Ultimately the parties who design the technologies and platforms on which mobile apps are built and marketed must be brought within the legal accountability framework to close the privacy loop. </span><b>DM/ML <iframe src=\"https://counter.theconversation.com/content/164090/count.gif?distributor=republish-lightbox-advanced\" width=\"1\" height=\"1\"></iframe></b>",
"teaser": "The ‘privacy by design’ approach for mobile apps: why it’s not enough",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "240787",
"name": "Dusty-Lee Donnelly",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/dusty-lee-donnelly/",
"editorialName": "dusty-lee-donnelly",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "8065",
"name": "Privacy law",
"url": "https://staging.dailymaverick.co.za/keyword/privacy-law/",
"slug": "privacy-law",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Privacy law",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12031",
"name": "Data",
"url": "https://staging.dailymaverick.co.za/keyword/data/",
"slug": "data",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Data",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "48857",
"name": "laws",
"url": "https://staging.dailymaverick.co.za/keyword/laws/",
"slug": "laws",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "laws",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "92089",
"name": "data privacy",
"url": "https://staging.dailymaverick.co.za/keyword/data-privacy/",
"slug": "data-privacy",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "data privacy",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "213248",
"name": "mobile data",
"url": "https://staging.dailymaverick.co.za/keyword/mobile-data/",
"slug": "mobile-data",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "mobile data",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348146",
"name": "privacy rights",
"url": "https://staging.dailymaverick.co.za/keyword/privacy-rights/",
"slug": "privacy-rights",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "privacy rights",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "357095",
"name": "Mobile apps",
"url": "https://staging.dailymaverick.co.za/keyword/mobile-apps/",
"slug": "mobile-apps",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Mobile apps",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "357096",
"name": "South Africa law",
"url": "https://staging.dailymaverick.co.za/keyword/south-africa-law/",
"slug": "south-africa-law",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "South Africa law",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "357097",
"name": "Cellphones",
"url": "https://staging.dailymaverick.co.za/keyword/cellphones/",
"slug": "cellphones",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cellphones",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "92562",
"name": "Image: madartzgraphics / Pixabay",
"description": "<a href=\"https://theconversation.com/the-privacy-by-design-approach-for-mobile-apps-why-its-not-enough-164090\"><i><span style=\"font-weight: 400;\">This story was first published in </span></i><span style=\"font-weight: 400;\">The Conversation.</span></a>\r\n\r\n<span style=\"font-weight: 400;\">The consent model on which privacy laws are based doesn’t work. App users remain concerned about privacy, as a recent </span><a href=\"https://www.yellowbrick.com/press-releases/yellowbrick-survey-pandemic-era-consumers-love-apps-but-have-security-concerns/\"><span style=\"font-weight: 400;\">survey</span></a><span style=\"font-weight: 400;\"> shows, but they still aren’t very good at protecting it. They may lack the technical know-how or the time to review privacy terms, or they may lack the willpower to resist the lure of trending apps and personalised in-app offers.</span>\r\n\r\n<span style=\"font-weight: 400;\">As a result privacy laws have become more detailed, imposing additional requirements about notice, data minimisation, and user rights. Penalties have become harsher. And the laws are often global in reach, such as the </span><a href=\"https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule\"><span style=\"font-weight: 400;\">US Children’s Online Privacy Protection Rule</span></a><span style=\"font-weight: 400;\"> and the EU’s </span><a href=\"https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679\"><span style=\"font-weight: 400;\">General Data Protection Regulation</span></a><span style=\"font-weight: 400;\">. For instance, a South African developer of an app downloaded by children in the US and the EU must comply with both and with </span><a href=\"https://www.gov.za/documents/protection-personal-information-act#:%7E:text=The%20Protection%20of%20Personal%20Information,by%20public%20and%20private%20bodies%3B&text=to%20regulate%20the%20flow%20of,provide%20for%20matters%20connected%20therewith.\"><span style=\"font-weight: 400;\">South Africa’s Protection of Personal Information Act</span></a><span style=\"font-weight: 400;\">. This complexity can create a significant compliance burden.</span>\r\n\r\n<span style=\"font-weight: 400;\">But the real problem, according to a </span><a href=\"https://www.enisa.europa.eu/publications/privacy-and-data-protection-in-mobile-applications\"><span style=\"font-weight: 400;\">report</span></a><span style=\"font-weight: 400;\"> by the EU Agency for Cybersecurity, is that lawyers and app developers don’t speak the same language. An app developer may have no idea how to translate abstract legal principles into concrete engineering steps.</span>\r\n\r\n<span style=\"font-weight: 400;\">As a result regulators have looked to the concept of </span><a href=\"https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf\"><span style=\"font-weight: 400;\">“privacy by design”</span></a><span style=\"font-weight: 400;\"> as a way to bridge this divide. The concept was coined in the late 1990s by Ann Cavoukian when she was the Information and Privacy Commissioner for Ontario, Canada. Privacy by design goes beyond privacy policies and in-app permission settings. It requires developers to think about privacy from the first moment of the design process.</span>\r\n\r\n<span style=\"font-weight: 400;\">Cavoukian set out seven foundational principles for a privacy by design approach. But it is the second principle, “privacy as a default setting”, that really sets the bar for a privacy-friendly app.</span>\r\n\r\n<span style=\"font-weight: 400;\">Build in the maximum degree of privacy into the default settings for any system or business practice. Doing so will keep a user’s privacy intact, even if they choose to do nothing.</span>\r\n\r\n<span style=\"font-weight: 400;\">This places the responsibility on the app developer to think about the user’s privacy upfront, and design the app in such a way that privacy is protected automatically, while still offering a fully functional app experience.</span>\r\n\r\n<span style=\"font-weight: 400;\">But </span><a href=\"https://researchspace.ukzn.ac.za/xmlui/handle/10413/19431\"><span style=\"font-weight: 400;\">my research</span></a><span style=\"font-weight: 400;\"> showed that design decisions made by app developers are constrained by existing technologies and platform rules designed by others. These include the device hardware and operating system, the software development kit, ad libraries and app store review policies.</span>\r\n\r\n<span style=\"font-weight: 400;\">The answer is </span><a href=\"https://iapp.org/resources/article/06-22-2012-privacy-by-redesign-a-practical-framework-for-implementation/\"><span style=\"font-weight: 400;\">privacy by (re)design</span></a><span style=\"font-weight: 400;\">, where all role players in the ecosystem take privacy seriously and redesign existing platforms and technologies. But enforcing that approach will require tighter legal regulation of third party data sharing.</span>\r\n\r\n[caption id=\"attachment_1007611\" align=\"aligncenter\" width=\"1280\"]<img class=\"size-full wp-image-1007611\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2021/08/hacker-1944688_1280.jpeg\" alt=\"\" width=\"1280\" height=\"853\" /> Image: madartzgraphics / Pixabay[/caption]\r\n\r\n<b>Change of mindset</b>\r\n\r\n<span style=\"font-weight: 400;\">Applying a privacy by design approach requires a change of mindset by developers. They must be proactive, rather than responding after the fact to a data breach that could have been prevented. The days of collecting as much personal data as possible in the hope that it might prove valuable later are gone. Developers must align data collection to a specific purpose for which the data is needed and communicate that to app users. They should also anonymise or delete the data as soon as possible.</span>\r\n\r\n<span style=\"font-weight: 400;\">Privacy should become a key component of design methodology, selection of technical tools, and organisational value statements.</span>\r\n\r\n<span style=\"font-weight: 400;\">These are important changes, endorsed in guidelines for mobile app developers published by the </span><a href=\"https://iapp.org/media/pdf/resource_center/gsmaprivacydesignguidelinesformobileapplicationdevelopmentv1%20%281%29.pdf\"><span style=\"font-weight: 400;\">Global System for Mobile Communications</span></a><span style=\"font-weight: 400;\"> and by regulators in the </span><a href=\"https://www.ftc.gov/sites/default/files/documents/public_statements/privacy-design-and-new-privacy-framework-u.s.federal-trade-commission/120613privacydesign.pdf\"><span style=\"font-weight: 400;\">US</span></a><span style=\"font-weight: 400;\">, the </span><a href=\"https://ico.org.uk/media/for-organisations/documents/1596/privacy-in-mobile-apps-dp-guidance.pdf\"><span style=\"font-weight: 400;\">UK</span></a><span style=\"font-weight: 400;\">, </span><a href=\"https://www.oaic.gov.au/privacy/guidance-and-advice/mobile-privacy-a-better-practice-guide-for-mobile-app-developers/\"><span style=\"font-weight: 400;\">Australia</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://www.ipc.on.ca/wp-content/uploads/Resources/pbd-asu-mobile.pdf\"><span style=\"font-weight: 400;\">Canada</span></a><span style=\"font-weight: 400;\">, among others. In the EU “data protection by design and by default” is now </span><a href=\"https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679\"><span style=\"font-weight: 400;\">a legal obligation</span></a><span style=\"font-weight: 400;\"> of the General Data Protection Regulation.</span>\r\n\r\n<span style=\"font-weight: 400;\">But, as my research shows, this might not be enough without the redesign of the app ecosystem to address data sharing, a view supported by other research. According to </span><a href=\"https://dl.acm.org/doi/10.1145/3201064.3201089\"><span style=\"font-weight: 400;\">one study</span></a><span style=\"font-weight: 400;\"> most apps transmit data directly to third parties, like Google, Facebook and ad exchanges, via trackers embedded in the app code. But I found that privacy laws do not comprehensively or consistently address this third party sharing.</span>\r\n\r\n<span style=\"font-weight: 400;\">The term “third party” is not defined in the Protection of Personal Information Act, but would include ad networks, content-sharing sites and social networking platforms. Third parties are thus distinguished from downstream processors who may perform specified data processing on your behalf under a contract.</span>\r\n\r\n<span style=\"font-weight: 400;\">It is difficult to enforce legal liability against these third parties, who are often outside the country where the app was developed. Their terms and conditions typically place full responsibility for privacy compliance by the app on the app developer. This may leave app users unprotected. But it could also expose the app developer to unforeseen legal liability.</span>\r\n\r\n<span style=\"font-weight: 400;\">Liability for the app developer arises because under both the Protection of Personal Information Act and General Data Protection Regulation if you played a role in determining “the purpose or means” of data processing you are a “joint” responsible party (data controller) for the data processed by the third party.</span>\r\n\r\n<span style=\"font-weight: 400;\">The European Court of Justice has twice held small businesses liable as “joint controllers” for Facebook’s collection of data, via a </span><a href=\"https://curia.europa.eu/juris/liste.jsf?num=C-210/16\"><span style=\"font-weight: 400;\">fan page</span></a><span style=\"font-weight: 400;\"> and a </span><a href=\"https://curia.europa.eu/juris/liste.jsf?num=C-40/17\"><span style=\"font-weight: 400;\">like</span></a><span style=\"font-weight: 400;\"> button. Although the judgments stress that joint control is not necessarily “equal liability”, this should still be a concern for app developers.</span>\r\n\r\n<span style=\"font-weight: 400;\">For example, app developers using the Facebook Software Development Kit are sharing personal data with Facebook. Event logs such as “app installed”, “SDK initialised” and “app deactivated” give detailed demographic and behavioural insights about an app user. In 2018 Privacy International </span><a href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\"><span style=\"font-weight: 400;\">reported</span></a><span style=\"font-weight: 400;\"> that the setting to delay transmission of logged events until after the user has consented was only added by Facebook 35 days after General Data Protection Regulation came into force, and then only if enabled by the developer for SDK version 4.34 or higher. This change appears to have followed repeated bug reports filed on the developer’s platform.</span>\r\n\r\n<b>Take aways</b>\r\n\r\n<span style=\"font-weight: 400;\">The takeaway here for developers following a privacy by design approach is to “</span><a href=\"https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf\"><span style=\"font-weight: 400;\">trust but verify</span></a><span style=\"font-weight: 400;\">”:</span>\r\n<ul>\r\n \t<li>Check contract terms and third party code carefully;</li>\r\n \t<li>Monitor developer platforms for security and privacy updates;</li>\r\n \t<li>Only work with organisations that offer adequate privacy guarantees;</li>\r\n \t<li>Notify your users about data transfers to third parties and provide easy to use privacy controls.</li>\r\n \t<li>Keep logs so that you can respond promptly if an app user requests details of the personal data you hold and the recipients (or categories of recipients) of that data.</li>\r\n</ul>\r\n<span style=\"font-weight: 400;\">Prosecuting app developers who breach data laws is important but not enough. Ultimately the parties who design the technologies and platforms on which mobile apps are built and marketed must be brought within the legal accountability framework to close the privacy loop. </span><b>DM/ML <iframe src=\"https://counter.theconversation.com/content/164090/count.gif?distributor=republish-lightbox-advanced\" width=\"1\" height=\"1\"></iframe></b>",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/hSe4OjWMpnnQDRTN1YUkFQzutYI=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/VWZCOzDUiZEYLFCTqGetF7lXQys=/450x0/smart/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/bZHCSsnODKmbNZU-wi6snMeyvHU=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/huCDY3K8U8N4ne9M23WbK5_Slh8=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/qilcOIt4SnFxTnUlwBGdfzdXG_A=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/hSe4OjWMpnnQDRTN1YUkFQzutYI=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg",
"url_medium": "https://dmcdn.whitebeard.net/i/VWZCOzDUiZEYLFCTqGetF7lXQys=/450x0/smart/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg",
"url_large": "https://dmcdn.whitebeard.net/i/bZHCSsnODKmbNZU-wi6snMeyvHU=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg",
"url_xl": "https://dmcdn.whitebeard.net/i/huCDY3K8U8N4ne9M23WbK5_Slh8=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg",
"url_xxl": "https://dmcdn.whitebeard.net/i/qilcOIt4SnFxTnUlwBGdfzdXG_A=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/08/cyber-security-2765707_1920.jpeg",
"type": "image"
}
],
"summary": "The mobile apps installed on our smartphones are one of the biggest threats to our digital privacy. They are capable of collecting vast amounts of personal data, often highly sensitive.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "The ‘privacy by design’ approach for mobile apps: why it’s not enough",
"search_description": "<a href=\"https://theconversation.com/the-privacy-by-design-approach-for-mobile-apps-why-its-not-enough-164090\"><i><span style=\"font-weight: 400;\">This story was first published in </span></i><span sty",
"social_title": "The ‘privacy by design’ approach for mobile apps: why it’s not enough",
"social_description": "<a href=\"https://theconversation.com/the-privacy-by-design-approach-for-mobile-apps-why-its-not-enough-164090\"><i><span style=\"font-weight: 400;\">This story was first published in </span></i><span sty",
"social_image": ""
},
"cached": true,
"access_allowed": true
}