California to develop mobile privacy guidelines
- 26 April, 2012 08:51
The state of California will issue a set of best practices for mobile app developers this summer, responding to concerns that have emerged nationwide about smartphone use and privacy.
The California Office of Privacy Protection will likely release guidelines in July to advise technology companies about data collection, data sharing and written privacy policies, Joanne McNabb, chief of the office, said Wednesday at an app developers' privacy summit.
Mobile apps can access the personal data stored on smartphones, including a user's physical location and personal contacts, spurring discomfort among some users and privacy advocates.
Earlier this year, California announced a deal with the major mobile platform vendors that would require app makers to make privacy policies readily available to users. The guidelines from the Office of Privacy Protection should make it easier for companies to comply with state law.
California is home to many of the biggest mobile and Internet players, so its regulations could affect privacy practices worldwide.
The Office of Privacy Protection has no regulatory power, but McNabb suggested that well-designed best practices could rein in some of the current excesses in data collection, which several people at the privacy conference likened to the wild West.
"The practices and recommendations we come up with are not a floor of legal compliance, nor are they a ceiling of ideal. I think of them as about chair-rail height. You want to push higher than [developers] are required to go," she said.
Developers want guidance in the current climate of concern over mobile privacy, according to McNabb. And the apps ecosystem is not yet too entrenched to change.
"It's a time in the development of that industry sector where privacy by design is possible; the standards and even business models are not entrenched the way they are in other aspects of the technology world," said McNabb. "It's a teachable moment."
The guidelines will be developed with an advisory panel of privacy experts and industry stakeholders including mobile platform providers, advertisers, the GSMA mobile carriers association and the Application Developers Alliance.
The guidelines will build on recommendations already developed by the GSMA, the World Wide Web Consortium and the Center for Democracy and Technology.
Cameron Scott covers search, web services and privacy for The IDG News Service. Follow Cameron on Twitter at CScott_IDG.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Mobile app stores to require, disclose privacy policies - security, research in motion, privacy, mobile applications, mobile, Kamala Harris, hewlett-packard, Google, Apple - PC World Australia
- Mobile Data Privacy Is Terra Incognita to Users and Developers : PCWorld
- Application Developers Alliance
- Devising a Server Protection Strategy with Trend Micro
- Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Centre
- Securing the Promise of Virtualisation
- IDC: Delivering Customer Value with Enterprise Flash Deployments
- Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Securing the Promise of Virtualisation
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the more recent set of risks that are associated with newly formed hybrid environments. Read more to find out how to keep pace with evolving threats, quicker provisioning and dynamically mobile workloads.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.