Feeds

'Kids' apps STILL siphoning too much info from mobes' - FTC boss

Apple and Google under fire for poor standards

Internet Security Threat Report 2014

Mobile apps are still collecting children's personal details from their phones without their consent, the Federal Trade Commission (FTC) warned today in a report on privacy intrusions.

The watchdog analysed 400 popular children's apps available for Google Android and Apple iOS devices, and found that the applications continue to take sensitive information from users without disclosing what data is taken nor where it goes.

That included passing on information such as the physical location of the user and even phone numbers to third parties.

"Our study shows that kids' apps siphon an alarming amount of information from mobile devices without disclosing this fact to parents," FTC Chairman Jon Leibowitz said while discussing the report Mobile Apps for Kids: Disclosures Still Not Making the Grade.

Only 20 per cent of the apps probed showed a privacy policy. Nearly 60 per cent transmitted information from a user's device back to the app developer or, more commonly, to an advertising network, analytics company or other third party, said the FTC.

It is feared these ad networks could pool data collected from all sorts of applications to build up a complete profile on each user - crucially without the punters' knowledge or consent.

The report is a follow-up to a survey completed by the FTC in February this year, and the lack of progress highlights corporate sluggishness on the topic of app privacy.

It wasn't just the developers getting stick: app store gatekeepers - Apple and Google - were criticised for not adequately policing apps available from the online shops. Leibowitz said:

All of the companies in the mobile app space, especially the gatekeepers of the app stores, need to do a better job. We'll do another survey in the future and we will expect to see improvement.

This FTC report follows the first lawsuit by a US state against an app for allegedly breaching privacy laws. California's attorney general has accused Delta Airlines of failing to prominently display a privacy policy for the information it takes. ®

Intelligent flash storage arrays

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.