Feeds

Australian government apps access smartmobe cams but 'don't film you'

Department of Human Services says its apps need cameras to deliver better services

Choosing a cloud hosting partner with confidence

Australia's Department of Human Services (DHS) says apparently-excessive permissions sought by its mobile apps are necessary for service delivery, and don't put its customers' privacy at risk.

Last week, The Register quizzed the department over broad permissions sought by self-service apps offered for various DHS services, including income support payments agency Centrelink, health care agency Medicare and family support payments.

Having noted a complaint by a Twitter user that asking for access to a phone's camera “to take pictures and videos” seemed excessive, we checked out the permissions sought by the apps, as shown in the screen captures below.

In addition to seeking permission to use the camera, the apps ask for:

  • Personal information – Adding / modifying calendar events, sending e-mails and reading calendar events;
  • Account access;
  • Reading phone status and ID; and
  • Coarse location.
Centrelink App asking for camera permission
Centrelink Android Permissions

While The Register doesn't view this in the light of government conspiracy, excessive permission-seeking by apps is a serious problem. Permission handling recently turned up serious vulnerabilities, and developers often seem to opt for a default “ask for everything” attitude to permission-seeking.

The DHS has told The Register it doesn't misuse the data, and it believes that the permissions it seeks are necessary for the operation of its apps. In an e-mail, a spokesperson said: “Some permissions are necessary to allow the Express Plus app to work effectively with your device. The department does not use or keep personal information stored on customers' phones for departmental purposes.”

Its specific responses to permissions sought are that: location is required to give correct directions to offices, and is not stored by the DHS; phone access is required to allow you to contact the department while using the app, and calls are not logged; personal information access is required so the app can add appointments to the calendar, and the department says it retrieves no details.

This isn't the first time the Department has had to address these concerns: it posted this privacy notice in December when similar questions arose on social media, which got discussed at Hoax-Slayer. ®

Intelligent flash storage arrays

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.