Blog

Developing Data Privacy

"Transmitted data" can include a lot of forms- email, cloud, memory sticks, portable hard drives, and of course, mobile.

"Transmitted data" can include a lot of forms- email, cloud, memory sticks, portable hard drives, and of course, mobile. As this article, "Rules For Developers to Protect Users' Privacy" discusses, developers need to be mindful of what happens to data within apps and beyond: A new Pew survey reiterates why app developers need to take privacy concerns seriously.

But how can developers determine which federal, state and local laws apply to their app? Alan Chapell: There is no shortage of great resources to help app developers. For example, the MMA has crafted a model privacy policy that lays out important considerations for app developers and offers sample language. The Future of Privacy Forum, PrivacyChoice.org and TRUSTe have also created model privacy policy generators.

The Federal Trade Commission (FTC) has just released a set of app marketing guidelines. The Center for Democracy and Technology has created a set of best practices for mobile application developers. And last, but certainly not least, the office of California Attorney General Kamala D. Harris recently reached an agreement with mobile application platforms on a set of principles designed to ensure compliance with California's Online Privacy Protection Act.

It is protecting data at the earliest possible point, the source. This enables mobile developers to aggregate data form multiple sources which have been consistently de-identified in order to develop the optimal experience for the clients while maintaining the highest level of security for their clients and themselves.

What the article skirts, but doesn't directly say is that the most critical move is protecting data at the earliest possible point, the source. This enables mobile developers to aggregate data from multiple sources, which have been consistently de-identified in order to develop the optimal experience for the clients while maintaining the highest level of security for their clients and themselves.