The advent of mobile apps has led to new forms and combinations of 
user- and device-related data that create systems beyond our control, 
posing new risks to privacy and security through out-of-your-hands data 
storage.
 
  The
 real danger is the gradual erosion of individual liberties through the 
automation, integration, and interconnection of many small, separate 
record-keeping systems, each of which alone may seem innocuous, even 
benevolent, and wholly justifiable. 
 U.S. Privacy Protection Study Commission, 1977
 
    
 Can you believe the comment quoted above is almost forty years 
old?  Have we learned from the 1977 Commission report?  Almost
 all of us now carry handheld computers – our smart phones, tablets, 
smart watches, fitbits – that entertain us, guide us, remind us, warn 
us, and serve us.  They also gather information about us from our 
heart rates, purchases, and locations, to banking transactions, 
information about our family and friends, text messages, email addresses
 and our personal preferences.  In short, these always-on, 
always-ready and always-with-you devices pose privacy challenges that 
were not likely even pondered in 1977.
     
 It is safe to assume that anything you do on your mobile device, any 
information you store on it, any app you utilize, is being snooped even 
if you are taking precautions. Despite the amount we use and depend upon
 our mobile devices, approximately 62% of smartphone users do not 
password-protect their phone, and smartphone users are 33% more likely 
to become a victims of identity theft than non-users.
     
 We must remember that our new “best friends” (or as my friends refer to
 the smart phones “our precious”) are the “small, separate 
record-keeping systems” contemplated in 1977, albeit multiplied by 
billions.  They store our electronic lives and, to varying degrees,
 share our lives with the highest bidder.
 
What Data is Being Collected?  
    
 Taken together, your cellular service provider, search engine, and the 
developers of the apps you use collect the following:
	- Incoming and outgoing calls: the phone numbers you call, the numbers that call you, and the duration of those calls;
 
	- Incoming and outgoing text messages: the phone numbers to which you send texts, and the numbers from which you receive them;
 
	- How often you check your e-mail or access the Internet; 
 
	- Any photos or video you take on your phone;
 
	- Details about the text messages and e-mails you send and receive, including the content;
 
	- Passwords;
 
	- Financial data;
 
	- The information on your calendar; and
 
	- Your location, age, and gender.
 
 Who is Collecting the Data?  
    
 As mentioned above, the collectors of your data begin with the company 
providing your cellular service.  A second collector, of course, is your “search engine” of choice:  Google, Safari, and so on.
    
 But still another purveyor of your personal data are the folks behind 
the innumerable “apps” of which we have become fond whether we use a 
navigation app to find our way to a new friend’s address or play  Angry Birds™  to stave off boredom on a long trip.
    
 Finally, the ability to collect data on where a person has gone and 
what they have been doing is valuable information for law enforcement 
officers.  For example, if you are the subject of an investigation,
 or even if you have just been pulled over, police may want to see what 
you have been doing and where you are going – things your smartphone may
 be able to reveal. Depending on your jurisdiction, they may just be 
able to do that despite the Constitution's Fourth Amendment prohibition 
against unreasonable searches and seizures.     
Advertisers Love Data – and Apps
    
 Aside from law enforcement, the foregoing collectors are interested in 
collecting your personal data so that they can package and sell it to 
advertisers.
    
 Advertisers want to market to the people most likely to buy their 
products.  The more information advertisers collect about you, the 
better they know the types of products and services you purchase and 
those in which you might be interested.
    
 Advertisers pay app developers to get access to you.  In fact, 
advertisers even supply code to the app developers to build into the 
app. The code not only makes an ad appear when you use the app, but also
 collects data from your phone and transmits it back to the advertiser. 
It is also possible that the app itself collects data that is shared 
with ad networks.  The data collected and shared builds a detailed 
profile about you and is re-packaged and sold to the highest bidder. 
      For example, in December 2010, the Wall Street Journal investigated 101 apps
 to see what data the apps were sharing with advertisers. It found that 
56 apps shared the phone’s unique ID number, 47 transmitted the phone’s 
location and 5 shared the user’s age and gender and other personal 
details (like phone number or contacts list). That study was six years 
ago.  During the 2012 presidential campaign, apps created by both 
major candidates to promote their election campaigns gathered (or sought
 permission to gather) large amounts of personal information including 
GPS location data. 
    
 Although Federal privacy laws exist, they have not kept up with the 
pace of technology and courts are unclear on the issue as to how easy it
 should be  to gain access to your smartphone and its data -- 
especially where law enforcement is concerned.
-----
    
 A list of federal laws as well as tips to enhance your cellular data 
security may be found in an expanded version of this article on our website. 
.
 
 
Other Recent Articles