Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View
Veeam

The Funniest Evening at RSA with Hasan Minhaj

Hasan Minhaj Request ticket
View

Analysis of Apple’s iOS 14.5 Consent Prompt for Tracking

Download: Consent Report Q2 2024
Published October 18, 2021 / Updated December 20, 2023
Author

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

This year in April, Apple released iOS 14.5 making major privacy updates within the operating system. The new operating system now requires all apps that collect data from end-users for the purposes of tracking across apps and websites to use the AppTracking Transparency Framework and ask users via Apple’s built-in consent prompt to opt-in to tracking. This means all Apple users will now be presented with a prompt with two equally prominent options of “Allow Tracking” and “Ask Apps Not to Track” while using apps that collect their data and share it with third parties for advertising purposes.

When a user selects “Ask Apps Not to Track”, Apple will block that particular app developer from accessing the user’s IDFA (identifiers for advertisers). App developers are expected to honor the user's choice and prevent any tracking. Users are also able to change their preferences on an app-by-app basis by going to the settings of the particular app.

In today’s privacy-conscious world, this new mandatory consent prompt is being seen as a welcome initiative. The fact that mobile users would not be tracked by default unless they affirmatively select “Allow Tracking” appears to be consistent with privacy-by-default as well as privacy-by-design principles. While privacy-by-default requires apps to ensure that by default, the user has been provided the strictest privacy measure available, privacy-by-design refers to having in-built abilities that ensure data privacy. The new consent prompt is also consistent with the GDPR and the European Data Protection Board’s Updated Guidelines on Consent that prohibit the use of pre-selected checkboxes while obtaining consent from a data subject.

Asking Permission to Track

In its User Privacy and Data Use Policy, Apple defines tracking as, “the act of linking user or device data collected from your app with user or device data collected from other companies’ apps, websites, or offline properties for targeted advertising or advertising measurement purposes. Tracking also refers to sharing user or device data with data brokers. Examples of tracking include, but are not limited to:

  • Displaying targeted advertisements based on user data collected from apps and websites owned by other companies.
  • Sharing device location data or email lists with a data broker.
  • Sharing a list of emails, advertising IDs, or other IDs with a third-party advertising network that uses that information to retarget those users in other developers’ apps or to find similar users.
  • Placing a third-party SDK in your app that combines user data from your app with user data from other developers’ apps to target advertising or measure advertising efficiency, even if you don’t use the SDK for these purposes.”

From a legal perspective, the responsibility to obtain the end user’s consent seems to primarily lie with the app developer as it is the data controller - the entity that determines the purposes and means of the processing of personal data. The operating systems and device manufacturers may also be considered data controllers (and where relevant joint data controllers) for any personal data which is processed for their own purposes.

Apps must ensure that they obtain separate and specific consent for separate and specific data processing operations as well as consent obtained for one purpose must not be used for any other purpose. One opt-in prompt may cover different processing operations as long as these operations serve the same purpose. However, there must be separate opt-in prompts to allow users to give separate consent for separate data processing purposes. For example, specific consent must be obtained for accessing geolocation data and separate for accessing browsing history, as both can have different processing purposes.

Apple’s built-in consent prompt certainly helps apps in fulfilling some part of their privacy obligations; however, it does not seem to ensure granularity as indicated from Apple’s broad interpretation of “tracking”. It appears that in one consent prompt, several consent prompts are tied together since by selecting “Allow Tracking”, users are not only consenting to be receiving targeted advertisements on apps but also to be sharing their location data with data brokers and sharing IDs for retargeting purposes. It is not clear if such consent meets the global data protection legal requirements that require separate consent for separate data processing purposes.

What other privacy considerations apps must be mindful of?

Rather than merely relying on Apple’s built-in consent prompt, apps also need to be mindful of their specific consent-related privacy obligations.

Firstly, apps need to ensure data minimization and purpose limitation. So, even if a mobile user allows apps to collect their data and track them via choosing “Allow Tracking”, this does not provide apps an uncontrolled power to collect as much data as they want to - they should be collecting only the limited amount of data that is required for the purposes for which it is processed. Moreover, data collected for one purpose may not be used for any other purpose.

Secondly, apps are required to provide their users easy-to-understand and accessible information about the data they collect and the purposes for which they are collecting while obtaining consent from users. At a minimum, users should be made aware of the purpose of each of the processing operations for which consent is sought, what type or category of data will be collected and used, and their rights connected with their personal data such as their right to withdraw consent at any time. One simple prompt with two options on “Allow Tracking” and “Ask Apps Not to Track” does not provide users enough clarity as to whether a particular app will be collecting their location data, email lists, phone contact lists, or any other identification data. Therefore, app developers must make such information available on their privacy notices which should be easily accessible to users.

With big corporations such as Apple and Google taking privacy-friendly initiatives and global data protection requirements becoming stricter with time, the ad-tech industry has started reinvestigating its marketing strategies. Various statistics show that more and more Apple end-users end up choosing not to track, eventually leading to extremely low data collection rates.

App developers are encouraged to be more transparent with their users as far as their data collecting and processing activities are concerned. Increased transparency will not only assist apps fulfill their legal requirements but also achieve consumer awareness and trust. This is because in today’s privacy-aware yet digital world, users may still want to keep receiving personalised advertisements - they just need more information on how businesses collect and manage their data. Transparency may be achieved by using a combination of layered privacy notices, contextual pop-up notices, privacy dashboards, and visualization tools such as icons - all of that will ultimately help users make an informed choice.

What’s next?

Businesses are increasingly investing their time and efforts in coming up with privacy-compliant alternatives to the use of third-party cookies and other tracking means for advertising purposes. A few proposed options include, although not limited to Google Privacy Sandbox, first-party data stack, identity solutions, and contextual advertising. At this point in time though, it is difficult to comment with certainty as to which or a combination of these alternative options is the best approach that protects end users’ privacy, fulfills legal consent requirements, and helps businesses in their marketing activities. In the meantime, mobile apps and other data controllers are advised to ensure consent granularity, data minimization, and purpose limitation as well as provide adequate information to users while obtaining consent from them.

How Securiti can help?

Securiti’s Universal Consent Management Solution enables marketers to adequately advertise and market their products in a compliant manner by capturing consent and automating revocation. Securiti’s Cookie Consent Banner Solution enables companies to build cookie consent banners in accordance with the applicable legal requirements when collecting personal data for non-essential purposes on digital properties.

Ask for a DEMO today to understand how Securiti can help you comply with the applicable legal requirements of global data privacy laws and regulations with ease.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
Introducing Agent Commander
The promise of AI Agents is staggering— intelligent systems that make decisions, use tools, automate complex workflows act as force multipliers for every knowledge...
Risk Silos: The Biggest AI Problem Boards Aren’t Talking About View More
Risk Silos: The Biggest AI Problem Boards Aren’t Talking About
Boards are tuned in to the AI conversation, but there’s a blind spot many organizations still haven’t named: risk silos. Everyone agrees AI governance...
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
California’s Delete Request and Opt-out Platform (DROP) and the Delete Act View More
California’s Delete Request and Opt-out Platform (DROP) and the Delete Act
Understand California’s DROP platform and the Delete Act, including compliance timelines, the 45-day cycle, broker obligations, and how to operationalize compliance.
Building A Secure AI Foundation For Financial Services View More
Building A Secure AI Foundation For Financial Services
Access the whitepaper and discover how financial institutions eliminate Shadow AI, enforce real-time AI policies, and secure sensitive data with a unified DataAI control...
Emerging AI Security Trends For 2026 View More
Emerging AI Security Trends For 2026
Securiti’s latest infographic provides security leaders with a walkthrough of all the emerging AI security trends for 2026 to help them assess and plan...
Safe AI, Accelerated: View More
Safe AI, Accelerated: Securing Data & AI Across the Lifecycle
Securiti’s latest infographic dives into the issue organizations face when scaling their AI projects safely, and how best they can address those challenges.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New