Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

Analysis of Apple’s iOS 14.5 Consent Prompt for Tracking

Download: Consent Report Q1 2026
Published October 18, 2021 / Updated December 20, 2023
Author

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

This year in April, Apple released iOS 14.5 making major privacy updates within the operating system. The new operating system now requires all apps that collect data from end-users for the purposes of tracking across apps and websites to use the AppTracking Transparency Framework and ask users via Apple’s built-in consent prompt to opt-in to tracking. This means all Apple users will now be presented with a prompt with two equally prominent options of “Allow Tracking” and “Ask Apps Not to Track” while using apps that collect their data and share it with third parties for advertising purposes.

When a user selects “Ask Apps Not to Track”, Apple will block that particular app developer from accessing the user’s IDFA (identifiers for advertisers). App developers are expected to honor the user's choice and prevent any tracking. Users are also able to change their preferences on an app-by-app basis by going to the settings of the particular app.

In today’s privacy-conscious world, this new mandatory consent prompt is being seen as a welcome initiative. The fact that mobile users would not be tracked by default unless they affirmatively select “Allow Tracking” appears to be consistent with privacy-by-default as well as privacy-by-design principles. While privacy-by-default requires apps to ensure that by default, the user has been provided the strictest privacy measure available, privacy-by-design refers to having in-built abilities that ensure data privacy. The new consent prompt is also consistent with the GDPR and the European Data Protection Board’s Updated Guidelines on Consent that prohibit the use of pre-selected checkboxes while obtaining consent from a data subject.

Asking Permission to Track

In its User Privacy and Data Use Policy, Apple defines tracking as, “the act of linking user or device data collected from your app with user or device data collected from other companies’ apps, websites, or offline properties for targeted advertising or advertising measurement purposes. Tracking also refers to sharing user or device data with data brokers. Examples of tracking include, but are not limited to:

  • Displaying targeted advertisements based on user data collected from apps and websites owned by other companies.
  • Sharing device location data or email lists with a data broker.
  • Sharing a list of emails, advertising IDs, or other IDs with a third-party advertising network that uses that information to retarget those users in other developers’ apps or to find similar users.
  • Placing a third-party SDK in your app that combines user data from your app with user data from other developers’ apps to target advertising or measure advertising efficiency, even if you don’t use the SDK for these purposes.”

From a legal perspective, the responsibility to obtain the end user’s consent seems to primarily lie with the app developer as it is the data controller - the entity that determines the purposes and means of the processing of personal data. The operating systems and device manufacturers may also be considered data controllers (and where relevant joint data controllers) for any personal data which is processed for their own purposes.

Apps must ensure that they obtain separate and specific consent for separate and specific data processing operations as well as consent obtained for one purpose must not be used for any other purpose. One opt-in prompt may cover different processing operations as long as these operations serve the same purpose. However, there must be separate opt-in prompts to allow users to give separate consent for separate data processing purposes. For example, specific consent must be obtained for accessing geolocation data and separate for accessing browsing history, as both can have different processing purposes.

Apple’s built-in consent prompt certainly helps apps in fulfilling some part of their privacy obligations; however, it does not seem to ensure granularity as indicated from Apple’s broad interpretation of “tracking”. It appears that in one consent prompt, several consent prompts are tied together since by selecting “Allow Tracking”, users are not only consenting to be receiving targeted advertisements on apps but also to be sharing their location data with data brokers and sharing IDs for retargeting purposes. It is not clear if such consent meets the global data protection legal requirements that require separate consent for separate data processing purposes.

What other privacy considerations apps must be mindful of?

Rather than merely relying on Apple’s built-in consent prompt, apps also need to be mindful of their specific consent-related privacy obligations.

Firstly, apps need to ensure data minimization and purpose limitation. So, even if a mobile user allows apps to collect their data and track them via choosing “Allow Tracking”, this does not provide apps an uncontrolled power to collect as much data as they want to - they should be collecting only the limited amount of data that is required for the purposes for which it is processed. Moreover, data collected for one purpose may not be used for any other purpose.

Secondly, apps are required to provide their users easy-to-understand and accessible information about the data they collect and the purposes for which they are collecting while obtaining consent from users. At a minimum, users should be made aware of the purpose of each of the processing operations for which consent is sought, what type or category of data will be collected and used, and their rights connected with their personal data such as their right to withdraw consent at any time. One simple prompt with two options on “Allow Tracking” and “Ask Apps Not to Track” does not provide users enough clarity as to whether a particular app will be collecting their location data, email lists, phone contact lists, or any other identification data. Therefore, app developers must make such information available on their privacy notices which should be easily accessible to users.

With big corporations such as Apple and Google taking privacy-friendly initiatives and global data protection requirements becoming stricter with time, the ad-tech industry has started reinvestigating its marketing strategies. Various statistics show that more and more Apple end-users end up choosing not to track, eventually leading to extremely low data collection rates.

App developers are encouraged to be more transparent with their users as far as their data collecting and processing activities are concerned. Increased transparency will not only assist apps fulfill their legal requirements but also achieve consumer awareness and trust. This is because in today’s privacy-aware yet digital world, users may still want to keep receiving personalised advertisements - they just need more information on how businesses collect and manage their data. Transparency may be achieved by using a combination of layered privacy notices, contextual pop-up notices, privacy dashboards, and visualization tools such as icons - all of that will ultimately help users make an informed choice.

What’s next?

Businesses are increasingly investing their time and efforts in coming up with privacy-compliant alternatives to the use of third-party cookies and other tracking means for advertising purposes. A few proposed options include, although not limited to Google Privacy Sandbox, first-party data stack, identity solutions, and contextual advertising. At this point in time though, it is difficult to comment with certainty as to which or a combination of these alternative options is the best approach that protects end users’ privacy, fulfills legal consent requirements, and helps businesses in their marketing activities. In the meantime, mobile apps and other data controllers are advised to ensure consent granularity, data minimization, and purpose limitation as well as provide adequate information to users while obtaining consent from them.

How Securiti can help?

Securiti’s Universal Consent Management Solution enables marketers to adequately advertise and market their products in a compliant manner by capturing consent and automating revocation. Securiti’s Cookie Consent Banner Solution enables companies to build cookie consent banners in accordance with the applicable legal requirements when collecting personal data for non-essential purposes on digital properties.

Ask for a DEMO today to understand how Securiti can help you comply with the applicable legal requirements of global data privacy laws and regulations with ease.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
View More
Minimize What You Expose: Privacy Guardrails for AI Agents and Copilots
Minimize data exposure in AI agents and copilots. Apply privacy guardrails like data minimization, access controls, masking, and policy enforcement to prevent leakage and...
View More
From Data Visibility to AI Velocity
Access the whitepaper and discover how unified DataAI security turns data governance into a business enabler, boosting AI innovation with visibility, compliance, and risk...
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
Compliance with CCPA Amendments with Securiti View More
Compliance with CCPA Amendments with Securiti
Stay compliant with 2026 CCPA amendments using Securiti, covering updated consent requirements, expanded sensitive data definitions, enhanced consumer rights, and readiness assessments.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New