Windows Phone Location Collection Practices Must Be Transparent

By not definitively defining how they collect and track iPhone users and their data, Apple got in hot water recently. To avoid running into the same problem, Microsoft clearly defined how they get that same data from their own mobile users, and how they use it, and even went so far as to release source code for their wifi data collection practices.

Microsoft released specific information regarding wifi and privacy, stating that it doesn't intercept wireless data transmissions from user's computers. It also doesn't observe or record info that could potentially contain user content transmitted over the wireless network.

By not definitively defining how they collect and track iPhone users and their data, Apple got in hot water recently. To avoid running into the same problem, Microsoft clearly defined how they get that same data from their own mobile users, and how they use it, and even went so far as to release source code for their wifi data collection practices.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • This is a pre-recorded on-demand webinar. Apex™: too much code for low-code? If your organization relies on Salesforce for CRM or as a development platform, Apex code can present challenges that may hinder the value Salesforce can bring to your organization. Join Rik Chomko, co-founder and CEO of InRule®, for a webinar which provides case studies and architectures that demonstrate how to gain more value from Salesforce through the deployment of a decision platform. Empowering non-technical users …

  • As your content grows, it can be challenging to define the proper rules, regulations and policies that govern that content and ensure proper protection and compliance. Entrusting your content to Box – the only secure, modern content platform in the cloud – is the right first step. The next step is to evaluate your retention, disposition and defensible discovery needs and to establish the proper buy-in to satisfy all your needs. In this Information Governance webinar, learn how Box Governance can add …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date