Windows Phone Location Collection Practices Must Be Transparent

By not definitively defining how they collect and track iPhone users and their data, Apple got in hot water recently. To avoid running into the same problem, Microsoft clearly defined how they get that same data from their own mobile users, and how they use it, and even went so far as to release source code for their wifi data collection practices.

Microsoft released specific information regarding wifi and privacy, stating that it doesn't intercept wireless data transmissions from user's computers. It also doesn't observe or record info that could potentially contain user content transmitted over the wireless network.

By not definitively defining how they collect and track iPhone users and their data, Apple got in hot water recently. To avoid running into the same problem, Microsoft clearly defined how they get that same data from their own mobile users, and how they use it, and even went so far as to release source code for their wifi data collection practices.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Over 85% of enterprises will commit to multicloud architectures by 2018. The flexibility of the cloud will allow these organizations to more fully support DevOps and gain critical business insights. In this Solution Brief, you can explore how IT leadership can utilize VMware vRealize Suite as a unified, full-function platform to manage cloud infrastructure and application provisioning, monitoring, capacity planning, analytics, and more.

  • Old Habits Die Hard: The report, which is in its fifth year, polled 1,100 senior IT security executives at large enterprises around the world and indicates an ongoing disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data. While 30 percent of respondents classify their organizations as 'very vulnerable' or 'extremely vulnerable' to data attacks (and the number of breaches continues to rise) the two top spending priorities are network …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date