Windows Phone Location Collection Practices Must Be Transparent

By not definitively defining how they collect and track iPhone users and their data, Apple got in hot water recently. To avoid running into the same problem, Microsoft clearly defined how they get that same data from their own mobile users, and how they use it, and even went so far as to release source code for their wifi data collection practices.

Microsoft released specific information regarding wifi and privacy, stating that it doesn't intercept wireless data transmissions from user's computers. It also doesn't observe or record info that could potentially contain user content transmitted over the wireless network.

By not definitively defining how they collect and track iPhone users and their data, Apple got in hot water recently. To avoid running into the same problem, Microsoft clearly defined how they get that same data from their own mobile users, and how they use it, and even went so far as to release source code for their wifi data collection practices.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Mobile application management (MAM) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed MAM provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, manages the complete app lifecycle, and enables multiple app distribution methods, including an intuitive, custom-brandable enterprise app store. But, not all mobile application management (MAM) is created equal. Use this …

  • Gaining a competitive advantage in the modern marketplace requires an infrastructure that allows for the secure execution of data and analytics, cloud, social, and mobile technologies. Perhaps one of the most significant trends among technologically visionary companies is the drive to unite infrastructure and security teams. With functional alignment across these teams, organizations unlock performance and reliability through a proactive threat detection and mitigation approach. With this alignment in mind, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date