SearchSecurity.com

Beyond privacy policies: Practical privacy for websites and mobile apps

In this environment of growing attention to the risks of data security breaches, and in the midst of an explosion of mobile applications that make data storage an increasingly far-flung proposition, many organizations assume that the first line of defense for a company with a website or a mobile app is a good privacy policy.

In its March 26, 2012, report on privacy policy guidelines, "Protecting Consumer Privacy in an Era of Rapid Change," the Federal Trade Commission (FTC) made a number of recommendations that will affect the content of privacy policies going forward. In December, the FTC followed up those recommendations with significant changes to the Children's Online Privacy Protection Rule, and in January 2013, California's attorney general issued recommendations for privacy practices for developers of mobile applications to observe. The bottom line is that posting a privacy policy is not enough. At a minimum, companies with websites or mobile apps should be aware of the following:

  1. The most important thing about a privacy policy is that it accurately reflect actual practice. The FTC does not dictate the contents of a privacy policy, but it can -- and does -- bring enforcement actions where companies with websites or mobile apps do not adhere to the privacy policies they post.
  2. When a privacy policy is revised, information collected under the previous policy cannot be used or disclosed pursuant to the terms of a (more liberal) revised policy, without the consent of the consumer. This means that a company with a website or mobile app must keep track of what personally identifiable information is collected under each revision of its policy. 
  3. Where the user "clicks" his/her consent to a website's Terms of Use or Privacy Policy, they are more likely to be found enforceable than where no affirmative action is required. Wherever possible, a company with a website or mobile app should locate a link to its privacy policy at those points where personal information is collected and require agreement at the time that information is submitted. 
  4. The company will need to require that third parties who will see personal information of visitors (Web hosts, for example) agree in writing to keep that personal information confidential and secure. 

Managing the risk

But to effectively manage the risk associated with collecting, storing and using personal information, a company with a website or a mobile app -- indeed, every organization that collects personal information -- should do much more than simply post a privacy policy. For example, the organization should take the following actions:

An organization that takes the steps outlined above will be more likely to prevent a security breach, and better prepared in the event one occurs, than one that posts a privacy policy but does no more.

16 May 2013

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement