in the study of 24 fitness apps and fitness-wearables wearables and fitness apps NRW throughout the Consumer Council has determined the collected data deficiencies in the handling of confidential data or lack of control over.Garmin, Fitbit, jawbone, polar, have Runtastic, Striiv, UnderArmour (MyFitnessPal) and Withings due to legal shortcomings in their privacy notices and even a warning raises privacy statements.
the technical examination showed a total , that control over data is hardly possible in this product category, as the consumer advice centre of North Rhine-Westphalia explains. Of the 24 approved apps 20 to operate will need a connection to the Internet, none of them allows the processing of data in the device either.
15 apps are in addition to the partial for the function required health data transmitted data on the usage patterns of the provider. These data are according to the consumer protection “for the pure functionality of the app probably is not necessary”. 19 out of 24 apps also involve third-party such as analysis, and advertising services. The user data can be passed on in such cases. It is not only questionable, but for users hardly to realize to what extent their services for the functionality of an app are required.
only two of the 12 investigated wearables are comprehensively protected against unwanted tracking (tracking). Thus, the create movement profiles is possible. The consumer advocates to blame a vulnerability of the Bluetooth connection. She should leave but usually only take advantage of, if not actively connected phone and wearable. Then, as operator of shopping centers could keep track of the routes of their customers.
purposes that may not be strictly taken whether it actually bothers users, alright, but question remains. Because usually all such concepts, where other technologies (especially wireless) can be used, the operator not, individuals to identify and track, but to identify patterns in the customer and visitor behavior and to optimize their offerings on this basis. The “persecuted” mobile device is comparable with a bucket of white paint, which is situated at the entrance and all visitors dip their feet in the: the individual is irrelevant, only the aggregate profiles (traces) all have a significance.
[withmaterialfromPeterMarwan silicon.de ]
get to know the building blocks of enterprise cloud platform in this audio Webinar. Learn how to achieve maximum freedom and flexibility for your applications. More outcome achieved with less input – specific application examples.