Using sports apps? Maybe they’re following you

by time news

Sports Training Illustration photo: Sarah Schumann, Flash 90

Aaron Suissa

Applications

In recent years, the use of technological means for health and sports needs has increased, including a very large variety of applications that offer users to monitor their physical training routine, monitor their eating habits, sleeping habits and more. These applications collect data about us in real time and even transmit this data to third-party servers, thus posing a threat to users’ privacy. These measures also include wearable devices that collect personal data such as physiological information such as blood pressure, counting steps using special sensors and thus increasing the risk to the privacy of their users.

These means are easy to download and use are friendly and convenient. Despite their many benefits, these measures usually collect a great deal of sensitive information, as defined in the Privacy Protection Act. The concern is that insufficient information security, or the transfer of the information to third parties interested in it, may lead to a violation of users’ privacy. Furthermore, data collected by these means may be cross-referenced with personal information from other sources, such as pharmaceutical companies, and thereby infringe on users’ privacy.

After analyzing the privacy policy documents of major health and fitness applications currently in operation, and of wearable devices for sports and health purposes, the Authority publishes two related documents that review the range of common uses of technological means for health and sports, presents the main risks to user privacy and provides recommendations for proper conduct. Reduce invasion of privacy when using them.

The following recommendations appear in the authority documents:

  1. When installing the app – Check the reliability of the application and its level of information security, try to evaluate the quality and content of the application on the application developer’s website. To do this, look for user reviews through the app store or across the web.
  2. Try to download apps only From official app stores Of the major operating systems. Carefully read the app’s privacy policy (If any). pay attention! If the app does not have a website, it may not have a privacy policy. Find all the relevant contact details and if necessary contact the developer with questions.
  3. Restriction of app permissions – Limit the amount of personal information you provide as part of using the app. Some apps allow you to try out their applications without entering any personal information. Take advantage of this opportunity when it is offered to decide if you want to continue using the app.
  4. Sharing information from the app – Examine whether you intend to share the information on social networks. Many apps allow and even encourage users to share sensitive information through social networks. Please note that once you have decided to share the information, it will be accessible to all (according to your privacy settings on social networks), and will actually be out of your control.
  5. While using the app – Be sure to implement security updates published by the app operator, to ensure that it is protected from new security risks. Try to keep track of the app’s access permissions, even when downloading software updates. If the permissions have been expanded to the extent that it is against your wishes – consider deleting the user account and the application.
  6. End of use of the application – Have you stopped using the app? Delete it. This is the only way to ensure that the app has stopped performing actions such as broadcasting your location or interacting with other applications on the device.
  7. Note that in many applications your information is saved even after deleting the account. If you stopped using the app, see if you can delete both your personal profile and the data archive you created using the app. If you want to save data that you have already entered separately, many applications offer the option to download your data and save it as a file.
  8. Locate the privacy settings in multiple locations – Do not just check the privacy settings on the device itself. Usually, the privacy settings will appear in three places: on the device itself, in the application linked to the device on your phone and any web portal that may be linked to the service. It is also advisable to check the settings on all social media platforms or when creating new accounts.
  9. Check the privacy settings on the wearable device – When we get a new device, the tendency is to go through the installation process as quickly as possible, and skip steps, to start using it immediately. Carefully go through all the installation steps, as accepting the default settings for privacy on the device may infringe on your privacy. For example, it is important to check whether the device collects and shares your statistics and locations. In some cases wearable devices are connected to social networks. Therefore, pay attention to whether the device shares your medical data with others, shares publicly, shares with “friends” only, or does not share at all. Consider carefully whether to let others know your running route or the times you are in certain places.
  10. Consider disabling location tracking – Most wearable devices track geographic location, whether on the device or the app associated with the device. The easiest way to protect yourself may be to simply turn off geographical location tracking on your device.
  11. Be proactive in protecting your personal information – It is recommended to periodically check for updates to the privacy policy of wearable devices and regularly check the device security update.

You may also like

Leave a Comment