RESOURCE ARTICLE

Assessing Mobile App Data Privacy Risk

This white paper covers a survey of privacy professionals regarding how they score the risk of collecting different types of personal data and performing actions in the mobile environment.


Published: 15 April 2017

View PDF

We hear about “mitigating privacy risk” on a regular basis. The GDPR calls for a risk-based approach to privacy operations. Certain “high-risk” endeavors even trigger data protection impact assessments and calls to the local data protection authority’s office? Rarely, however, do we see risk-scoring in action. Until now.

The IAPP and Kryptowire have teamed to survey 400 privacy professionals regarding how they score the risk of collecting dozens of types of personal data and performing actions in the mobile environment.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs


Tags:

AdtechBiometricsChildren’s privacy and safetyIdentity and verificationIoT and personal devicesPersonal impactsProgram managementSurveillanceTechnologyPrivacy
RESOURCE ARTICLE

Assessing Mobile App Data Privacy Risk

This white paper covers a survey of privacy professionals regarding how they score the risk of collecting different types of personal data and performing actions in the mobile environment.

Published: 15 April 2017

View PDF


We hear about “mitigating privacy risk” on a regular basis. The GDPR calls for a risk-based approach to privacy operations. Certain “high-risk” endeavors even trigger data protection impact assessments and calls to the local data protection authority’s office? Rarely, however, do we see risk-scoring in action. Until now.

The IAPP and Kryptowire have teamed to survey 400 privacy professionals regarding how they score the risk of collecting dozens of types of personal data and performing actions in the mobile environment.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

AdtechBiometricsChildren’s privacy and safetyIdentity and verificationIoT and personal devicesPersonal impactsProgram managementSurveillanceTechnologyPrivacy

Related resources