To edit photos, make voice calls or send messages, apps need access rights to the camera, pictures, microphone or contacts. Most of the time, these permissions make sense to be able to use the apps fully. Sometimes it is not clear for what purpose apps want to access personal data. To help you review app permissions with your child, we’ll take a closer look at selected permission types in this article.
Here’s how this permission works: Apps are allowed access to the smartphone’s or tablet’s built-in cameras to take photos and videos.
These apps need access to the camera, for example:
Here this function is optional:
This risk must be taken into account:
There is a risk that apps with access to the camera will be used to record users unintentionally. To prevent this, you can attach a cover with a slider to the camera lens, for example.
This is how this permission works: Apps are allowed access to the microphone integrated in the smartphone.
These apps need access to the microphone, for example:
Here this function is optional:
This risk must be taken into account:
Apps that are allowed to access a device’s microphone can use this feature to listen in. Conversations, sounds from TV and radio, or music – there are apps that eavesdrop on their users around the clock and analyze them for keywords. The data is used for personalized advertising or resold for unclear purposes. Consent to this is done by agreeing to the terms of use when downloading the app. For interception, many services use a technology from the manufacturer Alphonso. If you search for it in the App Store or Play Store, you will find all apps that use this software. How exactly you can protect yourself from eavesdropping is explained by MDR in a Brisant feature.
This is how this permission works: Apps can access, modify, forward, and delete stored contact data, as well as search for specific contacts. You receive information about which contact is contacted, when, for how long and via which communication channel.
These apps require access to the contacts, for example:
Here this function is optional:
This risk must be taken into account:
Apps that are allowed to access a device’s contact list can use this feature to collect personal data and analyze contact associations. This means that by accessing contacts, apps collect data from uninvolved people who do not have messenger or social media apps installed themselves. Be aware that your handling of personal data also affects third parties, namely your contacts.
You should also carefully review the following authorization types:
– the location , for example to use navigation apps
– the telephone, for example to call contacts
– The SMS, for example, to send a code for two-factor authentication.
– the calendar, for example to send appointment invitations
– the memory, for example to edit already created pictures and videos
A detailed list of all permission types of Android devices is provided by the AppChecker of the iRights.
Explain to your child what app permissions are, how to set them and how to check them. Encourage your child to use their data sparingly and to protect it. Educate yourself together with your child before installing an app:
If you or your child have granted an authorization that you do not use or are critical of, you can cancel the authorization at any time. See the article on app permissions for instructions on Android and Apple device settings.