Create a gist now

Instantly share code, notes, and snippets.

Embed
What would you like to do?
Privacy Postcard, or Poison Pill Privacy
For more information about this process, please see the blog post at https://funnymonkey.com/2018/privacy-postcards-or-poison-pill-privacy
Please use and modify this structure. The structure is released into the public domain under a CC0 license: https://creativecommons.org/publicdomain/zero/1.0/
<h3>0. General Information</h3>
<ul>
<li>
Name of Service:
</li><li>
Android App
</li><li>
Privacy Policy url:
</li><li>
Policy Effective Date:
</ul>
<h3>1. App permissions</h3>
<p>
Screenshot of selected app permissions, pulled from the Google Play store. The iOS store from Apple does not support the transparency of the Google Play store.
</p><p>
The listing of app permissions is useful because it highlights some of the information that the service collects. The listing of app permissions is not a complete list of what the service collects, nor does it provide insight into how the information is used, shared, or sold. However, the breakdown of app permissions is a good tool to use to get a snapshot of how well or poorly the service limits data collection to just what is needed to deliver the service.
</p>
<h3>2. Access contacts</h3>
<p>
<strong>Keywords</strong>: contact, friend, list, access
</p>
<h3>3. Law enforcement</h3>
<p>
<strong>Keywords</strong>: legal, law enforcement, comply
</p>
<h3>4. Location information and Device IDs</h3>
<p>
<strong>Keywords</strong>: location, zip, postal, identifier, browser, device, ID, street, address
</p>
<h3>5. Data Combined from External Sources</h3>
<p>
<strong>Keywords</strong>: combine, enhance, augment, source
</p>
<h3>6. Third Party Collection</h3>
<p>
<strong>Keywords</strong>: third, third party, external, partner, affiliate
</p>
<h3>7. Social Sharing or Login</h3>
<p>
<strong>Keywords</strong>: login, external, social, share, sharing
</p>
<h3>8. Education-specific Language</h3>
<p>
<strong>Keywords</strong>: parent, teacher, student, school, , family, education, FERPA, child, COPPA
</p>
<h3>9. Other</h3>
<p>
Because this list of concerns is incomplete, and there are other problematic areas, we need a place to highlight these concerns if and when they come up. When I use this structure, I will use this section to highlight interesting elements within the terms that don't fit into the other sections.
</p><p>
If, however, there are elements in the other sections that are especially problematic, I probably won't spend the time on this section.
</p>
<h3>10. Summary of Risk</h3>
<p>
This section is used to summarize the types of privacy risks associated with the service. As with this entire process, the goal here is not to be comprehensive. Rather, this section highlights potential risk, and whether those risks are in line with what a service does. IE, if a service collects location information, how is that information both protected from unwarranted use by third parties and used to benefit the user?
</p>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment