Unethical App Practices: Why I’m Selective About the Apps I Try
- Minamuddin Ahmed

- May 4
- 3 min read
Article Summary
In this article we explore how mobile app creators indirectly force installation of their apps, get access to our personal information and then retain it without accountability. Some tips will be provided to remain safe when trying out apps.
![App developers are not obliged by default to delete user data upon uninstall [Image created using Google Gemini]](https://static.wixstatic.com/media/3ac0d8_690ab807f7744235914fe1c39779d761~mv2.jpg/v1/fill/w_980,h_980,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/3ac0d8_690ab807f7744235914fe1c39779d761~mv2.jpg)
How does my data get out if I just try an app?
We have all got used to trying out apps at the click of a button. Very often we try an app for a few minutes and then remove it if it does not meet our expectations. But it is important to know that installing an app requires compliance with the terms and conditions and gives access to our personal information and to confidential content on our phone, such as photos and contacts.
Uninstalling an app does not automatically delete your personal data stored by the app developer.
App creators can retain data they collected while the app was installed, even after you remove the app from your device. Unless required by law or privacy policy, they are not automatically obliged to delete your server-side data when you uninstall the app.
In many jurisdictions (e.g. under GDPR in the EU), users can request deletion of their data—but it’s not automatic just by uninstalling.
Tips
On your daily-use phone, run only the apps that you intend to use long term
Have a separate old phone (without personal data or login information) to try new lesser-known apps
Be wary of automatically sharing your entire phone contact list when you sign up for any service
Be cautious about vendors indirectly compelling you to install their apps
I recently discovered that a friend is using an app for Caller IDs that displayed wrong information about my phone number. Even though I have been using this number for over 5 years, the Caller ID that the app displayed is not mine. This is not a telecom issue, this is an issue with obsolete data still in the records of the app creator.
When I reported the error to the app creator, they insisted that I install the app first to set my personal details right within the app.
They probably have other methods to correct data, but they encourage their product adoption by keeping all other remedial methods complicated and cumbersome for users.
This practice is clearly unethical, and we, specially on this platform TieTheCamel, try to highlight such unethical practices to benefit the common people.
![Unless required, restrict access to your contacts, calling records, data files, camera and microphone [Image created using Google Gemini]](https://static.wixstatic.com/media/3ac0d8_e51229b018134b93904b25b6372cbb42~mv2.jpg/v1/fill/w_980,h_588,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/3ac0d8_e51229b018134b93904b25b6372cbb42~mv2.jpg)
Don’t assume data security is a lost cause!
Several major vendors in the security space propose a strategy called ‘assume compromise’. This promotes thinking and planning actions based on the assumption that a security event will eventually occur- 'it is not a matter of if, but when". Such planning helps in conducting preparation drills and improving response times and effectiveness of remedial actions.
However, this should not mislead us into assuming that security events are commonplace and that our data is probably already stolen and hence it is pointless to adopt any security measures at all! On the contrary, security is an ongoing process and one breach cannot justify letting the guard down.

Let the mobile phone have breathing space
Finally, filling up storage and memory with unused apps consuming valuable resources isn’t a good idea. Keep your digital devices free of clutter so that the operating system and apps can expand if need be. Most device manufacturers and operating system providers provide decluttering tools, use them often to keep your device performing at its best.
Tips
Be selective in trying out apps
Stick to the top app makers
Do not share data or give privileges unless necessary
When no longer using an app, revoke its privileges
We encourage you to read the article on how a mobile app creator’s success banks on India’s inadequate privacy laws.




Comments