Application Consent and Permissions
What is Application Consent?
What app permissions should you avoid?
There’s no universal rule for which app permissions you should always allow or deny. Different permissions exist for various reasons. One app may need specific permission to function, while another may request the same permission to collect and sell your data. However, some app permissions enable access to more sensitive data than others, so they deserve a closer look. (iOS and Android app permissions may be named differently, depending on the version of your operating system.)
Apart from the usual app permissions, some software may request special access. Essentially, this access includes several different permissions, such as:
- Access to all files
- Appear on top
- Ignore the “Do not disturb” mode
- Change system settings
- Install unknown apps
- Control Wi-Fi
Many other app permissions can become dangerous if a malicious or vulnerable app can access them. For example, you may not consider your step count confidential information, but permission to access body sensors can reveal sensitive health data. Meanwhile, access to nearby devices can aid cross-device tracking.
Permissions You Provide
The permissions requested by an application can vary depending on its functionality and the services it integrates with. Common permissions include:
- Access to your basic profile information (name, email, profile picture).
- Access to your contacts or friend list.
- Permission to post on your behalf.
- Access to your location data.
- Access to your photos or media files.
- Ability to send you notifications.
Why Permissions Are Required?
Permissions are required to ensure that applications and services access only the necessary data and functionalities needed to provide their intended features or services while respecting user privacy and security. Permissions strike a balance between enabling applications to provide useful features and services while protecting user privacy, enhancing data security, and ensuring compliance with regulations.
Protecting Your Privacy
It’s essential to review the permissions requested by applications and only grant access to the information and features you’re comfortable with. Be cautious when granting permissions to unfamiliar or untrusted applications, as they could misuse your data.
Important Things to Consider
Where You Download the App
One of the first things to consider is where the apps are downloaded from. Always make sure they come from a trusted source. If they don’t, it’s impossible to tell what security vulnerabilities might be hiding inside the application.
The Fine Print
Always take the time to review the fine print. It might seem like a wasted effort, especially when you see apps with tens of thousands of positive reviews. However, without reviewing the fine print, you don’t know what you are agreeing to.
Reviewing and Granting Permissions
In addition to downloading from a trusted source and being aware of what you agree to by installing the app, you should understand the permissions you are granting the app. Permissions control what an app is allowed or not allowed to do on a device. By granting permissions, you allow an app to use a feature, and by denying access, you prevent it from using a feature. Ensure you understand that you have full control over these permissions.
Approval Process for Extended Access
Extended access to sensitive data within your account is granted by IT services, while you can permit access to specific areas linked to your account. This practice guarantees the protection and confidentiality of both your information and the College’s. If you would like to request access, please submit a ticket.
Permission scopes for which Trinity will not grant users admin consent
API & Permission Scope | The reason we won’t grant |
Permission scopes for which we will grant admin consent, but only under specific circumstances
API & Permission Scope | Explanation |