PogoWasRight.org

Menu
  • About
  • Privacy
Menu

90% of mobile apps could be in breach of Singapore privacy law

Posted on November 1, 2015June 26, 2025 by Dissent

Irene Tham reports:

Ninety per cent of mobile apps in Singapore do not adequately declare what consumer data is collected or how it is used, potentially falling foul of Singapore’s Personal Data Protection Act (PDPA) .

Yet, more than half of the mobile apps that people download seek access to swathes of sensitive information, such as users’ online and social media identities and location.

This comes from an inaugural study of the privacy policies of 113 popular apps from the Singapore Google Play store. The sample comprises taxi apps as well as those from banks, telcos, real estate agents and financial advisers.

Read more on The Straits Times.

From the press release issued by Straits Interactive:

Key Highlights of the Findings
Straits Interactive looked at the types of permissions an app was seeking, whether those permissions exceeded what would be expected based on the app’s functionality, and most importantly, how the app explained to consumers why it wanted the personal information and what it planned to do with it. The findings showed that:

  • More than 89% of the apps request more than 1 permission compared to the global average of 75% (67% of these applications request more than five permissions)
  • 58% of apps had excessive permissions based on sweeper’s understanding of app’s functionality
  • 18% of the apps had no data protection policy or information, other than permissions
  • 55% of the apps did not have adequate privacy information as the sweeper did not know how information would be collected, used and disclosed
  • In terms of permissions, many of the apps surveyed require potentially sensitive information such as location information – 70% (compared to 32% global average); 29% requests permission to access the camera and 52% to the device ID.

Further analysis of mobile apps code
To drill down further into the security and privacy loopholes, Appknox did a code analysis of the apps concerned, covering basic coding practices, data flow and metrics which include OWASP or Open Web Application Security Project configurations. The top three risks discovered were:

  • 69% – Remote Code Execution Through Java Script Interface (where a remote attacker can execute malicious code, extract all user data or load malware on the device)
  • 61% – Broken Trust Manager for SSL (a TrustManager is what the system uses to validate security certificates from the server)
  • 52%- Derived Crypto keys (Weak encryption technique)

Unfortunately, the full survey is not free, but can be ordered “for a nominal fee.” See their press release.

Related posts:

  • How the Federal Government Buys Our Cell Phone Location Data
  • There’s a Multibillion-Dollar Market for Your Phone’s Location Data
  • The Popular Family Safety App Life360 Is Selling Precise Location Data on Its Tens of Millions of Users
  • How Political Campaigns Use Your Phone’s Location to Target You
Category: BreachesBusiness

Post navigation

← Facebook’s inadequate response to backlash over “real name policy”
Liquor Control Board of Ontario spent $270K fighting order to stop collecting personal info – and lost →

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • Modern cars are spying on you. Here’s what you can do about it.
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data       
  • EU Parliament committee votes to advance controversial Europol data sharing proposal
  • DHS offers “disturbing new excuses” to seize kids’ biometric data, expert says
  • California Adds Injunctive Relief to its Right of Publicity Statute and Extends Liability to Digital Replicas
  • DHS Gives Local Cops a Facial Recognition App To Find Immigrants
  • Phone location data of top EU officials for sale, report finds

RSS Recent Posts at DataBreaches.net

  • NCCIA arrests man over massive data breach involving millions of Pakistanis
  • Defense Contractors Are Silencing Their Cybersecurity Watchdogs
  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • ALT5 Sigma sues former consultant over alleged data breach
  • Is your cyberinsurance paid up? Are you sure?
©2025 PogoWasRight.org. All rights reserved.