The user can review which applications have location and sensitive phone information permissions in the operating system’s settings menu.
Application vetting services can detect unnecessary and potentially abused API calls.
Application vetting services can detect unnecessary and potentially abused permissions.
| Data Component | Name | Channel |
|---|---|---|
| System Settings (DC0118) | User Interface | None |
| API Calls (DC0112) | Application Vetting | None |
| Permissions Requests (DC0114) | Application Vetting | None |
The user can review which applications have location and sensitive phone information permissions in the operating system’s settings menu.
Application vetting services can detect unnecessary and potentially abused API calls.
Application vetting services can detect unnecessary and potentially abused permissions.
| Data Component | Name | Channel |
|---|---|---|
| System Settings (DC0118) | User Interface | None |
| API Calls (DC0112) | Application Vetting | None |
| Permissions Requests (DC0114) | Application Vetting | None |