Hey Startups! ‘Minimum Viable Product’ Includes Privacy Controls for Users

By on February 15, 2012
checklist image

The last couple of weeks have exposed a couple of high-profile instances of neglectful, or willful, appropriation of users’ personal information by start-ups. The first was by Path. It was revealed that Path was uploading each user’s address book to its servers, in the background, without prior consent. The second was by Hipster. Hipster didn’t store its users’ address book data, but did transmit it (without consent) over a non-secure connection to use for matching with other Hipster profiles.

I’m going to just assume here that neither of these actions were done maliciously, as that would be a whole other discussion. But they do reveal how the perception of “minimum viable product” (MVP) amongst start-ups is sorely lacking with respect to information privacy controls when it comes to getting a first release out the door. If anyone thinks it’s Apple’s responsibility to prevent developer data access from happening, think again. Just like it’s not Microsoft’s responsibility to protect you from every conceivable threat on Windows, it’s up to the developers of mobile applications to behave appropriately on Apple’s platform, and in the best interest of their users.

The core issue is that when many developers and product managers sit down to decide on the ‘features’ for their MVP, they only focus on the features that are directly visible to the end user. Features that relate to technology or design “behind the scenes” are often the first on the list to be cut in order to speed the product to market. The shame of it is that both of these recent instances of misuse of user information could have been mitigated with a couple of simple steps to at least secure the data transmission and formats.

Hipster is hosting a privacy summit tomorrow, and to help, I’ve created a simple user privacy check-list for devs when scoping their MVP.

Everyone developing products should consider at least the following when using or accessing someone’s personal data:

    1. Secure the data transmission. At a minimum use HTTPS, which provides SSL security to the transmission. But if you’re not running over an HTTP/HTTPS connection, then encrypt the data so that it’s not simply enough to monitor the data stream coming from a device and read all the information transmitted.

    2. Ask yourself if you really need the data itself or just need to match data together? If all you’re doing is matching patterns (like looking for matching email addresses) then you can just hash the actual pieces of user data and match on the hashes. This is actually very easy and simple to do, and Matt Gemmell has a great post about it.

    3. Have a clearly written policy about what you are using a user’s personal data for and if/how you are storing it. It’s as easy as adding an extra checkbox on the signup form with a link to the privacy policy. I also personally like the approach Foursquare has taken on their FAQ.

    4. If you are storing user information (and do you really NEED to or just WANT to?), how are you storing it and is it secure on your servers? Server security is just as important as the security on the app itself. Servers are the focal point for crackers as there’s way more value in breaking into a repository of personal information than trying to compromise an individual user. There are strict rules for storing credit card info and similar care should be taken for personal data.

If you’re not respecting your users’ personal information, at some point, you will have a negative public relation incident, and the “no press is bad press” saying definitely does not hold true in this case. Just ask Path.




About Jeff Bacon

Jeff Bacon is the Director of Mobile Strategy at bitHeads Inc. He helps companies understand how to best bring their business to mobile and plan execution strategies to maximise the value mobile can bring to any business. You can read more on the bitHeads’ blog: www.bitheads.com/blog or follow @bitHeads or @TheSuaveHog on Twitter. Check out bitHeads’ mobile portfolio here: http://www.bitheads.com/mobilecustomershowcase.php
  • http://www.facebook.com/dougludlow Doug Ludlow

    Jeff – this is Doug Ludlow, CEO of Hipster.

     Thanks for writing about the privacy summit.  However, its not going to be held tomorrow, and here’s why. After we announced that we were holding the summit, we quickly got more interest than our office could hold.  We’ve found a larger venue for the event, but will need to push back the summit until next week.

  • http://BaconOnTheGo.com Jeff Bacon

    That was actually something I thought when you first announced it, that you better have big offices =). I’d love to participate and hear different opinions but I’ll have to make do with hearing about the discussions afterwards.

  • http://blogs.blackberry.com Douglas tr0n Soltys

    Hey Doug,

    Thanks for taking a time to post a comment and let us know. Will there be a live stream of the event or any way to participate online?

    Also, thoughts on the Jeff’s checklist? Anything you’d add or disagree with when it comes to MVP?

  • Pingback: m-Pulse Episode #6: Privacy in your MVP, instant gratification is spreading across the Atlantic + Roberto Pieraccini on mobile and voice | UNTETHER.tv()

  • Pingback: M-Pulse ANALYSIS: How Will Battle Around Mobile Voice Play Out? | mobilegroove()