Privacy Mobile Device Pattern
Click any control badge to view its details. Download SVG
Key Control Areas
- Data Minimisation and Purpose Limitation: Mobile applications and device configurations should enforce the principle of collecting and retaining only the personal data necessary for the specified purpose. This means designing mobile apps to request minimal permissions, implementing selective data sync rather than full dataset replication to devices, setting automatic data retention and purging schedules for locally cached PII, and ensuring that when personal data is no longer needed on the device it is securely deleted rather than merely marked for overwrite. Organisations should audit mobile applications for data collection practices, including third-party SDKs and analytics frameworks that may collect personal data without the user's explicit knowledge.
- Encryption and Data Protection at Rest: All personal data stored on mobile devices must be encrypted at rest using device-level full disk encryption and, where appropriate, application-level encryption for particularly sensitive data. Modern mobile operating systems (iOS, Android) provide hardware-backed encryption by default when a passcode is set, but organisations must verify this is enforced via MDM policy and that the encryption cannot be disabled. Application-level encryption provides defence in depth for high-sensitivity data (health records, financial data, biometric data) and protects against attacks where the device is unlocked but the specific application is not. Encryption key management should leverage hardware security modules (Secure Enclave, StrongBox) where available.
- Secure Transmission of Personal Data: Personal data transmitted from mobile devices must be protected in transit using TLS 1.2 or higher with certificate pinning for high-sensitivity applications. Mobile apps should validate server certificates, implement certificate transparency checking, and fail closed if a secure connection cannot be established rather than falling back to unencrypted transmission. APIs that mobile apps connect to should implement mutual TLS where the sensitivity of the data warrants it. VPN usage should be mandated when accessing personal data over untrusted networks.
- Consent Management and Data Subject Rights: Mobile applications that collect personal data must implement robust consent mechanisms that comply with applicable regulations. This includes granular consent for different processing purposes, easy withdrawal of consent, clear privacy notices presented at the point of collection, and mechanisms to honour data subject access requests (DSARs) for data held locally on devices. The organisation must be able to identify what personal data exists on which mobile devices and execute erasure requests that extend to mobile device storage, not just server-side databases.
- BYOD Privacy and Corporate-Personal Separation: In BYOD environments, the organisation's MDM and security controls must not infringe on the employee's personal privacy. Containerisation solutions (Android Work Profile, iOS managed apps, Samsung Knox) separate corporate data from personal data, ensuring that remote wipe operations only affect the corporate container. MDM policies should be transparent about what data the organisation can and cannot access on personal devices. Location tracking, if used, must be proportionate and disclosed. The organisation's privacy policy for BYOD must clearly articulate the boundaries of monitoring and the employee's privacy rights.
- Data Protection Impact Assessment for Mobile Processing: High-risk processing of personal data on mobile devices requires a DPIA under GDPR Article 35 and equivalent provisions in other regulations. Scenarios that trigger a DPIA include: mobile processing of special category data (health, biometric, genetic), large-scale processing of personal data on mobile devices, systematic monitoring of individuals via mobile apps, and use of new mobile technologies for personal data processing (AR, ML-based profiling, location analytics). The DPIA should evaluate the necessity and proportionality of mobile processing, identify risks to data subjects, and document the measures implemented to mitigate those risks.
When to Use
Apply this pattern when the organisation processes personally identifiable information on mobile devices and is subject to data protection regulations such as GDPR, CCPA/CPRA, HIPAA, LGPD, POPIA, or sector-specific privacy requirements. This includes organisations in regulated industries (financial services, healthcare, legal, insurance) that handle client or patient PII on mobile devices, any organisation subject to California SB-1386 or its successor CCPA breach notification requirements, organisations deploying mobile applications that collect user data, and BYOD environments where corporate data containing PII coexists with personal data on employee-owned devices.
When NOT to Use
This pattern is not necessary if the organisation does not process any PII or confidential personal information on mobile devices and has technical controls in place to prevent PII from reaching mobile endpoints. It does not apply to mobile devices used exclusively for non-sensitive corporate functions where no personal data is accessed or stored. Organisations that prohibit mobile device access to personal data systems and enforce this through network-level controls may not need this pattern, though they should still consider the residual risk of personal data in email, messaging, and cached web content on mobile devices.
Typical Challenges
The primary challenge is visibility: organisations often lack a complete inventory of what personal data exists on which mobile devices, making it difficult to respond to data subject requests or demonstrate compliance during audits. Data subject access requests and right-to-erasure requests are particularly complex when personal data may be cached on multiple mobile devices in offline-capable applications. BYOD environments create tension between the organisation's need to protect corporate data and the employee's expectation of personal privacy -- overly intrusive MDM policies drive shadow IT behaviour where employees avoid managed devices. Mobile application developers (both internal and third-party) frequently embed analytics and advertising SDKs that collect personal data without adequate privacy assessment, creating compliance exposure. Cross-border data transfer is complicated by mobile devices that travel internationally, potentially triggering data localisation requirements when a device containing EU personal data is carried to a non-adequate country. Secure deletion on mobile devices is not always straightforward -- flash storage wear levelling means that deleted data may persist in unallocated blocks, though modern hardware-backed encryption mitigates this by making the data unreadable when the key is destroyed.
Threat Resistance
This pattern addresses the threat of unauthorised disclosure of personal data through device loss or theft, mitigated by encryption at rest and remote wipe capabilities. It resists privacy violations from excessive data collection by mobile applications through data minimisation principles and application privacy auditing. The pattern mitigates regulatory non-compliance risk from uncontrolled mobile processing of personal data by providing governance frameworks for mobile privacy. It addresses the threat of personal data interception in transit through mandatory TLS and VPN usage. In BYOD scenarios, it mitigates the risk of privacy infringement against employees through containerisation and transparent monitoring policies. It provides partial resistance against insider threats involving personal data exfiltration from mobile devices through DLP controls and application restrictions. The pattern does not fully mitigate targeted device exploitation by nation-state actors, though device encryption and hardening significantly raise the cost of such attacks.
Assumptions
The organisation processes PII or other regulated personal data on mobile devices and is subject to data protection legislation (GDPR, CCPA, HIPAA, or equivalent). Mobile device management infrastructure exists or can be deployed to enforce privacy-related device policies. The organisation has a data protection officer or equivalent function capable of advising on mobile privacy requirements. For BYOD scenarios, the organisation has the legal and contractual basis to apply containerisation and selective management to personal devices. Users have been informed about the personal data processing that occurs on their mobile devices and appropriate consent or legal basis has been established.