{"id":30063,"date":"2021-12-02T18:34:12","date_gmt":"2021-12-02T07:34:12","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/ios-15-permissions-guide\/30063\/"},"modified":"2021-12-02T18:34:45","modified_gmt":"2021-12-02T07:34:45","slug":"ios-15-permissions-guide","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/ios-15-permissions-guide\/30063\/","title":{"rendered":"Setting app permissions in iOS 15"},"content":{"rendered":"<p>With each version of iOS, we\u2019ve seen developers try to protect user data better. However, the core principle remains unchanged: You, the user, gets to decide what information to share with which apps. With that in mind, we\u2019ve put together an in-depth review of app permissions in iOS 15 to help you decide which requests to allow and which to deny.<\/p>\n<h2>Where to find iOS 15 app permission settings<\/h2>\n<p>iOS 15 offers several ways to manage permissions. We\u2019ll talk about each of the three methods separately.<\/p>\n<h3>Managing permissions when you first launch an app<\/h3>\n<p>Every app requests permission to access certain information the first time you launch it, and that\u2019s the easiest time to choose what data to share with the app. But even if you accidentally press \u201cYes\u201d instead of \u201cNo,\u201d you can still change it later.<\/p>\n<h3>Setting up all permissions for a specific app<\/h3>\n<p>To see and set all permissions for a particular app at once, open the system settings and scroll down to see a list of installed applications. Select an app to see what permissions it has and revoke them if you need to.<\/p>\n<h3>Setting specific permissions for different applications<\/h3>\n<p>Go to <em>Settings \u2192 Privacy<\/em>. In this section, you will find a long list of basic iOS 15 permissions. Click on each permission to see which applications requested it. You can deny access to any of them at any time.<\/p>\n<p>Not all permissions are in the <em>Privacy<\/em> menu; you\u2019ll need to go to other settings sections to configure some of them. For example, you can disable mobile data transfer for apps in the <em>Mobile<\/em> section, and permission to use the Internet in the background is configured in the <em>Background App Refresh<\/em> section.<\/p>\n<p>Now you know where to look for what. Next, we\u2019ll go into more detail about all of iOS\u2019s permissions.<\/p>\n<ul>\n<li><a href=\"#location-services\" target=\"_blank\" rel=\"noopener\">Location Services<\/a><\/li>\n<li><a href=\"#tracking\" target=\"_blank\" rel=\"noopener\">Tracking<\/a><\/li>\n<li><a href=\"#contacts\" target=\"_blank\" rel=\"noopener\">Contacts<\/a><\/li>\n<li><a href=\"#calendars\" target=\"_blank\" rel=\"noopener\">Calendars<\/a><\/li>\n<li><a href=\"#reminders\" target=\"_blank\" rel=\"noopener\">Reminders<\/a><\/li>\n<li><a href=\"#photos\" target=\"_blank\" rel=\"noopener\">Photos<\/a><\/li>\n<li><a href=\"#local-network\" target=\"_blank\" rel=\"noopener\">Local Network<\/a><\/li>\n<li><a href=\"#nearby-interactions\" target=\"_blank\" rel=\"noopener\">Nearby Interaction<\/a><\/li>\n<li><a href=\"#microphone\" target=\"_blank\" rel=\"noopener\">Microphone<\/a><\/li>\n<li><a href=\"#speech-recognition\" target=\"_blank\" rel=\"noopener\">Speech Recognition<\/a><\/li>\n<li><a href=\"#camera\" target=\"_blank\" rel=\"noopener\">Camera<\/a><\/li>\n<li><a href=\"#health\" target=\"_blank\" rel=\"noopener\">Health<\/a><\/li>\n<li><a href=\"#sensor-and-usage-data\" target=\"_blank\" rel=\"noopener\">Research Sensor &amp; Usage Data<\/a><\/li>\n<li><a href=\"#homekit\" target=\"_blank\" rel=\"noopener\">HomeKit<\/a><\/li>\n<li><a href=\"#media-and-apple-music\" target=\"_blank\" rel=\"noopener\">Media &amp; Apple Music<\/a><\/li>\n<li><a href=\"#files-and-folders\" target=\"_blank\" rel=\"noopener\">Files and Folders<\/a><\/li>\n<li><a href=\"#motion-and-fitness\" target=\"_blank\" rel=\"noopener\">Motion &amp; Fitness<\/a><\/li>\n<li><a href=\"#focus\" target=\"_blank\" rel=\"noopener\">Focus<\/a><\/li>\n<li><a href=\"#analytics-and-improvements\" target=\"_blank\" rel=\"noopener\">Analytics &amp; Improvements<\/a><\/li>\n<li><a href=\"#apple-advertising\" target=\"_blank\" rel=\"noopener\">Apple Advertising<\/a><\/li>\n<li><a href=\"#record-app-activity\" target=\"_blank\" rel=\"noopener\">Record App Activity<\/a><\/li>\n<li><a href=\"#mobile-data\" target=\"_blank\" rel=\"noopener\">Mobile Data<\/a><\/li>\n<li><a href=\"#background-app-refresh\" target=\"_blank\" rel=\"noopener\">Background App Refresh<\/a><\/li>\n<\/ul>\n<h2 id=\"location-services\">Location Services<\/h2>\n<p><strong>What it is:<\/strong> Permission to access your location. This permission isn\u2019t just about GPS; apps can also navigate using mobile network base stations, Bluetooth, and the coordinates of Wi-Fi hotspots you are connected to. Access to location services is used, for example, by maps to plot routes and show you nearby businesses.<\/p>\n<p><strong>What the risks are:<\/strong> Having location access enables apps to map your movements accurately. App developers can use that data for marketing purposes, and cybercriminals can use it to spy on you.<\/p>\n<p>You may not want to give this permission to an app if you don\u2019t fully trust it or don\u2019t think it needs that level of information. For example, social networks can do without location access if you don\u2019t add geotags to your posts or if you prefer to do so manually.<\/p>\n<p>In case you need an app that needs location access to work properly, here are two ways to protect yourself from being tracked:<\/p>\n<ul>\n<li>Allow access to location only <em>while using the app<\/em> to give the app access to your coordinates only when you are actually using it. If the app wants to receive location information in the background, you will be <a href=\"https:\/\/support.apple.com\/en-us\/HT203033\" target=\"_blank\" rel=\"nofollow noopener\">notified and may opt out<\/a>.<\/li>\n<li>Turn off <em>Precise Location<\/em> to restrict the app\u2019s knowledge of your location. In this case, the margin of error will be about 25 square kilometers (or 10 square miles) \u2014 that\u2019s comparable to the area of a small city.<\/li>\n<\/ul>\n<p>What\u2019s more, iOS has long had an indicator that lets you know that an app is requesting access to your location. With iOS 15, that indicator has become much more prominent, appearing as a bright blue icon with a white arrow at the top of the screen.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2021\/12\/02183423\/iOS-15-permissions-guide-geolocation-icon-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2021\/12\/02183423\/iOS-15-permissions-guide-geolocation-icon-1.png\" alt=\"When an app is accessing your location, iOS 15 shows a bright blue icon with a white arrow inside\" width=\"1346\" height=\"300\" class=\"aligncenter size-full wp-image-30064\"><\/a><\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Location Services<\/em><\/p>\n<h2 id=\"tracking\">Tracking<\/h2>\n<p><strong>What it is:<\/strong> Permission to access a unique device identifier \u2014 the Identifier for Advertisers, or IDFA. Of course, each individual application can track a user\u2019s actions in its own \u201cterritory.\u201d But access to IDFA allows data matching across apps to form a much more detailed \u201cdigital portrait\u201d of the user.<\/p>\n<p>So, for example, if you allow tracking in all applications, then a social network can not only see all of your records and profile information in it, but also find out what games you play, what music you listen to, the weather in cities you are interested in, what movies you watch, and much more.<\/p>\n<p><strong>What the risks are:<\/strong> Tracking activity in apps enables the compilation of a much more extensive dossier on the phone\u2019s owner, which increases advertising efficacy. In other words, it can encourage you to spend more money.<\/p>\n<p>Starting in iOS 14.5, users gained the ability to <a href=\"https:\/\/www.kaspersky.com\/blog\/apptracking-transparency-in-ios-ipados-tvos-14-5\/39690\/\" target=\"_blank\" rel=\"noopener nofollow\">disable tracking requests in apps<\/a>.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Tracking<\/em><\/p>\n<h2 id=\"contacts\">Contacts<\/h2>\n<p><strong>What it is:<\/strong> Permission to access your address book \u2014 to read and change existing contacts and to add new contacts. Data an app can get with this permission includes not only names, phone numbers, and e-mail addresses, but also other information from your list of contacts, including notes about specific contacts (although apps need separate approval from Apple to access the notes).<\/p>\n<p><strong>What the risks are:<\/strong> Databases of contacts \u2014 with numbers, addresses, and other information \u2014 can, for example, be used to attack an organization, send spam, or conduct <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-vishing\/40410\/\" target=\"_blank\" rel=\"noopener nofollow\">phone scams<\/a>.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Contacts<\/em><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h2 id=\"calendars\">Calendars<\/h2>\n<p><strong>What it is:<\/strong> Permission to view, change, and add calendar events.<\/p>\n<p><strong>What the risks are:<\/strong> The app will receive all of your personal calendar information, including past and scheduled events. That may include doctor\u2019s appointments, meeting topics, and other information you don\u2019t want to share with outsiders.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Calendars<\/em><\/p>\n<h2 id=\"reminders\">Reminders<\/h2>\n<p><strong>What it is:<\/strong> Permission to read and change existing reminders and add new ones.<\/p>\n<p><strong>What the risks are:<\/strong> If you have something personal recorded in your Reminders app, such as health data or information about family members, you may not want to share it with any app developers.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Reminders<\/em><\/p>\n<h2 id=\"photos\">Photos<\/h2>\n<p><strong>What it is:<\/strong> This permission allows the app to view, add, and delete photos and videos in your phone\u2019s gallery. The app also can read photo metadata, such as information about where and when a photo was taken. Apps that need access to Photos include image editors and social networks.<\/p>\n<p><strong>What the risks are:<\/strong> A personal photo gallery can say a lot about a person, from who their friends are and what they\u2019re interested in to where they go, and when. In general, even if you don\u2019t have nude photos, pictures of both sides of your credit card or screenshots with passwords in the gallery, you should be cautious about giving apps access to yours.<\/p>\n<p>Starting with iOS 14, Apple developers added the ability to give an app access to individual files without giving them the entire gallery. For example, if you want to post something on Instagram, you can choose precisely which images to upload and keep your other photos invisible to the social network. In our opinion, that\u2019s the best option for providing access to your images.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Photos<\/em><\/p>\n<h2 id=\"local-network\">Local Network<\/h2>\n<p><strong>What it is:<\/strong> Permission to connect to other devices on your local network, for example, to play music with AirPlay, or to control your router or other gadgets.<\/p>\n<p><strong>What the risks are:<\/strong> With this type of access, applications can collect information about all of the devices on your local network. Data about your equipment can help an attacker find vulnerabilities, <a href=\"https:\/\/www.kaspersky.com\/blog\/hacked-routers-dns-hijacking\/26802\/\" target=\"_blank\" rel=\"noopener nofollow\">hack your router<\/a>, and more.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Local Network<\/em><\/p>\n<h2 id=\"nearby-interactions\">Nearby Interaction<\/h2>\n<p><strong>What it is:<\/strong> Permission to use <a href=\"https:\/\/support.apple.com\/en-gb\/guide\/iphone\/iph771fd0aad\/ios\" target=\"_blank\" rel=\"nofollow noopener\">Ultra Wideband<\/a> (UWB), which the iPhone 11 and later support. Using UWB lets you measure the exact distance between your iPhone and other devices that support the technology. In particular, it\u2019s used in Apple AirTag to find things you\u2019ve tagged.<\/p>\n<p><strong>What the risks are:<\/strong> A malicious app with UWB access can determine your location extremely accurately, to an exact room in a house or even more precisely.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Nearby Interaction<\/em><\/p>\n<h2 id=\"microphone\">Microphone<\/h2>\n<p><strong>What it is:<\/strong> Permission to access your microphone.<\/p>\n<p><strong>What the risks are:<\/strong> With this permission, the app can record all conversations near the iPhone, such as in business meetings or at a medical appointment.<\/p>\n<p>An orange dot in the upper right corner of the screen indicates when an app is using a microphone (the dot <a href=\"https:\/\/discussions.apple.com\/thread\/251819144\" target=\"_blank\" rel=\"nofollow noopener\">becomes red<\/a> when you turn on the <em>Increase Contrast<\/em> accessibility feature).<\/p>\n<div id=\"attachment_43050\" style=\"width: 1356px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2021\/12\/02183431\/iOS-15-permissions-guide-amber-dot.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-43050\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2021\/12\/02183431\/iOS-15-permissions-guide-amber-dot.png\" alt=\"When an app is using the microphone, iOS 15 shows an orange dot\" width=\"1346\" height=\"300\" class=\"size-full wp-image-30066\"><\/a><p id=\"caption-attachment-43050\" class=\"wp-caption-text\">When an app is using the microphone, iOS 15 shows an orange dot<\/p><\/div>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Microphone<\/em><\/p>\n<h2 id=\"speech-recognition\">Speech Recognition<\/h2>\n<p><strong>What it is:<\/strong> Permission to send voice-command recordings to Apple\u2019s servers for recognition. An app needs this permission only if it uses Apple\u2019s speech recognition service. If the app uses a third-party library for the same purpose, it will need another permission (Microphone) instead.<\/p>\n<p><strong>What the risks are:<\/strong> By and large, asking for this permission is indicative of an app developer\u2019s honest intentions \u2014 by using Apple\u2019s proprietary speech recognition service, they are following the company\u2019s rules and recommendations. A malicious app is much more likely to ask for direct access to the microphone. Nevertheless, use caution granting permission for speech recognition.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Speech Recognition<\/em><\/p>\n<h2 id=\"camera\">Camera<\/h2>\n<p><strong>What it is:<\/strong> Permission to take photos and videos, and to obtain metadata such as location and time.<\/p>\n<p><strong>What the risks are:<\/strong> An application can connect to the phone\u2019s cameras at any time, even without your knowledge, and obtain access to photos\u2019 metadata (the time and location where they were taken). Attackers can use this permission to spy on you.<\/p>\n<p>If an application is currently accessing the camera, a green dot lights up in the upper right corner of the screen.<\/p>\n<div id=\"attachment_43045\" style=\"width: 1356px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2021\/12\/02183440\/iOS-15-permissions-guide-green-dot.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-43045\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2021\/12\/02183440\/iOS-15-permissions-guide-green-dot.png\" alt=\"When an app is using the camera, iOS 15 shows a green dot\" width=\"1346\" height=\"300\" class=\"size-full wp-image-30068\"><\/a><p id=\"caption-attachment-43045\" class=\"wp-caption-text\">When an app is using the camera, iOS 15 shows a green dot<\/p><\/div>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Camera<\/em><\/p>\n<h2 id=\"health\">Health<\/h2>\n<p><strong>What it is:<\/strong> Permission to access data you keep in the Health app, such as height, weight, age, and disease symptoms.<\/p>\n<p><strong>What the risks are:<\/strong> App developers may sell your health information to advertisers or insurance companies, which can tailor ads based on that data or use it to calculate health insurance rates.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Health<\/em><\/p>\n<h2 id=\"sensor-and-usage-data\">Research Sensor &amp; Usage Data<\/h2>\n<p><strong>What it is:<\/strong> Access to data from the phone\u2019s built-in sensors, such as the light sensor, accelerometer, and gyroscope. Judging by indirect references in <a href=\"https:\/\/www.apple.com\/legal\/privacy\/data\/en\/sensor-usage-data\/\" target=\"_blank\" rel=\"nofollow noopener\">this document<\/a>, that could also include data from the microphone and facial recognition sensor, as well as from iWatch sensors. The permission can also provide access to data about keyboard usage, the number of messages sent, incoming and outgoing calls, categories of apps used, websites visited, and more.<\/p>\n<p>As you can see, this permission can provide a range of sensitive data about the device\u2019s owner. Therefore, only apps designed for health and lifestyle research should request it.<\/p>\n<p><strong>What the risks are:<\/strong> The permission can allow outsiders to obtain information about you that is not available to ordinary apps. In particular, this data allows examination of your walking pattern, the position of your head while you\u2019re looking at the screen, and collecting a lot of information about how you use your device.<\/p>\n<p>Of course, you shouldn\u2019t provide that much data about yourself to just anyone. Before agreeing to participate in a study and providing permission to the app in question, take a good look at what data the scientists are interested in, and how they plan to use it.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Research Sensor &amp; Usage Data<\/em><\/p>\n<h2 id=\"homekit\">HomeKit<\/h2>\n<p><strong>What it is:<\/strong> The ability to control smart home devices.<\/p>\n<p><strong>What the risks are:<\/strong> With this level of access, an app can control smart home devices on your local network. For example, it can open smart door locks and blinds, turn music on and off, and control lights and security cameras. A random photo-filter app (for example) should not need this permission.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 HomeKit<\/em><\/p>\n<h2 id=\"media-and-apple-music\">Media &amp; Apple Music<\/h2>\n<p><strong>What it is:<\/strong> Permission to access your media library in Apple Music and iCloud. Apps will receive information about your playlists and personal recommendations, and they will be able to play, add, and delete tracks from your music library.<\/p>\n<p><strong>What the risks are:<\/strong> If you don\u2019t mind sharing your music preferences with the app, you probably have nothing to worry about, but be aware that this data may also be used for advertising purposes.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Media &amp; Apple Music<\/em><\/p>\n<h2 id=\"files-and-folders\">Files and Folders<\/h2>\n<p><strong>What it is:<\/strong> Permission to access documents stored in the Files app.<\/p>\n<p><strong>What the risks are:<\/strong> Apps can change, delete, even steal important documents stored in the Files app. If you\u2019re using Files to store important data, keep access limited to the apps you truly trust.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Files and Folders<\/em><\/p>\n<h2 id=\"motion-and-fitness\">Motion &amp; Fitness<\/h2>\n<p><strong>What it is:<\/strong> Permission to access data about your workouts and daily physical activity, such as number of steps taken, calories burned, and so on.<\/p>\n<p><strong>What the risks are:<\/strong> Just like medical data from the Health app, activity data may be used by marketers to display targeted ads and by insurance companies to calculate health insurance costs.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Motion &amp; Fitness<\/em><\/p>\n<h2 id=\"focus\">Focus<\/h2>\n<p><strong>What it is:<\/strong> This permission allows apps to see if notifications on your smartphone are currently muted or enabled.<\/p>\n<p><strong>What the risks are:<\/strong> None.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Focus<\/em><\/p>\n<h2 id=\"analytics-and-improvements\">Analytics &amp; Improvements<\/h2>\n<p><strong>What it is:<\/strong> Permission to collect and send data to Apple about how you use your device. It includes, for example, information about the country you live in and the apps you run. Apple uses the information to improve the operating system.<\/p>\n<p><strong>What the risks are:<\/strong> Your smartphone may use mobile data to send Apple data, potentially draining both the battery and your data plan a bit faster.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Analytics &amp; Improvements<\/em><\/p>\n<h2 id=\"apple-advertising\">Apple Advertising<\/h2>\n<p><strong>What it is:<\/strong> Permission to collect personal information such as your name, address, age, gender, and more, and use it to show targeted ads from Apple\u2019s ad service \u2014 but not to share it with other companies. Disabling this permission will not eliminate ads, but without data collection they will be generic, not targeted.<\/p>\n<p><strong>What the risks are:<\/strong> As with any targeted ads, more effective advertising may lead to extra spending.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Apple Advertising<\/em><\/p>\n<h2 id=\"record-app-activity\">Record App Activity\n<\/h2><p><strong>What it is:<\/strong> Permission to keep track of what data (location, microphone, camera, etc.) any given application accessed. At the time of this writing (using iOS 15.1), users may download the collected data as a file, albeit not a very informative one. Future versions of iOS (starting with 15.2, expected at the end of 2021) will use this data for the <a href=\"https:\/\/www.apple.com\/newsroom\/2021\/06\/apple-advances-its-privacy-leadership-with-ios-15-ipados-15-macos-monterey-and-watchos-8\/\" target=\"_blank\" rel=\"nofollow noopener\">App Privacy Report<\/a>, which is a bit like Screen Time, but for app tracking.<\/p>\n<p><strong>What\u2019s useful:<\/strong> If you want to use the App Privacy Report as soon as iOS 15.2 becomes available, you may want to enable app activity logging in advance.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Privacy \u2192 Record App Activity<\/em><\/p>\n<h2 id=\"mobile-data\">Mobile Data<\/h2>\n<p><strong>What it is:<\/strong> Permission to use mobile Internet. Applications need access to the Web to send messages, load photos and news feeds, and complete technical tasks such as sending bug reports.<\/p>\n<p><strong>What the risks are:<\/strong> Apps working in the background can quickly deplete data allowances. Users may prefer to deny mobile Internet access to apps that send a lot of data over the Web, instead limiting them to Wi-Fi use, especially when roaming. We strongly recommend users go through their app lists and disable unnecessary mobile data permissions before trips abroad.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 Mobile<\/em><\/p>\n<h2 id=\"background-app-refresh\">Background App Refresh<\/h2>\n<p><strong>What it is:<\/strong> Permission to refresh content when you are not using an app, that is, when it\u2019s running in the background.<\/p>\n<p><strong>What the risks are:<\/strong> Updating content consumes data and battery power, but all modern smartphones are designed to run apps in the background. Take action only if you notice that a certain program is sending a lot of data over the Web and significantly reducing your smartphone\u2019s runtime. You can check apps\u2019 mobile data and power consumption in the system settings, under <em>Mobile Data<\/em> and <em>Battery<\/em>.<\/p>\n<p><strong>Where to configure it:<\/strong> <em>Settings \u2192 General \u2192 Background App Refresh<\/em><\/p>\n<h2 id=\"permit-or-forbid\">Better safe than sorry<\/h2>\n<p>Protecting yourself from apps that are too greedy in collecting your personal information takes very little time. We strongly recommend taking that time, though, carefully considering all requests and being judicious about what you share and with whom. Remember that you are responsible for your privacy, so you can rest easy after denying any requests that seem suspicious or unreasonable, knowing your photos, videos, documents, and other data are safe.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\">\n","protected":false},"excerpt":{"rendered":"<p>How to set app permissions in iOS 15 for maximum privacy and security.<\/p>\n","protected":false},"author":2581,"featured_media":30070,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,9],"tags":[1917,14,1250,26,2528,43,835,45],"class_list":{"0":"post-30063","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-app-permissions","10":"tag-apple","11":"tag-ios","12":"tag-iphone","13":"tag-permissions","14":"tag-privacy","15":"tag-settings","16":"tag-smartphones"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-15-permissions-guide\/30063\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-15-permissions-guide\/23702\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-15-permissions-guide\/19201\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ios-15-permissions-guide\/9607\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ios-15-permissions-guide\/25841\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-15-permissions-guide\/23880\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-15-permissions-guide\/23509\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-15-permissions-guide\/26522\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ios-15-permissions-guide\/26115\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-15-permissions-guide\/31995\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-15-permissions-guide\/10329\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-15-permissions-guide\/43041\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-15-permissions-guide\/18226\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ios-15-permissions-guide\/18609\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ios-15-permissions-guide\/15594\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-15-permissions-guide\/27821\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ios-15-permissions-guide\/27895\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-15-permissions-guide\/24647\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-15-permissions-guide\/29854\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=30063"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30063\/revisions"}],"predecessor-version":[{"id":30069,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30063\/revisions\/30069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/30070"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=30063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=30063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=30063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}