{"version":"1.0","provider_name":"Miller Thomson","provider_url":"https:\/\/www.millerthomson.com\/en\/","author_name":"Nyeisha Murray","author_url":"https:\/\/www.millerthomson.com\/en\/author\/murrn\/","title":"Mobile apps: What businesses should know a year after the Tim Hortons data tracking scandal | Miller Thomson","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"s8Xmh5kGmQ\"><a href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/mobile-apps-what-businesses-should-know\/\">Mobile apps: What businesses should know a year after the Tim Hortons data tracking scandal<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/mobile-apps-what-businesses-should-know\/embed\/#?secret=s8Xmh5kGmQ\" width=\"600\" height=\"338\" title=\"&#8220;Mobile apps: What businesses should know a year after the Tim Hortons data tracking scandal&#8221; &#8212; Miller Thomson\" data-secret=\"s8Xmh5kGmQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.millerthomson.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","thumbnail_width":1776,"thumbnail_height":994,"description":"Many businesses are tapping into the digital economy by creating mobile apps to enhance customer experience, build brand awareness, and boost marketing outcomes, which often includes collecting (sometimes very detailed) information from users. However, creating and deploying these apps comes with responsibility and accountability regarding the collection and use of user personal information. Non-compliant privacy [&hellip;]"}