At Incognia, we view ensuring the privacy of location data as paramount.
With the widespread use of location technology by apps, we are becoming increasingly accustomed to the benefits of location-based services, including real-time navigation, ride hailing, and food-delivery. Google Maps, Uber and GrubHub are just some of the go-to apps that are making our lives easier and more convenient. But collecting, storing and working with location data raises important considerations regarding user privacy that need to be addressed.
If collected and stored irresponsibly, location data can reveal a person's real world identity and behavior. When location datasets fall into the wrong hands and are linked with personally identifiable information (PII), either from internal or external data sources, user privacy can easily be compromised. This is why Incognia takes a privacy-first approach to location.
At Incognia, we view ensuring the privacy of location data as paramount. In fact, user privacy is where our founders started, over ten years ago, when they designed and developed the core location technology that is now in use by over 60M devices.
We follow the 7 fundamental principles of Privacy by Design as the foundation of our product design, implementing privacy protection from conception to final use of our products and solution.
We believe the best way to keep personal information and location data separate, is not to collect any data that can directly link to identity. At Incognia we focus on encrypting and protecting the location data we collect, and intentionally do not collect additional PII.
Incognia technology immediately classifies collected data as sensitive, strips it of identifiers and stores it as a visit to "sensitive place A”. Without information on the individual, context on the place or linkages to other location data, the information becomes anonymous, and the privacy of that user is protected.
We focus on hashing and encryption to protect the location data we collect, and intentionally do not collect additional PII. Other techniques we use include probabilistic set structure, differential privacy, and k-anonymity, bringing the data closer to full anonymization.
Just because data can be kept, doesn’t mean it should be. At Incognia we follow the best practice of only keeping data as long as it is actively used. If data isn't stored, it can't be stolen or contribute to downstream fraud caused by stolen credentials and PII.
Through network signals and device sensor data, Incognia creates a location fingerprint, or private digital identity, based on location behavioral patterns unique to each user. Incognia location technology is very precise and unlike GPS is not susceptible to spoofing.
View the apps that could require location access on your mobile device and set permissions.
View a list of the apps using location technology and set permissions.