-
(a): Require applications to assert, as part of the installation process, the access needed to the following system applications and functions: [system applications and functions requiring access assertion are defined;];
-
(b): Provide an enforcement mechanism to prevent unauthorized access; and
-
(c): Approve access changes after initial installation of the application.
Supplemental
Asserting and enforcing application access is intended to address applications that need to access existing system applications and functions, including user contacts, global positioning systems, cameras, keyboards, microphones, networks, phones, or other files.