As one of many updates to its App Store Review Guidelines this week, Apple has indicated that parental control app developers are again permitted to use Mobile Device Management (MDM) technology in their apps, so long as they do not sell, use, or disclose any data to third parties for any purpose.

apple screen time screen icons
An excerpt from the newly added Guideline 5.5:

You must make a clear declaration of what user data will be collected and how it will be used on an app screen prior to any user action to purchase or otherwise use the service. MDM apps must not violate local laws. Apps offering MDM services may not sell, use, or disclose to third parties any data for any purpose, and must commit to this in their privacy policy. Apps that do not comply with this guideline will be removed from the App Store and you may be removed from the Apple Developer Program.

This comes a little over a month after The New York Times reported that Apple had removed or restricted many of the most popular screen time and parental control apps on the App Store since launching its own Screen Time feature in iOS 12 last year, raising concerns over potentially anticompetitive behavior.

In response to the report, Apple said it had discovered that some parental control apps were using MDM, putting the privacy and security of children at risk.

"These apps were using an enterprise technology that provided them access to kids' highly sensitive personal data," an Apple spokesperson said in a statement issued to The New York Times on Monday. "We do not think it is O.K. for any apps to help data companies track or optimize advertising of kids."

MDM technology is intended for enterprise users to manage their company-owned devices, and Apple said the use of MDM by consumer-focused apps carried privacy and security concerns that resulted in the company addressing the situation in its ‌App Store‌ Review Guidelines in 2017.

Backlash quickly mounted from parental control app developers, who eventually joined together to petition Apple to "put kids first" by releasing a public API for its Screen Time for use by developers. That never happened, with Apple going down this route instead and allowing MDM usage with stricter privacy requirements.

Apple's updated guidelines also indicate that parental control apps from "approved providers" may use one of its Personal VPN APIs.

Apple has faced increasing scrutiny over its ‌App Store‌ and potentially anticompetitive business practices, ranging from Spotify's complaint to multiple class action lawsuits. In response, Apple said it "welcomes competition" on the App Store, which only serves to make it a "better" platform.

Top Rated Comments

Kabeyun Avatar
71 months ago
I think this is the wrong solution. Unfortunate that they chose MDM over providing screen time APIs to developers.
Score: 6 Votes (Like | Disagree)
HopefulHumanist Avatar
71 months ago
I think this is the wrong solution. Unfortunate that they chose MDM over providing screen time APIs to developers.
Well it’s gonna take time for them to release the APIs; this problem was only recently discovered. This is a decent stop-gap until the APIs are released.
Score: 6 Votes (Like | Disagree)
MatthewUT44 Avatar
71 months ago
Helicopter parents were gonna revolt so hard lol Apple
Score: 4 Votes (Like | Disagree)
BootsWalking Avatar
71 months ago
There's no question the recent DOJ antitrust news factored into Apple's decision. If history has proven anything it's that Apple responds to legal threats, be they from private class action suits or from federal agencies.
Score: 3 Votes (Like | Disagree)
69Mustang Avatar
71 months ago
Well it’s gonna take time for them to release the APIs; this problem was only recently discovered. This is a decent stop-gap until the APIs are released.
I agree with @Kabeyun and @BootsWalking This is the wrong solution and it sends a contradictory message.
What happened to putting the privacy and security of children at risk? Aren't those same supposed risks still there? Apple did nothing to mitigate the supposed risks, they just reversed the decision regarding MDM. The devs can still collect the same info they were collecting before.

I think you're right that it will take time to develop API's - which is the correct decision imo. Not so right in thinking this is a decent stop-gap. This reads more like a reversal to mitigate the anti competitive claims.
Score: 1 Votes (Like | Disagree)

Popular Stories

iPhone SE 4 Thumb 1

iPhone SE 4 With Apple's Own 5G Modem 'Confirmed' to Launch in March

Tuesday November 19, 2024 12:12 pm PST by
Barclays analyst Tom O'Malley and his colleagues recently traveled to Asia to meet with various electronics manufacturers and suppliers. In a research note this week, outlining key takeaways from the trip, the analysts said they have "confirmed" that a fourth-generation iPhone SE with an Apple-designed 5G modem is slated to launch towards the end of the first quarter next year. In line with previo...
airtag purple

AirTag 2 Rumored to Launch Next Year With These New Features

Sunday November 17, 2024 5:18 am PST by
Apple released the AirTag in April 2021, so it is now three over and a half years old. While the AirTag has not received any hardware updates since then, a new version of the item tracking accessory is rumored to be in development. Below, we recap rumors about a second-generation AirTag. Timing Apple is aiming to release a new AirTag in mid-2025, according to Bloomberg's Mark Gurman....
Magic Mouse Next to Keyboard

No, Apple CEO Tim Cook Didn't Say He Prefers Logitech's MX Master 3 Over the Magic Mouse

Sunday November 17, 2024 3:03 pm PST by
While the Logitech MX Master 3 is a terrific mouse for the Mac, reports claiming that Apple CEO Tim Cook prefers that mouse over the Magic Mouse are false. The Wall Street Journal last month published an interview with Cook, in which he said he uses every Apple product every day. Soon after, The Verge's Wes Davis attempted to replicate using every Apple product in a single day. During that...
Generic iOS 18 Feature Real Mock

Apple Releases iOS 18.1.1 and iPadOS 18.1.1 With Security Fixes

Tuesday November 19, 2024 10:10 am PST by
Apple today released iOS 18.1.1 and iPadOS 18.1.1, minor updates to the iOS 18 and iPadOS 18 operating systems that debuted earlier in September. iOS 18.1.1 and iPadOS 18.1.1 come three weeks after the launch of iOS 18.1. The new software can be downloaded on eligible iPhones and iPads over-the-air by going to Settings > General > Software Update. Apple has also released iOS 17.7.2 for...
at t turbo indicator iphone 16 pro max v0 8hrh7w5f3w1e1

AT&T Turbo Indicator Showing Up in iPhone Status Bar for Subscribers

Wednesday November 20, 2024 3:42 am PST by
AT&T has begun displaying "Turbo" in the iPhone carrier label for customers subscribed to its premium network prioritization service, according to reports on Reddit. The new indicator seems to have started appearing after users updated to iOS 18.1.1, but that could be just coincidence. Image credit: Reddit user No_Highlight7476 The Turbo feature provides enhanced network performance through ...
iPhone 17 Slim Feature Single Camera 1 Redux

'iPhone 17 Air' Rumored to Surpass iPhone 6 as Thinnest iPhone Ever

Monday November 18, 2024 1:07 pm PST by
In a research note with Hong Kong-based investment bank Haitong today, obtained by MacRumors, Apple analyst Jeff Pu said he agrees with a recent rumor claiming that the so-called "iPhone 17 Air" will be around 6mm thick. "We agreed with the recent chatter of an 6mm thickness ultra-slim design of the iPhone 17 Slim model," he wrote. If that measurement proves to be accurate, there would be ...
bug security vulnerability issue fix larry

Make Sure to Update: iOS 18.1.1 and macOS Sequoia 15.1.1 Fix Actively Exploited Vulnerabilities

Tuesday November 19, 2024 10:52 am PST by
The iOS 18.1.1, iPadOS 18.1.1, and macOS Sequoia 15.1.1 updates that Apple released today address JavaScriptCore and WebKit vulnerabilities that Apple says have been actively exploited on some devices. With the JavaScriptCore vulnerability, processing maliciously crafted web content could lead to arbitrary code execution. The WebKit vulnerability had the same issue with maliciously crafted...