DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Data Engineering
  3. Data
  4. Develop for Safety and Protect User Privacy through Geofencing

Develop for Safety and Protect User Privacy through Geofencing

Olivia Vahsen user avatar by
Olivia Vahsen
·
Jan. 13, 20 · Tutorial
Like (3)
Save
Tweet
Share
10.71K Views

Join the DZone community and get the full member experience.

Join For Free

Do you allow your spouse or partner to track your location? Your parents? Your extended relatives? Your friends? 

Hyperconnectivity has lent a sense of normalcy to the concept of sharing locations with multiple applications and people with varying degrees of personal closeness (recall the not-so-distant past of Snapchat effectively mapping your friends and family).

However, amid the heated debate regarding who has permission to access and view user location data, it’s easy to forget that one of the main use cases for this “oversharing” of location data has been in the interest of safety.  

Acts of violence in the past months and years – such as recent incidents in Virginia Beach, Odessa, and El Paso – have fueled a growing willingness to appreciate the positive side of this data sharing as a worthy compromise. That’s where Geofencing APIs comes in. 

If you’re a developer, you know that anything (or anyone) connected to the internet and relaying a signal can be tracked. You also know that there are times when this is a good idea — for example, many people use tracking applications to prevent the loss of high-value items (asset tracking).

Unfortunately, the bad actors don’t rest on any day of the year, emphasizing the need for apps that use geofencing so that families, for example, can monitor the location of their most important assets, their kids. 

What Do You Mean by Fencing?

Geofencing APIs enable developers to create and customize a bounding box to fit users’ needs. This involves reporting, a distinct feature of Geofencing. Whenever a geofenced object leaves the bounding box, a.k.a. the “fence,” you can generate a report of the object locations whether they’re in the fence or not, or in any other fences that were set up. You can also check if the object entered or exited a fence by storing your object positions in the Location History API and using the Geofencing Transitions feature.

The item that is moving in and out of its designated boundaries can be anything from a large inanimate asset like a truck, tracked in the interest of theft prevention, to a personal object such as a phone, to a person. Or more accurately, a phone representing the movements of a person in real-time.  

As a visual example, below is one of our geofences created using our TomTom Geofencing API that allows developers to search for POI (Points of Interest) or geometry (that is handled by the Search API service):

How Geofencing APIs Protect Data 

An understandable concern about the idea of constant location updates enters the picture when we start talking about using a child’s phone as an active beacon, potentially available 24/7, 365 days a year. 

More specifically, a parent might be concerned about harvesting their child’s data and gifting it to nameless servers without knowing exactly what information is collected, and for what purpose. This is, again, understandable — children may not be aware of their data collection and ramifications but are treated essentially as equal individuals under GDPR.  

How could parents alleviate safety concerns, while doing the right thing in regard to their child’s data? 

Geofencing APIs put what data is used for your application’s actions, and how much, under full control of the developer. This means that the developer can opt to completely anonymize data and retain only what basic location points are necessary to perform desired actions. 

Conclusion: Developers Are Catalysts for Change

In this time of ethical data firestorms, developers are our catalysts for change. Only they know, at the code level, what data about users is retained versus what is necessary for the application to operate to its standards. Thus, the final decision of what data is processed, anonymously or not, lies with the person who built the application itself.  

Ultimately, as location data can be anonymized at the API level, it means that no one can ever see personal information of those utilizing these tools; the information is simply never included in processed data. 


Further Reading

  • Create Location-Aware Ads in Android With the HERE Geofencing API.
  • How to Do Simple Geofencing With PostGIS.
Data (computing) application dev API Object (computer science) Data sharing Data collection Fences (software) Catalyst (software)

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • What Should You Know About Graph Database’s Scalability?
  • The Quest for REST
  • How to Develop a Portrait Retouching Function
  • Key Considerations When Implementing Virtual Kubernetes Clusters

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: