Lines Matching refs:sensitive
83 <p>To provide additional protection for sensitive data, you might
99 application, you should not store sensitive information using
186 Not having access to sensitive permissions reduces the risk of
201 to protect IPC that is security sensitive and will be exposed to other
270 are used for sensitive data, such as {@link javax.net.ssl.HttpsURLConnection} for
283 handling sensitive IPC. We discourage this approach since these interfaces are
306 not rely on unauthenticated SMS data to perform sensitive commands.
364 sensitive or personal user data. If you have access to user data and can avoid
386 <p>If access to sensitive data is required, evaluate whether that information
388 the client. Consider running any code using sensitive data on the client to
441 <p>If your application accesses sensitive data with a
573 sensitive, you should consider applying a permission to make sure that