{"id":46924,"date":"2022-06-01T16:47:04","date_gmt":"2022-06-01T16:47:04","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33514\/Tim-Hortons-App-Tracked-Movement-In-Violation-Of-Privacy-Laws.html"},"modified":"2022-06-01T16:47:04","modified_gmt":"2022-06-01T16:47:04","slug":"tim-hortons-app-tracked-movement-in-violation-of-privacy-laws","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/","title":{"rendered":"Tim Horton&#8217;s App Tracked Movement In Violation Of Privacy Laws"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.reuters.com\/resizer\/SPSjsmnHIjHos9pHEQoah7lf2o8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDYH5NGMC5LPFIXLVWKKQKURKM.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p data-testid=\"paragraph-0\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">June 1 (Reuters) &#8211; Canadian coffee chain Tim Hortons&#8217; mobile app regularly tracked and recorded locations of its users even when their app was not open in violation of the country&#8217;s privacy laws, Canada&#8217;s privacy regulator said on Wednesday in a report concluding a two-year-old investigation.<\/p>\n<p data-testid=\"paragraph-1\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">&#8220;Tim Hortons clearly crossed the line by amassing a huge amount of highly sensitive information about its customers,&#8221; Privacy Commissioner of Canada Daniel Therrien said in a statement that underscored harms that can result from &#8220;poorly designed technologies.&#8221;<\/p>\n<p data-testid=\"paragraph-2\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The investigation was opened in 2020 after concerns emerged about the coffee chain&#8217;s collection and use of data. The company said it has removed a location-tracking technology from its app.<\/p>\n<div class=\"registration-prompt__container__2jf5K registration-prompt__inline__2WDU- article-body__element__2p5pI article-body__inline-registration-prompt__1-N9W\">\n<div class=\"registration-prompt__text-content__o0YET\">\n<h5 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><\/p>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p data-testid=\"paragraph-3\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The joint investigation by federal and provincial authorities also found that Tim Hortons lacked a robust privacy management program for the app, which could have helped the company identify and address many of the privacy issues, the Office of the Privacy Commissioner of Canada (OPC) said in a statement.<\/p>\n<p data-testid=\"paragraph-4\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The privacy authorities recommended that Tim Hortons delete any remaining location data and maintain a privacy program to checks its app and ensure users are clearly informed about data collection.<\/p>\n<p data-testid=\"paragraph-5\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The Restaurant Brands International-owned <a data-testid=\"Link\" href=\"https:\/\/www.reuters.com\/companies\/QSR.TO\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\" rel=\"noopener\">(QSR.TO)<\/a> company has agreed to the recommendations.<\/p>\n<p data-testid=\"paragraph-6\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Tim Hortons said it had removed the geolocation technology from the Tims app and that location data from it was never used for personalized marketing for individual users.<\/p>\n<p data-testid=\"paragraph-7\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">&#8220;We&#8217;ve strengthened our internal team that&#8217;s dedicated to enhancing best practices when it comes to privacy and we\u2019re continuing to focus on ensuring that guests can make informed decisions about their data when using our app,&#8221; it said in a statement.<\/p>\n<div class=\"registration-prompt__container__2jf5K registration-prompt__inline__2WDU- article-body__element__2p5pI\">\n<div class=\"registration-prompt__text-content__o0YET\">\n<h5 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><\/p>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__default__UPMUu sign-off__text__PU3Aj\">Reporting by Ismail Shakil in Ottawa<br \/>\nEditing by Bill Berkrot<\/span><\/p>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Our Standards: <a data-testid=\"Link\" href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33514\/Tim-Hortons-App-Tracked-Movement-In-Violation-Of-Privacy-Laws.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46925,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10035],"class_list":["post-46924","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyphonecanadadata-lossspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tim Horton&#039;s App Tracked Movement In Violation Of Privacy Laws 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tim Horton&#039;s App Tracked Movement In Violation Of Privacy Laws 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-01T16:47:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reuters.com\/resizer\/SPSjsmnHIjHos9pHEQoah7lf2o8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDYH5NGMC5LPFIXLVWKKQKURKM.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tim Horton&#8217;s App Tracked Movement In Violation Of Privacy Laws\",\"datePublished\":\"2022-06-01T16:47:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/\"},\"wordCount\":329,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg\",\"keywords\":[\"headline,government,privacy,phone,canada,data loss,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/\",\"name\":\"Tim Horton's App Tracked Movement In Violation Of Privacy Laws 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg\",\"datePublished\":\"2022-06-01T16:47:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,phone,canada,data loss,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyphonecanadadata-lossspyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tim Horton&#8217;s App Tracked Movement In Violation Of Privacy Laws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tim Horton's App Tracked Movement In Violation Of Privacy Laws 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/","og_locale":"en_US","og_type":"article","og_title":"Tim Horton's App Tracked Movement In Violation Of Privacy Laws 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-01T16:47:04+00:00","og_image":[{"url":"https:\/\/www.reuters.com\/resizer\/SPSjsmnHIjHos9pHEQoah7lf2o8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDYH5NGMC5LPFIXLVWKKQKURKM.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tim Horton&#8217;s App Tracked Movement In Violation Of Privacy Laws","datePublished":"2022-06-01T16:47:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/"},"wordCount":329,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg","keywords":["headline,government,privacy,phone,canada,data loss,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/","url":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/","name":"Tim Horton's App Tracked Movement In Violation Of Privacy Laws 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg","datePublished":"2022-06-01T16:47:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tim-hortons-app-tracked-movement-in-violation-of-privacy-laws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,phone,canada,data loss,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyphonecanadadata-lossspyware\/"},{"@type":"ListItem","position":3,"name":"Tim Horton&#8217;s App Tracked Movement In Violation Of Privacy Laws"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46924"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46924\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46925"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}