Security and Privacy Considerations
On systems with separate user accounts, Spotlight respects the ownership of users’ files—even though the system store is shared. Spotlight filters all query results, removing any files that the user isn’t permitted to see.
However, developers should still be aware of users’ data privacy and security when extracting metadata from documents.
Protecting Sensitive Data
When determining the data to extract from your application’s documents you should consider the implications of making that data searchable. For example, could making the author of the document available be a liability? Should the full content of a document be available for indexing, or only selected fields?
Developers should provide users with information about which data is indexed by their Spotlight importers. Developers should also consider providing preferences that allow users control over what data is extracted as metadata.
Untrusted Applications and Bundled Importers
Spotlight importers typically reside within an application wrapper. When first copied to the user’s computer an application is considered untrusted. The first time that the application is launched, OS X presents a warning to the user. If the user accepts, the application is launched and considered “trusted.”
Spotlight does not load and use a bundled importer if the associated application is not trusted.
Copyright © 2004, 2013 Apple Inc. All Rights Reserved. Terms of Use | Privacy Policy | Updated: 2013-08-08