Summary
Apple found that App Privacy answers do not match the app binary, policy text, permission usage, or third-party SDK behavior.
App Store App Review issue
Apple found that App Privacy answers do not match the app binary, policy text, permission usage, or third-party SDK behavior.
Use LogicSpring to run a free precheck, regenerate the right policy or disclosure pack, and shorten the loop from rejection notice to resubmission.
Apple found that App Privacy answers do not match the app binary, policy text, permission usage, or third-party SDK behavior.
Reviewers compare your App Privacy nutrition label with what the app actually does at runtime and what the policy says.
A mismatch can be caused by under-disclosure, over-disclosure, or stale answers copied from an older release.
This often appears after a late SDK change or a permission flow change near release.
Create one release-specific inventory of SDKs, permissions, and data categories from the current build.
Update App Privacy answers, policy copy, and review notes from that same inventory.
Remove unnecessary SDKs or permissions if you cannot justify them clearly for this release.
Late SDK changes are the most common cause. Teams often change analytics, crash, attribution, or login libraries and forget to update App Privacy answers, permission rationale, and policy text from the same release inventory.
Yes. If the shipped build contains an SDK that collects identifiers, diagnostics, or tracking-related data, Apple can still expect the disclosure surfaces to reflect that behavior.
No. Over-disclosure can create its own mismatch if the app and policy suggest something different. The safer path is an accurate release-specific inventory and aligned answers across the policy, App Privacy, and in-app flows.