App Store App Review issue

App Store App Privacy mismatch

Apple found that App Privacy answers do not match the app binary, policy text, permission usage, or third-party SDK behavior.

app store app privacy mismatchapp privacy rejected app storeapp rejected because privacy policy does not match

Fix App Store review issues before the next submission

Use LogicSpring to run a free precheck, regenerate the right policy or disclosure pack, and shorten the loop from rejection notice to resubmission.

Summary

Apple found that App Privacy answers do not match the app binary, policy text, permission usage, or third-party SDK behavior.

What this means

Reviewers compare your App Privacy nutrition label with what the app actually does at runtime and what the policy says.

A mismatch can be caused by under-disclosure, over-disclosure, or stale answers copied from an older release.

This often appears after a late SDK change or a permission flow change near release.

Common causes

  • An analytics, attribution, auth, or support SDK was added without updating App Privacy answers.
  • The policy says data is collected or linked, but App Store Connect says otherwise.
  • Permission prompts expose collection behavior not reflected in the nutrition label.

What the rejection often looks like

  • Apple says the app collects data that is not disclosed in App Privacy or that disclosed data types do not match observed app behavior.
  • The review notice references a mismatch between the app's privacy details and the functionality available in the build.
  • Reviewers point to identifiers, diagnostics, or tracking-related behavior that is missing from the current nutrition label.

Step-by-step fix

  1. Step 1

    Create one release-specific inventory of SDKs, permissions, and data categories from the current build.

  2. Step 2

    Update App Privacy answers, policy copy, and review notes from that same inventory.

  3. Step 3

    Remove unnecessary SDKs or permissions if you cannot justify them clearly for this release.

What to update

  • App Privacy answers in App Store Connect
  • Privacy policy wording for collected and linked data
  • SDK inventory and privacy manifest review
  • Permission prompts and feature-level disclosures

How to avoid getting rejected again

  • Update the App Privacy label from the release branch SDK inventory, not from memory or the previous release.
  • When adding analytics, attribution, auth, or support SDKs, make App Privacy review a release gate instead of a final-day task.
  • Keep screenshots of permission flows and reviewer notes ready so Apple can verify the fixed behavior quickly.

FAQ

What usually causes an App Privacy mismatch after a minor app update?

Late SDK changes are the most common cause. Teams often change analytics, crash, attribution, or login libraries and forget to update App Privacy answers, permission rationale, and policy text from the same release inventory.

Does Apple check third-party SDK behavior even if my app code never calls every SDK feature?

Yes. If the shipped build contains an SDK that collects identifiers, diagnostics, or tracking-related data, Apple can still expect the disclosure surfaces to reflect that behavior.

Should I over-disclose in App Privacy just to be safe?

No. Over-disclosure can create its own mismatch if the app and policy suggest something different. The safer path is an accurate release-specific inventory and aligned answers across the policy, App Privacy, and in-app flows.