Summary
Apple found that embedded SDKs or their data practices are not disclosed clearly enough in store-facing privacy materials.
App Store App Review issue
Apple found that embedded SDKs or their data practices are not disclosed clearly enough in store-facing privacy materials.
Use LogicSpring to run a free precheck, regenerate the right policy or disclosure pack, and shorten the loop from rejection notice to resubmission.
Apple found that embedded SDKs or their data practices are not disclosed clearly enough in store-facing privacy materials.
The app binary contains third-party SDKs whose collection or sharing behavior is not reflected in the policy, App Privacy answers, or review notes.
This is especially common for analytics, ads, social sign-in, support chat, and attribution SDKs.
Apple increasingly checks SDK-related disclosures more closely with privacy manifests and runtime behavior.
Generate a fresh SDK inventory from the release branch and verify what actually ships in the binary.
Update App Privacy answers and policy vendor disclosures from that inventory.
Strip nonessential SDKs from the build if the disclosure risk is too high for the current release timeline.
Only if the issue is purely metadata or disclosure copy. If the current build behavior still conflicts with the policy, permissions, or SDK inventory, you usually need a new build.
Prepare the updated public policy URL, the exact store fields you changed, screenshots for permission or disclosure flows where relevant, and a short reviewer note explaining what changed and why it now matches the app.
Yes. Review teams compare these surfaces together. If one says you collect or disclose something and another says you do not, the mismatch itself often becomes the next rejection.