It’s the same thing.

At the very least, it will have a list of names with email addresses and phone numbers.

For many people, you might have a home address, birthdays, and nicknames.

Transferring contacts between a person holding a device and a virtual entity holding a virtual device.

pixtawan / Getty Images

golubovy / Getty Images

And then there is the metadata that can be pulled from this set of contacts.

First, it can be assumed that you know all of these people.

This is also what helps Facebook to build itsshadow profiles.

Two people standing together transferring contact information via their smartphones.

golubovy / Getty Images

And none of the data in your contacts listexcept for your own entryis yours.

That’s all private information that others have trusted you with, and you’re just giving it away.

But what about when that company enjoys its first data breach?

Rotary contact organizer.

fortise / Getty Images

fortise / Getty Images

So, what can you do about it?

The first thing is to never give any app access to your address book.

“Apple and Android could shut this security hole by implementing stricter data sharing rules and regulations.

Until then, you just have to keep your fingers crossed that nothing goes wrong.