App Store

    How do I fix a Guideline 5.1.1 data collection and storage rejection?

    App Store Connect Resolution Center message citing Guideline 5.1.1 Legal Privacy Data Collection and Storage with the six subletter remediation paths displayed alongside

    A rejection letter that cites Guideline 5.1.1 lands in App Store Connect with one of six subletters attached, and the fix depends entirely on which subletter the reviewer flagged. The label sounds like one rule. In practice it covers six, each with its own remediation pattern.

    Short answer

    The short answer is that Guideline 5.1.1 is shorthand for six distinct privacy clauses, and the fix has to match the clause Apple cited. According to Apple's App Review Guidelines, 5.1.1 covers privacy policy presence (i), informed consent (ii), data minimization (iii), permission respect (iv), account sign-in and deletion (v), and a prohibition on hidden password harvesting (vi). Read the Resolution Center notice carefully: the subletter is the only signal that tells you which work to do first.

    What you should know

    • The subletter matters more than the guideline number. Apple uses 5.1.1(i) through 5.1.1(vi) to point at distinct privacy clauses with distinct remediation paths.
    • Account deletion has been required since June 30, 2022. Per Apple's account deletion support page, apps that allow account creation must also let users initiate deletion from inside the app.
    • Data minimization is enforced more strictly in 2026. Optional fields like birthdate, city, or full name during signup are a common 5.1.1(iii) trigger for AI assistants and utility apps.
    • A privacy policy URL in App Store Connect is non-negotiable. Both the metadata field and an in-app link to the same policy are required.
    • Apple did not publish 5.1.1-specific rejection rates. Any claim beyond a directional pattern is fabricated.

    What does each subletter of 5.1.1 actually cover?

    The six subletters are the right lens for any remediation work. Reading them in order saves the second-attempt rejection that comes from fixing the wrong clause.

    SubletterTopicCommon trigger
    5.1.1(i)Privacy policyNo URL in App Store Connect, or the policy omits SDK list, retention, deletion
    5.1.1(ii)User consentPaid feature gated behind data collection; ATT prompt not configured
    5.1.1(iii)Data minimizationBirthdate, city, full name required at signup without functional reason
    5.1.1(iv)Permission respectMicrophone required to upload photos; no alternative for users who decline
    5.1.1(v)Account sign-inMandatory registration before any feature; missing in-app account deletion
    5.1.1(vi)Surreptitious dataHarvesting credentials or hidden capture; account-level enforcement

    A rejection that simply reads "Guideline 5.1.1, Legal, Privacy, Data Collection and Storage" without a subletter is rare in 2026. When it happens, the screenshot Apple attaches points at the actual clause. Open the Resolution Center thread, expand the message body, and look for the parenthetical roman numeral or the specific phrase Apple quoted from the guideline.

    How do you fix a 5.1.1(i) privacy policy rejection?

    The short answer is that the metadata field has to hold a valid privacy policy URL, and the policy at that URL has to address three named topics: what is collected, who else sees it, and how a user requests deletion. According to Apple's App Review Guidelines, the policy must identify each data category collected, confirm that third parties receive equal protection, and explain retention and deletion mechanics.

    The mistake many developers make is pasting a generic template that lists hypothetical SDK categories. Reviewers in 2026 cross-check the policy against the App Privacy questionnaire and the SDKs detected inside the binary. If the questionnaire declares advertising data but the policy omits the advertising clause, the rejection often arrives under 5.1.1(i) rather than under the questionnaire itself.

    In practice, this means the policy URL has to live on a stable domain (not a draft preview), the policy has to be linked twice (App Store Connect metadata field and from inside the app), and the body of the policy has to match the actual SDKs in the build. A short policy that names every SDK by vendor is treated more favorably than a long template policy that hedges every clause.

    How do you fix a 5.1.1(v) account sign-in or deletion rejection?

    The honest answer is that 5.1.1(v) is the highest-volume subletter in 2026 and splits into two distinct patterns. The first is forced registration before non-account features. The second is account creation without an in-app deletion path.

    For forced registration, Apple's developer forum guidance confirms the standard rejection language: users should be allowed to access non account-based features before registration and login. The remediation is a guest or anonymous mode that lets users see the core feature without entering anything. Registration is then offered when the user opts into something genuinely account-tied, such as saving progress across devices or making a purchase.

    For account deletion, Apple's account deletion guidance sets the rules clearly. The deletion option has to be initiated from inside the app, typically inside an Account or Settings screen. It has to remove the entire record and the associated personal data. Temporary deactivation is not enough. If the actual deletion happens on a server queue, the app has to confirm receipt and inform the user of the expected timeline. A flow that pushes the user to a web form to complete deletion is rejected.

    For Sign in with Apple users, the Sign in with Apple REST API revoke endpoint has to be called when the account is deleted. Apple checks this with the test account included in App Review notes; deletion that leaves the Apple token still active is the second-attempt rejection many teams run into.

    How do you fix a 5.1.1(iii) data minimization rejection?

    The short answer is to remove every field at signup that is not used by a shipping feature. According to Apple's App Review Guidelines, apps should request access only to data relevant to core functionality and should use the share sheet or out-of-process picker where possible instead of asking for blanket Photos or Contacts access.

    The common 2026 pattern is an AI assistant or utility app that asks for full name, date of birth, gender, city, and phone number during onboarding while none of those values appear in the experience. Reviewers reading the build can tell because the values never display, never affect personalization, and never appear in any API call. The fix is to delete the fields from the signup form, drop the columns from the backend if they are not used elsewhere, and resubmit. Making the fields optional is sometimes accepted, but a clean removal is faster.

    For permission prompts, the parallel fix is to delay the NSXxxUsageDescription request until the user taps the feature that needs it. Asking for Location at app launch when Location is only used on screen three is a frequent 5.1.1(iii) trigger.

    Guideline 5.1.1(ii) requires user consent for any data collection, even when the data is anonymous at point of capture. According to Apple's App Review Guidelines, paid functionality must not depend on the user granting access to that data, and users must have an accessible way to withdraw consent.

    Two patterns dominate the rejections under this subletter. The first is a paywall that activates analytics tracking before the user has agreed, often through an SDK initialized at app launch. The second is a missing or vague App Tracking Transparency prompt when the build links an SDK that performs cross-app tracking (a typical Meta or AppLovin integration). The fix is to delay SDK initialization until consent is captured and to write purpose strings that name the SDK and the data category, not a generic "improve your experience" string.

    For external help at the build level, a pre-submission scan can flag the SDKs in the binary against the OWASP MASVS privacy controls. PTKD.com (https://ptkd.com) is one platform that maps the SDK inventory of an uploaded IPA against the privacy clauses Apple reviewers check most often.

    What to watch out for

    Three patterns trip up the second submission more often than the first.

    The first is a fix that addresses one subletter and ignores another the reviewer also flagged. Reviewers sometimes cite 5.1.1 without listing every offending subletter, and a build that lands back in review with one clause fixed and another untouched is rejected the same day.

    The second is a privacy policy that drifts from the App Privacy questionnaire. After the questionnaire was tightened in 2023, mismatches between declared data categories and the policy text now generate 5.1.1(i) rejections that look like 5.1.1(iii) at first glance.

    The third is the assumption that account deletion can live on a website only. The Apple account deletion guidance is explicit: the deletion has to be initiated from inside the app. A web-only delete form, even one linked from the app, is not enough.

    Key takeaways

    • Read the subletter first. The remediation tree branches at 5.1.1(i) through 5.1.1(vi), and a fix for the wrong subletter is the most common second-attempt rejection.
    • For 5.1.1(v), audit both forced registration and account deletion. A guest mode for non-account features and an in-app initiated deletion are the two checks Apple verifies on resubmit.
    • For 5.1.1(i), align the privacy policy with the App Privacy questionnaire and the SDK list inside the binary.
    • For 5.1.1(iii), remove unused signup fields and delay permission prompts until the feature that needs them.
    • Some teams ship the build through an external scan first. PTKD.com is one of the tools focused on pre-submission privacy and permission analysis aligned with the OWASP MASVS controls Apple reviewers check most often.
    • #app store rejection
    • #guideline 5.1.1
    • #data collection
    • #account deletion
    • #privacy policy
    • #app review

    Frequently asked questions

    Why did Apple cite Guideline 5.1.1 without naming a subletter?
    The bare 5.1.1 citation usually means the reviewer flagged the build but expected the developer to read the attached screenshot or quoted text for the specific clause. Open the Resolution Center thread, expand the full message, and search for the roman numeral or the verbatim sentence Apple quoted from the guideline. That quoted sentence maps directly to one of the six subletters and tells you which remediation to start with.
    Does Sign in with Apple satisfy the 5.1.1(v) account deletion requirement?
    Sign in with Apple handles authentication, not deletion. The account deletion requirement applies regardless of the sign-in mechanism. When a user with a Sign in with Apple token deletes their account from inside the app, the build also has to call the Sign in with Apple REST API revoke endpoint. Apple checks this during review and will reject builds that leave the token active after deletion.
    Can I make the signup fields optional instead of removing them?
    Apple sometimes accepts optional fields, especially when the field is clearly labeled optional and unticked by default. A clean removal is faster on resubmit because reviewers do not have to test whether the optional state actually skips the field. If the field is genuinely useful later in the user lifecycle, move the prompt to that later point rather than asking during signup, and document the change in the App Review notes.
    How long does account deletion have to take to satisfy the guideline?
    There is no fixed deadline. Apple's account deletion guidance allows manual or time-consuming processes when the build provides confirmation and informs the user of the expected timeline. What is not accepted is silent deactivation, indefinite recovery windows that block deletion, or deletion that requires email or phone support to complete. The user has to initiate deletion from inside the app and receive confirmation that the request was accepted.
    Will Apple reject a build that uses Firebase analytics without an ATT prompt?
    Firebase Analytics on its own does not require App Tracking Transparency in 2026. The trigger is whether the build also links an SDK that performs cross-app tracking, such as the Facebook SDK or AppLovin SDK. If only first-party Firebase Analytics is linked, the App Privacy questionnaire still needs the corresponding categories declared, but the ATT prompt is not required. The 5.1.1(ii) rejection typically follows a tracking SDK, not analytics alone.

    Keep reading

    Scan your app in minutes

    Upload an APK, AAB, or IPA. PTKD returns an OWASP-aligned report with copy-paste fixes.

    Try PTKD free