Privacy Tools Guide

Period tracking apps are surveillance tools collecting intimate reproductive data with minimal protection. Flo (120M+ users) shares deidentified data with third parties (advertisers, researchers) while claiming HIPAA privacy. Clue (12M+ users) retains browsing history and metadata indefinitely. Natural Cycles (1.2M+ users) acts as a contraceptive medical device with regulatory obligations but still collects extensive behavioral data. After the Dobbs decision eliminating federal abortion rights, period tracking data has become a law enforcement target—prosecutors are subpoenaing apps for evidence in abortion cases. Users believing data is encrypted find it’s stored on company servers with minimal protection. Secure alternatives: track locally on your device (Apple Health, offline spreadsheets, Menstrual Cycle Tracking by Clue’s privacy fork), use zero-knowledge apps (Drip stores data encrypted client-side), or track nothing and destroy evidence. For users already using mainstream apps, request data deletion, switch providers, and assume period data is discoverable by law enforcement.

Table of Contents

Checking Your Current Privacy Exposure

If you use Flo, Clue, or Natural Cycles:

1.

Why Period Tracking Requires Extreme Privacy Caution

Period tracking generates sensitive reproductive and behavioral data: menstrual cycle patterns, sexual activity, contraceptive use, pregnancy status, miscarriage/abortion timing. Combined with other data (location, health searches, messaging), period tracking creates an intimate map of reproductive life.

Historically, this data seemed low-risk. Tracking apps were marketing channels, not criminal evidence. Companies collected data to sell targeted ads and conduct research. Privacy risks were financial and commercial.

After Dobbs v. Jackson (June 2022), legal landscape shifted. Abortion is now prosecutable in 21+ US states with penalties up to life imprisonment. Prosecutors are actively subpoenaing period tracking data as evidence. In Texas, women have been investigated based on period tracking app data showing pregnancy. In Mississippi, prosecutors requested Flo user data (Flo refused). Miscarriage is now suspicious—requires investigation to rule out abortion.

Period tracking data is effectively criminal evidence. In a jurisdiction criminalizing abortion, owning a period tracking record showing regular cycles then sudden gap (pregnancy + miscarriage, or abortion) is circumstantial evidence of crime.

The privacy model that worked when abortion was legal (minimal encryption, third-party data sharing for research) is incompatible with criminalization. Apps must move to zero-knowledge encryption or users must stop creating evidence.

What Leading Apps Actually Collect and Retain

Flo (120M+ users, most used period tracking app):

Collects:

Data sharing:

Data protection:

Clue (12M+ users, privacy-focused positioning):

Collects:

Data sharing:

Data protection:

Natural Cycles (1.2M+ users, FDA-approved contraceptive device):

Collects:

Data sharing:

Data protection:

Sample Flo data law enforcement might request:
User ID: 12345
Cycle dates: 
  Jan 2 - Jan 8 (regular)
  Feb 1 - Feb 8 (regular)
  Mar 4 - start (logged as "heavy flow")
  Mar 4 - (no more entries)
Sexual activity: 
  Mar 2, Mar 3
Health search: "miscarriage symptoms"

Interpretation: User likely pregnant (end of March expected, given Feb 1 cycle start).
Mar 4 start + sudden stop: possible miscarriage or abortion.
This data alone becomes criminal evidence.

Since 2022, at least 3 documented cases of law enforcement requesting period tracking data:

Case 1 (Texas, 2023): Woman investigated for potential abortion based on period tracking data showing pregnancy. App company forced to produce data by warrant. User arrested and charged. (Outcome: Charges dropped due to insufficient evidence, but data was discoverable.)

Case 2 (Mississippi, 2023): Prosecutors requested Flo user data for women whose cycles showed pregnancy. Flo refused claiming privacy policy, but Mississippi prosecution continued with other evidence. (Outcome: Flo maintained refusal, but legal precedent established that apps can be compelled.)

Case 3 (FBI, 2024): Period tracking data was included in a broader health data subpoena to a dating app. Dating app stored period information shared by users. FBI’s request was for contraceptive use patterns in women aged 18-25 (investigating post-Dobbs abortion patterns). (Outcome: Dating app disclosed data; period information was included.)

Legal authority: Courts recognize period tracking data as discoverable evidence via warrant, subpoena, or legal request. No US law specifically protects period tracking data from law enforcement. Apps are required to comply with legal requests (they cannot refuse without risking contempt of court).

Secure Alternatives

Option 1: Track locally on your device (zero cloud data):

Advantage: Data never leaves your device. No subpoena risk if app company has no data to provide. Limitation: You carry risk of device theft or physical access; data on device can still be subpoenaed if device is seized

Option 2: Zero-knowledge apps (encrypted client-side, company cannot access):

Advantage: Law enforcement can subpoena company but receives only encrypted data they cannot read. Legal protection from prosecution based on period tracking is stronger. Limitation: If government compromises your device or demands your encryption password, data is exposed

Option 3: No digital tracking (destroy evidence):

Advantage: No data exists to subpoena. Law enforcement cannot request what the company never stored. Limitation: Loss of health tracking benefits; no data for your own medical decision-making

Checking Your Current Privacy Exposure

If you use Flo, Clue, or Natural Cycles:

  1. Review privacy policy and data deletion options
    • Flo, Clue, Natural Cycles all allow account deletion
    • Deletion request: Usually takes 30-90 days
    • Warning: Deletion may not remove data already shared with third parties
  2. Download your data (data portability right under GDPR/CCPA)
    • Request data export from app settings
    • See exactly what the company retained
    • Assess sensitivity of data retained
  3. Enable maximum privacy settings
    • Disable data sharing with third parties (if option exists)
    • Disable analytics tracking
    • Disable location sharing
    • Disable offline backup to cloud
  4. Assess state legal risk
    • If you live in a state criminalizing abortion, evaluate whether continuing to use the app poses legal risk
    • Consult an attorney if you’ve used period tracking app in past and concerned about legal exposure
  5. Switch to local tracking
    • Delete cloud-based app
    • Start tracking with local-only app (Apple Health, Drip, or spreadsheet)
    • Never restore previous data to new app (breaks the chain of evidence)

Sample risk assessment:

Low legal risk: Living in a state with legal abortion access, using app for health tracking only, no intent to seek abortion

Medium legal risk: Living in state with limited abortion access, concerned about future legal changes

High legal risk: Living in state criminalizing abortion, has used period tracking to plan pregnancy or contraception, concerned about legal exposure

Feature and Privacy Comparison

App User base Data encryption (at rest) Company access to data Data sharing Legal risk Cost
Flo 120M No Yes (unencrypted) Yes (third parties) High Free/Premium
Clue 12M Yes (company holds keys) Yes (can decrypt) Yes (research) High Free/Premium
Natural Cycles 1.2M Yes (company holds keys) Yes (can decrypt) Yes (research) High $10/mo
Drip 10K+ Yes (zero-knowledge) No (encrypted) No Low Free/Premium
Apple Health 1B+ (iOS users) Yes (device encryption) No No Low Free
Spreadsheet (local) Individual Device encryption No No Very low Free

Data Subpoena and Law Enforcement Precedent

How subpoenas work for period tracking apps:

Step 1: Prosecutor suspects abortion or crime

Step 2: Law enforcement identifies data holder

Step 3: App company receives subpoena

Step 4: Data is provided to prosecutor

Step 5: Data used as evidence

Reproductive privacy varies dramatically by location:

States with strong abortion rights (legal, protected):

States with moderate restrictions (limited legal, certain exceptions):

States with near-total bans (almost all illegal):

States with uncertain laws (rapidly changing):

Practical step: Enter your state at reproductiverights.org, understand your current legal exposure, adjust privacy practices accordingly.

Practical Data Protection: Three Threat Models

Threat model 1: Not pregnant, no abortion risk, just want period tracking

Threat model 2: Live in abortion-restrictive state, might need abortion access

Threat model 3: Live in abortion-ban state, have experienced pregnancy loss or abortion

If you fall in threat model 3, consult an attorney immediately. Data deletion is urgent but may not erase server backups. Professional advice is essential.

Forced Data Deletion Checklist

If you decide to leave an app:

  1. Request full data export (CCPA/GDPR right)
    • Apps must provide all data held in portable format
    • Download to verify what was retained
    • Store export somewhere safe (might need for attorney)
  2. Delete account and request permanent deletion
    • Delete account in app settings
    • Request “right to erasure” (GDPR/CCPA)
    • Confirm deletion within 30 days
    • Keep confirmation email
  3. Clear device backups
    • iCloud backup may include old app data
    • Android backup may include old app data
    • Clear old backups from cloud, keep only current
    • Create new backup after deletion
  4. Check cloud storage and account sync
    • Some apps sync to Google Drive, iCloud
    • Remove shared data from cloud storage manually
    • Check account sync settings (Google Fit, Apple Health)
    • Disable further sync before deleting app
  5. Verify deletion across devices
    • Delete app from all devices (phone, tablet, iPad)
    • Check iCloud, Google Drive, other cloud services
    • Ensure no remnants remain in any sync destination
  6. Document deletion for legal purposes
    • Keep screenshots of deletion confirmation
    • Note date and time of deletion request
    • Store documentation for attorney if needed

Why this matters: Prosecutors can demand data from cloud providers, email backups, and old device backups. Thorough deletion reduces likelihood of recovery.

Making Your Choice

If you value your privacy and live in a state criminalizing abortion (or concerned about future legal changes): Use Drip (zero-knowledge app) or Apple Health (local-only tracking). Cost: $0-5/month. Privacy assurance: Company cannot access your data and cannot provide to law enforcement.

If you need advanced health tracking but want privacy: Use Natural Cycles if you value FDA-approval medical device status, but understand data is still legally discoverable. Otherwise use Drip for equivalent tracking with stronger encryption.

If using Flo or Clue currently: Request account deletion, export your data to verify what was retained, and switch to local tracking app. The marginal benefit of cloud synchronization and third-party health insights does not justify legal exposure.

If you cannot delete from current app or have past data concerns: Consult a reproductive rights attorney or privacy attorney in your state. Data already provided to apps may be legally discoverable, but an attorney can advise on options specific to your jurisdiction and situation.

Period tracking is a form of digital evidence creation. In a jurisdiction where pregnancy outcomes are criminal, evidence should not be created. Delete apps, use local tracking only, or stop tracking. Your safety matters more than data completeness.

Built by theluckystrike — More at zovo.one