The guideline conversation has changed
We are seeing a clear shift in how Apple and Google expect developers to treat store rules. Compliance is no longer a checklist completed just before submission. It is becoming a product design constraint, a data-access constraint, a moderation obligation, and in some categories, a regional operating requirement.
That matters because the stores are being pressured from two directions at once:
- Regulators want stronger controls around minors, gambling, fraud, and harmful AI content.
- Users expect stores to prevent obvious abuse before it reaches search results, recommendations, or payment flows.
- Developers want clearer review paths, fewer surprise rejections, and safer account operations.
Privacy permissions are becoming product architecture
Google Play’s 2026 policy direction is especially direct on permissions. Contact and location access are moving away from broad, persistent grants and toward narrower, user-mediated flows.
For contacts, the new expectation is that apps use a contact picker or another privacy-preserving alternative for common cases such as invitations, sharing, and one-time lookups. The important change is not cosmetic. It changes the default assumption: an app should not ask for the full address book unless the core product genuinely cannot function without it.
For location, one-time precise access is being pushed toward a dedicated location button pattern. If the feature only needs location for a discrete action — finding a nearby store, tagging a photo, checking local availability — the store expectation is increasingly that the app should not request a traditional persistent permission flow.
For teams, this creates a practical roadmap:
- Audit every contact and location request in the app.
- Remove broad permissions where a picker, share sheet, coarse location, or one-time control is enough.
- Prepare declarations only where persistent access is truly core to the product.
- Update onboarding and permission education so the UI matches the narrower data model.
- Treat privacy-sensitive permissions as conversion risks, not just engineering details.
Pre-review tooling reduces excuses, not obligations
Google Play is also adding more proactive compliance checks inside its developer workflow. Policy insights in the Android development environment and pre-review checks in the developer console are meant to identify contact and location issues before submission.
That is good for predictability, but developers should not misread it as a safety net. Automated pre-checks can catch obvious permission mismatches. They will not fully validate whether the feature claim, data use, UI disclosure, and actual runtime behavior are aligned.
The better internal process is to create a permissions register for every app:
- Permission requested
- Feature requiring it
- Whether the access is one-time, session-based, or persistent
AI content moderation is now a store-review issue
Generative AI has forced the stores to apply old content rules to new production systems. The most sensitive area is non-consensual sexual imagery, including “nudify” tools and sexualized deepfakes.
Apple and Google already prohibit apps that facilitate exploitation, abuse, or non-consensual sexual content. The enforcement challenge is that AI apps can present themselves as image editors, avatar tools, entertainment products, or chatbots while enabling prohibited output through prompts, templates, or evasive language.
We are seeing three enforcement expectations emerge:
- Apps must block prohibited generation, not merely forbid it in terms of service.
- Moderation systems must account for prompt evasion and model workarounds.
- Store metadata, search terms, screenshots, ads, and autocomplete exposure cannot steer users toward banned use cases.
For AI app teams, the submission package should include a moderation plan, not just a build:
- Evidence that safeguards work against common bypass attempts
Age controls are moving from ratings to regional compliance
Brazil’s scrutiny of betting apps accessible to minors shows how age ratings are becoming a regional compliance issue, not merely a store category field. Betting, lotteries, loot boxes, and gambling-adjacent mechanics now sit in a more regulated environment, especially where local law requires authorization and child-protection controls.
For developers, the operational lesson is simple: a global app cannot rely on one universal age-rating posture.
Teams in gambling, fantasy sports, sweepstakes, casino-style games, loot-box economies, and real-money-adjacent entertainment should review:
- Whether the app is legally authorized in each target market.
- Whether age gates are enforced before access, not after monetization.
- Whether store age-rating questionnaires are accurate by region.
- Whether promotional metadata implies betting availability in restricted markets.
- Whether minors can reach webviews, deep links, or third-party flows that enable prohibited activity.
Fraud failures are reshaping trust expectations
The fake crypto-wallet problem is a reminder that review failures are not abstract. A fraudulent app can drain users’ assets, damage the store’s trust promise, and create pressure for more aggressive enforcement.
The store review process is designed to reduce risk, but it does not eliminate impersonation, social engineering, or post-approval behavior changes. That is why developers in sensitive categories should expect more verification and more scrutiny.
Crypto, finance, identity, health, VPN, security, and account-management apps should be especially disciplined:
- Make brand ownership unmistakable.
- Keep developer account identity aligned with the product brand.
- Avoid misleading names, icons, subtitles, or screenshots.
- Monitor copycat listings and file complaints quickly.
- Use in-app warnings where user funds, keys, credentials, or recovery phrases are involved.
- Maintain a visible support and incident-response channel.
Account transfers are being formalized
Google Play’s official account-transfer requirement is another sign that platform governance is moving deeper into developer operations. Starting May 27, ownership changes must use the official transfer feature, with a mandatory seven-day security cooling-off period.
This directly affects acquisitions, asset sales, publisher changes, studio rollups, and distressed app purchases. Informal transfers through shared credentials or account marketplace arrangements are no longer a gray-area convenience. They are a business-continuity risk.
For mobile M&A and publisher operations, the due-diligence checklist should now include:
- Whether the seller controls the developer account cleanly.
- Whether all users and permissions are documented.
- Whether payment profiles, tax records, and app ownership are transferable.
- Whether any policy strikes or unresolved reviews exist.
- Whether the transfer timeline accounts for the cooling-off period.
Submission basics still trip teams up
Alongside the headline enforcement issues, everyday submission mechanics continue to create friction for first-time developers.
A free app with subscriptions still needs the base app price configured correctly. The app can be priced at zero while subscriptions are configured separately as in-app purchases. The app price answers the question, “What does the user pay to download this app?” Subscription pricing answers, “What does the user pay inside the app for ongoing access?” Mixing those two concepts creates unnecessary submission confusion.
Reviewer access is another common problem. If the app requires sign-in, the review team must be able to reach the app’s core functionality. Developers do not need to redesign authentication solely for review, but they do need a reliable path:
- Provide working demo credentials where possible.
- Include clear review notes explaining the login flow.
- Avoid accounts that trigger two-factor prompts the reviewer cannot complete.
- Create a review-only entitlement if paid or restricted features must be tested.
- Make sure third-party sign-in does not block access in the review environment.
What practitioners should do now
The practical response is to treat store guidelines as a release-management system.
Every app team should maintain four living documents:
- Policy matrix: applicable Apple and Google rules by feature, category, region, and monetization model.
- Permission register: every sensitive permission, the feature justification, and the user-facing flow.
- Moderation file: content rules, enforcement processes, abuse monitoring, and escalation paths.
- Submission playbook: reviewer credentials, pricing setup, declarations, screenshots, and regional notes.
The strongest teams will not wait for rejection messages. They will build compliance into roadmap planning, creative testing, localization, and launch sequencing.
The new rule: if the store surfaces it, the store owns part of it
The bigger platform shift is accountability for discovery. It is no longer enough for Apple or Google to say a harmful app violates policy after it is found. If search, autocomplete, ads, or recommendations help users find prohibited behavior, the stores face pressure to fix the system, not just remove individual apps.
That changes the environment for developers. Policy enforcement will be more dynamic, more category-specific, and more sensitive to public harm. Apps that operate near the edge of privacy, AI generation, minors, money, or regulated content should assume closer review and shorter tolerance for weak safeguards.
In our view, this is the operating model for 2026: compliance is not separate from growth. It is part of discoverability, conversion, retention, and platform access.