Tim Hortons app tracked customers at all times — how restaurant apps can put your privacy at risk

Tim Hortons Mobile App
(Image credit: Groupon)

The popular coffee and breakfast chain Tim Hortons collected vast amounts of location information on its customers through its mobile app according to a joint investigation carried out by federal and provincial privacy watchdogs in Canada.

While customers thought they downloaded the restaurant’s mobile app to make it easier to order and pay for coffee and other menu items, the app actually tracked their movements and recorded them even when it wasn’t open.

Although the app did ask for permission to access a mobile device’s geolocation functions, it misled many users who believed their location information would only be accessed when the app was in use.

To make matters worse, the app also used location data to infer where Tim Hortons’ customers lived, worked and whether they were traveling. In fact, the app generated an “event” each time customers entered or left one of the restaurants’ competitors, a major sports venue or their home or workplace.

Selling de-identified geolocation data

location permissions on a Pixel 6

(Image credit: Tom's Guide)

According to a press release from the Office of the Privacy Commissioner of Canada, the investigation uncovered how Tim Hortons continued to collect vast amounts of location data for a year even after the company had scrapped plans to use it for targeted advertising.

In its defense, Tim Hortons says that it only used aggregated location data in a limited way such as analyzing user trends like whether customers switched to other coffee chains or how their movements changed as a result of the pandemic.

Once the investigation was launched in 2020, the company stopped continually tracking the location of its users but this didn’t eliminate the risk of surveillance. Canada’s privacy watchdogs found that Tim Hortons had a contract with an American third-party location services supplier which contained language so vague and permissive that it would have allowed the company to sell “de-identified” location data on its own.

The risk here is that de-identified geolocation data could be re-identified with a recent report from the Office of the Privacy Commissioner of Canada highlighting just how easily people can be identified by their movements.

With someone’s location data in hand, it can be used to infer where people live and work as well as to make deductions about their religious beliefs, sexual preferences, social political affiliations and more.

Privacy Commissioner of Canada Daniel Therrien provided further insight on the matter in a press release, saying:

“Tim Hortons clearly crossed the line by amassing a huge amount of highly sensitive information about its customers. Following people’s movements every few minutes of every day was clearly an inappropriate form of surveillance. This case once again highlights the harms that can result from poorly designed technologies as well as the need for strong privacy laws to protect the rights of Canadians.”

Convenience at a cost — why you may want to avoid installing restaurant apps

While Tim Hortons has agreed to delete any remaining location data and establish and maintain a privacy management program based on recommendations from Canada’s privacy watchdogs, this incident shines a light on the privacy and security risks posed by restaurant apps.

Being able to order and pay for your food using one app may be convenient, but if a restaurant chain falls victim to a data breach, your financial information could be exposed. At the same time, these sorts of apps may request access to your location and other device permissions when they don’t necessarily need them. They can quickly eat up your phone’s storage and data as well.

We’ve also seen restaurant chains hit by cyberattacks in which attackers were able to gain access to customers’ payment details. Back in 2017, cybercriminals used malware to access Chipotle’s POS systems to steal the information contained on the magnetic strip on the back of customers’ payment cards. Just last year though, attackers took over the restaurant chain’s Mailgun account to send out malicious emails to Chipotle customers as part of a phishing campaign.

Besides restaurant apps, food delivery services have also become a target for hackers as they have become more popular. For instance, the information of 4.9 million customers, delivery workers and merchants was stolen by hackers from DoorDash following a breach at one of its third-party service providers. There have also been cases where users had their Uber Eats accounts hacked according to CTV.

Anytime you download a restaurant app or even a loyalty app, you’re giving companies greater access to your personal and device data. For this reason, you might be better off going directly to a company’s site to place your next food order if possible or using an old-fashioned loyalty program card instead.

It’s not just apps — restaurant QR codes are risky, too

QR Code Menu at a Restaurant

(Image credit: Alba Lantigua/Unsplash)

Although QR codes have been widely used in South Korea and other countries in Asia for years now, they only became mainstream in the U.S. during the pandemic as restaurants wanted to avoid having multiple customers touch the same menu. Instead, restaurant goers scanned a QR code at their table to access a business’ menu online.

In a blog post though, the ACLU points out that many QR codes in restaurants are actually generated by a different company that collects, uses and may even share your personal information with other companies. Scanning a QR code at a restaurant with your phone also gives companies access to your device’s advertising ID number, making it easier to track you online.

While most QR codes are harmless, an attacker or a scammer could put their own QR code sticker over a legitimate one to redirect unsuspecting users to websites hosting malware. This is why the ACLU recommends that you treat QR codes like links in an email from an unknown sender. You can also use software that allows you to inspect a QR code before opening the site it takes you to in your browser.

Anthony Spadafora
Managing Editor Security and Home Office

Anthony Spadafora is the managing editor for security and home office furniture at Tom’s Guide where he covers everything from data breaches to password managers and the best way to cover your whole home or business with Wi-Fi. He also reviews standing desks, office chairs and other home office accessories with a penchant for building desk setups. Before joining the team, Anthony wrote for ITProPortal while living in Korea and later for TechRadar Pro after moving back to the US. Based in Houston, Texas, when he’s not writing Anthony can be found tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
Facebook, Instagram, YouTube, Pinterest, X, LinkedIn, Reddit, TikTok, Threads apps on an iPhone
Why you need to review your app permissions now
Logos of Amazon, Google, and Apple
TikTok, Google, Amazon, Apple – which is worst for data privacy?
Roast turkey on dining table, with Christmas decorations in background
Your roast turkey might be stealing your data
Cartoon of person peering through US flag
Western governments want your data and big tech is happy to provide – how to slow them down
POV male driver holding new iPhone 12 Pro smartphone with infotainment car computer system running Apple Computers CarPlay from iOS in background.
45 million Americans allegedly had their location data collected and sold by this top insurance firm
Photo of glitterball, watch, and glasses of champagne
Don't post your New Year's travel plans – you're putting your privacy at risk
Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
Latest in News
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far
iPhone 17 Pro render
iPhone 17 Pro — 7 biggest rumored upgrades
CAD renderings of the Google Pixel 10 Pro XL
Pixel 10 leak could be good news for all Android phones