Patent attributes
Users are provided with improved control over important business, personal, and other confidential data that is stored on computing devices by providing proxy data that may be provided in lieu of actual device data. In certain implementations, when an application installed on a computing device requests access to the data stored on the computing device, the user is presented with three options. The user can grant the request, deny the request, or fulfill the request using proxy data. In various implementations, proxy data has a format and structure compatible with the requested device data, but contains different values. Additional implementations are described that allow a user to use proxy data for part of a data set, or for portions of particular records within a data set.