In response to identifying one or more applications on a computing device, terms and conditions associated with the one or more applications are identified. A knowledge base based on the identified terms and conditions is generated. The knowledge base includes a determination of sensitive information of a user required by each of the identified one or more applications. Secondary associations of the identified one or more applications are identified from a plurality of external data sources with information related to the identified one or more applications. In response to identifying the secondary associations, it is determined whether sensitive information about the user is found in one or more of the identified secondary associations. In response to determining that sensitive information about the user is found, an advisory is transmitted to the user.