This may work fine if the application does not legitimately need access to any of your personal information, but if it does need that kind of access, you may find that it is hard to provide the application with partial but not complete access to your data, devices, and other resources.