Those behaviors include harvesting excessive personally identifiable information, collecting the unique identifying number of the device, initiating phone calls and text messages and leaking location information, email addresses, contacts, calendar appointments, or other personal information.