Privacy & permissions
Which Apps Have Access to Apple Notes on Mac?
Find every app that can read your Apple Notes on Mac, what's actually exposed, and how to revoke access from apps you don't use for notes.
Apple Notes started as a sticky-note app and quietly grew into something more like a personal database. People keep passwords, draft contracts, gym routines, household codes, medical history, and the occasional half-baked novel in Notes. So when an app asks for Notes access on macOS, the data behind the toggle is genuinely sensitive — even more than Calendar or Reminders for most people.
Here’s what the permission grants, who legitimately needs it, and how to clean up the list.
What Notes permission grants
When an app has Notes access on macOS 14 Sonoma or 15 Sequoia, it can:
- Read every note in every folder of your Apple Notes (iCloud, Exchange, on My Mac, gmail)
- Read titles, body content, attached images, drawings, scanned documents
- Read folder structure
- Write new notes or edit existing ones if granted write access
It does not:
- Touch Reminders, Calendar, or Mail (those are separate)
- Read locked notes’ contents (those are encrypted and require unlock)
- See files outside Notes
The locked-notes carve-out is worth flagging. If you’ve used Apple Notes’ built-in lock feature on a note, even an app with Notes access can’t read its contents without your password or Touch ID. Locked notes are a meaningful privacy feature for genuinely sensitive content.
Where to find the list
Open System Settings → Privacy & Security → Notes. The toggles are simple on/off — there’s no Add Only mode for Notes the way there is for Calendar or Reminders.
If you’ve never granted Notes to a third-party app, the list will be empty. That’s normal. Most users don’t have anything in this category.
Who legitimately needs Notes access
A short list:
- Note-export tools — Exporter, Notes Exporter, Bear’s Notes importer, Obsidian’s Apple Notes importer
- AI tools that summarize notes — emerging category, ask whether you actively use it
- Backup utilities that mirror Notes
- Apps that import from Notes once — many of these only need access during the import, not persistently
Outside that, the case is weak. A web browser doesn’t need Notes. A media player doesn’t. A photo app doesn’t.
Why this category is unusually sensitive
Notes is where many users keep:
- Passwords and recovery codes (despite Apple’s recommendation to use Passwords app)
- Wi-Fi credentials
- Door codes and gate codes
- Account numbers and routing details
- Tax records
- Medical history and prescriptions
- Drafts of resignations, complaints, legal letters
- Personal journals
This isn’t because Notes was designed for that. It’s because Notes is the path of least resistance — open it, type, the thing is saved. So an app with full Notes access is reading a wider personal archive than the toggle name suggests.
How locked notes work
When you lock a note in Apple Notes, the contents are encrypted with a key derived from your password. The encryption is real — even Apple can’t decrypt locked notes server-side, and apps with Notes permission can’t read them without unlocking.
To lock a note:
- Open Notes
- Select the note
File → Lock Noteor click the lock icon
You can use a single password for all locked notes or your Mac login password (more recent versions). Touch ID and Face ID work as quick unlock.
If you keep genuinely sensitive things in Notes — and you should probably move them to Apple’s Passwords app instead — locking gives you defense in depth even from apps with Notes permission.
How to revoke
In System Settings → Privacy & Security → Notes, toggle off any app you don’t actively use for Notes-related workflows. The app may need to relaunch.
For apps that only needed access during a one-time import, you can safely revoke after the import completes. Bear, for instance, asks for Notes access during its Apple Notes import flow but doesn’t need it persistently afterward.
What about Shortcuts touching Notes?
Shortcuts that read or write Notes generate Automation grants under Shortcuts.app, not Notes permission grants. So if you have shortcuts that file things into Notes, the relevant audit lives in Privacy & Security → Automation, with Notes as a child of Shortcuts.
This is true for any Apple-built app: third-party tools accessing Apple Notes through scripting events go through Automation. Tools accessing Notes through the modern Notes API (via the EventKit-style framework Apple provides) go through Notes permission.
Sandbox containers and Notes
App Store apps need a specific entitlement (com.apple.security.personal-information.notes in current versions) to ask for Notes access. Sandboxed apps with the toggle on read the same data as non-sandboxed apps would.
The sandbox restricts what the app can do after reading. Network egress is limited to declared endpoints. So a sandboxed Notes-importing tool can’t quietly stream your Notes archive to an analytics service.
Notes accounts and what each app sees
If you have multiple accounts syncing notes — iCloud, Gmail, Exchange — Apple Notes shows them in separate sections in the sidebar. Apps with Notes permission see all of them. There’s no per-account scoping.
If you want to keep one account’s notes invisible to third-party tools, the cleanest path is removing that account from Notes. You can keep it in Mail and other contexts without it surfacing in Notes by going to Internet Accounts, selecting the account, and turning off Notes for it.
What about iCloud encryption?
Apple Notes content syncs to iCloud. Standard iCloud encryption keeps the data encrypted in transit and at rest, but Apple holds the keys (so they can decrypt for legal requests). If you’ve enabled Advanced Data Protection in System Settings → Apple ID → iCloud, Notes is end-to-end encrypted — only your devices have the keys.
This is server-side encryption and doesn’t affect the on-device permission system. An app with Notes permission still sees Notes content because the data is decrypted on your Mac before any third-party app reads it. Advanced Data Protection helps against data exposure if iCloud is compromised; it doesn’t change what local apps can do.
Audit checklist
Once or twice a year is plenty:
- Open
System Settings → Privacy & Security → Notes - If the list is empty, leave it that way
- For any apps on the list, confirm they’re actively used for Notes workflows
- Revoke any one-time import tools that finished their import
- Lock genuinely sensitive notes regardless of the audit
Notes is one of the most personal data stores on your Mac. The audit list should be very short — most users have zero entries here, and that’s correct. If you’ve granted Notes to any app, revisit the decision regularly. Locking your most sensitive notes is the belt to that suspenders.