No charge for iPhone 5 rogue data usage, says Verizon
Apple issued update Sunday to fix bug
Computerworld - Verizon today said that it would not charge iPhone 5 customers for the bits they downloaded before Apple patched a data-draining bug.
On Sunday, Apple issued an update for iPhone 5s used by Verizon customers. The bug caused their phones to draw on the carrier's cellular network despite being within range of a Wi-Fi network.
By default, an iPhone is supposed to automatically switch to a Wi-Fi connection if one is available.
"Under certain circumstances, iPhone 5 may use Verizon cellular data while the phone is connected to a Wi-Fi network," Apple acknowledged in an accompanying advisory.
Today, Verizon pledged that it would not bill customers for the data.
"Verizon Wireless customers will not be charged for any unwarranted cellular data usage," a company spokeswoman said in an email reply to questions. She did not elaborate on how Verizon will determine what usage was "unwarranted."
In emails late last week, numerous Computerworld readers bemoaned the bug and asked what they should do about the data usage they were racking up.
Some heavily-trafficked threads on Apple's support forums also popped up within days of the iPhone 5's debut, with scores of users reporting that they were seeing extraordinary data usage when they were within range of Wi-Fi.
On Sept. 24, one iPhone owner said his son's iPhone 5 had consumed 2GB of data overnight, while the boy was sleeping; Verizon zeroed out his data usage in response.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about iOS in Computerworld's iOS Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All iOS White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!