Apple reports on U.S. data demands, claims privacy is paramount
Apple says it has never received an order under Section 215 of USA Patriot Act
IDG News Service - Apple on Tuesday provided a report on how much data on users governments have demanded from the company, and sought to set itself apart from Silicon Valley competitors whose businesses are built on amassing personal data.
Apple fielded requests from U.S. law enforcement agencies for details on between 2,000 and 3,000 accounts in the first half of this year, the company said.
The requests generally sought items such as personal information on customers, email, photographs stored in iCloud and other such data stored online, according to Apple. U.S. regulations prohibit Apple from disclosing information in increments finer than 1,000 and it isn't allowed to say what percentage of those requests it rejected or fulfilled.
In making its disclosure, Apple noted that it doesn't have a lot to benefit from collecting and storing vast amounts of information on users.
"Perhaps most important, our business does not depend on collecting personal data," the company said. "We have no interest in amassing personal information about our customers. We protect personal conversations by providing end-to-end encryption over iMessage and FaceTime. We do not store location data, Maps searches, or Siri requests in any identifiable form."
The statement could be seen as something of a swipe at competitors like Google and Facebook, which are increasingly competing to make money from information their customers share via their services, from search requests to social media postings.
In publishing the figures, Apple became the latest major U.S. technology company to provide a partial look at the previously dark world of law enforcement requests for user data.
The issue has come to the forefront in recent months after documents leaked by former U.S. government contractor Edward Snowden apparently showed U.S. agencies enjoyed deep access into data collected by providers of Internet services.
Apple sought to split the requests into those targeting accounts and those targeting devices like iPhones, iPads and MacBooks. It fielded 3,542 requests seeking information on 8,605 specific devices. Most of those requests were in relation to investigations on lost or stolen devices and didn't target user information.
"We believe it is important to differentiate these categories and report them individually. Device requests and account requests involve very different types of data. Many of the device requests we receive are initiated by our own customers working together with law enforcement. Device requests never include national security-related requests."
One of the most interesting revelations was contained in the final footnote to the document: "Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us."
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is email@example.com
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts