Apple Gave Up User Data In 82% Of Feds' Requests - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government

Apple Gave Up User Data In 82% Of Feds' Requests

Despite its high-profile challenge to the FBI's iPhone data request in the San Bernardino terrorist shootings, Apple complied with 82% of data requests from US government authorities.

Apple At 40: 12 Products That Changed Computing Forever
Apple At 40: 12 Products That Changed Computing Forever
(Click image for larger view and slideshow.)

When US government agencies came knocking on Apple's door for access to users' account information and content, the iconic computer and device maker complied with 82% of the requests during the second half of last year, according to Apple's transparency report released this week.

Apple turned over data and content from 4,411 accounts, including iTunes, iCloud, to US government officials between July 1 and Dec. 31, fulfilling 82% of US authorities' 1,015 requests to access user accounts, Apple stated in its report. In China, Apple disclosed more data account information than in the US, affecting 5,082 account holders whose information was shared with Chinese authorities largely due to phishing investigations. Apple's compliance with Chinese authorities' 32 account access requests was fulfilled only 53% of the time.

When account information is provided to authorities, it can include a user's name, address, and, in some cases, content like photos, documents, contacts, calendar information, and bookmarks held in the accounts. But Apple notes that it will carefully weigh the requests and provide information when a search warrant is provided.

(Image: Jason Doiy/iStockphoto)

(Image: Jason Doiy/iStockphoto)

In the high-profile San Bernardino terrorist case, Apple said it was willing to comply with the government's request to search Syed Farook's iPhone, but because of its encryption technology, it could not access the contents and data on the phone. The legal battle over the FBI's attempt to get Apple to build a backdoor in its iOS to provide access to the phone ultimately fell by the wayside after the FBI was able to find a third-party to break into Farook's iPhone.

Apple's transparency report also details the number of times that various countries request information about its users' devices. Most of these requests center on lost or stolen Apple devices, with authorities requesting customer contact information that is used to register an Apple device.

Apple provided Poland with data information on 56,447 devices during the second half of last year, fulfilling 55% of the 22 device requests from Polish authorities. Most of the requests came from Poland's customs and revenue authorities, Apple notes in its report.

Requests from German authorities involved 31,360 devices, in which 52% of the 11,989 requests were fulfilled. For South Korea, which filed 119 requests, Apple provided information on 27,922 devices. In fulfilling 60% of South Korea's requests, Apple noted most of them centered on stolen devices.

Create a culture where technology advances truly empower your business. Attend the Leadership Track at Interop Las Vegas, May 2-6. Register now!

In the US, Apple fulfilled 80% of the 4,000 device data requests that applied to a total of 16,112 devices.

The computer maker notes it does not take requests for users' information lightly. In its statement about the way it reviews requests for users' information from government agencies, Apple said:

When we receive information requests, we require that it be accompanied by the appropriate legal documents such as a subpoena or search warrant. We believe in being as transparent as the law allows about what information is requested from us. We carefully review any request to ensure that there's a valid legal basis for it. And we limit our response to only the data law enforcement is legally entitled to for the specific investigation.

Apple notes that 94% of requests for information center on device requests, with 6% seeking account information.

But perhaps a more noteworthy figure is the number of people overall who have been affected by the information requests from authorities from around the world. The computer maker points out that only 0.00612% of its overall customer base has been affected by government information requests.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
impactnow
50%
50%
impactnow,
User Rank: Author
4/27/2016 | 1:42:23 PM
The market is now open
The sad reality of this entire situation is that Apple has now created an entire market for hackers who want to get rich very quickly . There will be a next time when the device needs to be accessed for national security now we are creating a whole army of hackers who can do this for less then admirable reasons .
impactnow
50%
50%
impactnow,
User Rank: Author
4/28/2016 | 12:12:27 PM
Re: The market is now open
Broadway I don't think its Apple's fault or any other technology company.We need standards in these cases. This is not only an issue in the case of terrorism but in other crimes where evidence is housed on a technology device. It is an ethical standard that needs to be established for how we handle technology in criminal situations. If a pedophile is arrested can the police access their computer or phone for evidence or is the data private even though it might identify other victims and make the case stronger? These are all the questions we need to answer to establish standards and processes so that we don't need to go to court. It really is a terms and conditions revision to how our data is used in certain circumstances.

 Today, it is already happening without the public being aware of it. There are times when the government can access phone records calls etc. in cases of national security. It is part of our existing laws the technology just needs to be addressed.Dealing with these issues as one offs will only create a backlog in the courts.

 
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
News
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
Slideshows
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll