Apple Lays Down New Rules For Law Enforcement Data

Apple releases guidelines for law enforcement data requests (CNET, 7 May 2014) – Apple has published a new set of guidelines regarding how law enforcement agencies and other government entities may request information from the company about user data. The new rules , which were posted to Apple’s website late Wednesday, reflect Apple’s move toward notifying its customers when it receives law enforcement requests for user data. “Apple will notify its customers when their personal information is being sought in response to legal process except where providing notice is prohibited by the legal process itself, by a court order Apple receives (e.g., an order under 18 U.S.C. §2705(b)), or by applicable law or where Apple, in its sole discretion, believes that providing notice could create a risk of injury or death to an identifiable individual or group of individuals or in situations where the case relates to child endangerment,” the guidelines state. Apple says it can extract active user-generated data from native apps on passcode-locked iOS such as SMS, photos, videos, contacts, audio recording, and call history. However, it can’t provide email, calendar entries, or any third-party app data. Also it can only perform data extraction from devices running iOS 4 or later “in good working order” at its Cupertino headquarters. Apple also said that upon the receipt of a valid wiretap order, it can intercept users’ email communications but not their iMessage or FaceTime communications because those communications are encrypted.

Provided by MIRLN.

Image courtesy of krishnan.