Free Essay

Apple Releases Details on Us Data Requests

In:

Submitted By kwanniiez
Words 659
Pages 3
Apple releases details on US data requests

Apple CEO Tim Cook reaches for iPhone as he speaks at Apple's Worldwide Developer Conference (WWDC) in San Francisco on June 10, 2013. US tech giant Apple revealed on Monday it received between 4,000 and 5,000 data requests in six months from US authorities, days after Facebook and Microsoft released similar information.
Apple CEO Tim Cook reaches for iPhone as he speaks at Apple's Worldwide Developer Conference (WWDC) in San Francisco on June 10, 2013. US tech giant Apple revealed on Monday it received between 4,000 and 5,000 data requests in six months from US authorities, days after Facebook and Microsoft released similar information.
US tech giant Apple revealed on Monday it received between 4,000 and 5,000 data requests in six months from US authorities, days after Facebook and Microsoft released similar information.
Apple, Facebook, Microsoft and several other top Internet and technology companies have come under heightened scrutiny since word leaked of a vast, covert Internet surveillance program US authorities insist targets only foreign terror suspects and has helped thwart attacks.
In a statement on its web site, Apple said in the period between December 1, 2012 and May 31, 2013, federal, state and local law enforcement had requested customer information up to 5,000 times, related to between 9,000 and 10,000 accounts or devices.
Most commonly, these requests were related to criminal investigations, searches for missing children or patients with Alzheimer's disease, or hoping to prevent a suicide, Apple said.
But the iPhone maker said it works vigorously to protect the privacy of its users and only provides information by court order.
"Regardless of the circumstances, our legal team conducts an evaluation of each request and, only if appropriate, we retrieve and deliver the narrowest possible set of information to the authorities," it said, noting that sometimes the requests were denied altogether.
Apple also specified certain types of communications are protected, such as FaceTime and iMessage conversations, which are "protected by end-to-end encryption so no one but the sender and receiver can see or read them."
"Apple cannot decrypt that data," the statement said.
"Similarly, we do not store data related to customers' location, Map searches or Siri requests in any identifiable form."
Facebook said Friday it had received between 9,000 and 10,000 requests for user data affecting 18,000 to 19,000 accounts during the second half of last year, while Microsoft said it had received 6,000 to 7,000 requests affecting 31,000 to 32,000 accounts during the same period.
Both firms said they were prohibited by law from listing a separate tally for security-related requests or secret court orders concerning terror probes.
Internet freedom group The Center for Democracy & Technology praised the release as an "important step" but urged the government to allow the companies to release further details.
There has been a public backlash for the tech companies since government contractor Edward Snowden leaked details of PRISM, a vast program that saw nine companies turn over user data to the US National Security Agency.
Leaked details of the program -- first published by Britain's Guardian newspaper and The Washington Post -- have reignited debate over the trade-offs between privacy and security more than a decade after the September 11 attacks.
The companies have denied claims the NSA could directly access their servers. US authorities have said the program was legal and limited.
FBI Director Robert Mueller told lawmakers last week the program could have prevented 9/11 and said the leaks had caused "significant harm to our nation and to our safety."
He also confirmed that Snowden was the subject of a criminal investigation.
Snowden, a 29-year-old IT technician, has gone to ground in Hong Kong, where he had surfaced for media interviews after the leaks were published. He has vowed to contest any extradition order in court.

Similar Documents

Premium Essay

Ethics Essay

...Ethics are a system of moral principles. They may also be interpreted as a branch of philosophy dealing with values relating to human conduct; this is with respect to rightness and wrongness of certain actions as well as the motives of said actions. Ethical issues in regard to informational technology examines this structural belief through the examination of developing an ethical code, societal changes due to Informational technologies, the ethical usage of the technologies, and how these ethics should be enforced. Through the utilization of Brooks (2010) a distinct thesis shall be executed in which ethics and the issues regarding them in relation to information technology shall be portrayed. When developing a code of ethics one must understand where it is this code must derive to be succinct and coherent. There must be an understanding and a comprehension of society’s beliefs and core founding. This is necessary due to the state of moral that ethics must uphold. The moral state of ethics must conform to what is universally agreed upon as right or wrong. Without a mutual agreement among the masses the ideas that may or may not be portrayed are nothing more than biased decisions geared for the betterment of the individual. Technologies other than computers have also posed complex ethical issues. Consider all of the concern that was expressed when discussing the power of the atomic bomb. There were many questions to ask such as, should such a powerful tool be created and ultimately...

Words: 1580 - Pages: 7

Free Essay

Apple Ios

...A SEMINAR REPORT ON APPLE iOS 4 In DEPARTMENT OF COMPUTER SCIENCE & ENGG. HARYANA COLLEGE OF TECHNOLOGY AND MANAGEMENT, KAITHAL-136027 Session (Aug - Dec 2010) SUBMITTED BY: SUBMITTED TO: MAYUR BHOLA Mr. Arvind Kumar 7th semester [C.S.E. 1707372 Department] ABSTRACT iOS is Apple's mobile operating system developed originally for the iPhone, and later deployed on the iPod Touch and iPad as well. It is derived from Mac OS X, with which it shares the Darwin foundation, and is therefore a Unix-like operating system, by nature. In iOS, there are four abstraction layers: the Core OS layer, the Core Services layer, the Media layer, and the Cocoa Touch layer. The operating system uses roughly 500 megabytes of the device's storage. Version 4, announced in April 2010, introduced multitasking as well as several business-oriented features, including encryption for email and attachments. At the WWDC 2010 keynote on June 7, 2010, Apple announced that iPhone OS had been renamed iOS. Apple licenses the trademark for "iOS" from Cisco Systems (who own IOS), the same company with which Apple had earlier settled a dispute over the "iPhone" trademark...

Words: 10024 - Pages: 41

Premium Essay

Asdsa

...OPERATING SYSTEMS LECTURE: Chapter 1 INTRODUCTION TO OPERATING SYSTEMS * Elements of a computer system: Hardware, Software, Peopleware, Communication, Data, * Types of Software: System software and application software | Type | Description | Examples | System software | Basic Software | * SW that manages and controls hw and application sw * usually called OS * includes utility programs/ service programs * language processors | OSDevice driversDisc compressionOptimization swScreen saversAnti virus swCompilers/ interpreters | | Middleware | Sw that operates between OS and appcn sw | DbmsCommunication mgmt sysOperations m toolsSw development system | Application software | Common Application Software | Sw that is used for a variety of industries and work | Word processing swSpreadsheet swCad/camStatistical swGraphics swGroupware | | Specific Application Software | Sw that is used for specific industries and work | Payroll calc swFinancial accounting swSales mgmt swProduction mgmt system | | | | | User | | Software Application software Runs on system software platform | | Systems software Middle ware | | Basic software Acts as interface between the hw and appcn sw, and user | | | | hardware | PURPOSE OF OPERATING SYSTEM * provide an environment within the hardware so that users can execute their programs * serves as a platform where other programs can run goal of OS ...

Words: 3515 - Pages: 15

Premium Essay

Blackberry

...question, should BlackBerry drop their current operating system and use Android as a replacement? Initially it may sound like a good idea, after all Android is the number one smartphone operating system globally. And with BlackBerry’s platform struggling, why not go with the leader? Well, that answer may simply boil down to security, yes security. BlackBerry has always offered a platform that is secure end-to-end. In a June 26, 2014 press release, it was announced that Google will adopt part of Samsung’s KNOX as a security platform for Android which is a business-oriented security solution that will keep work and personal data separate and secure on a single device. BlackBerry’s CEO Chen says that it is a step in the right direction for Android but Samsung KNOX he says “is a fort built upon an insecure foundation” and he also points out the fact that there are tens of millions of secure BlackBerrys and only a few million phones with KNOX. And though that may be true there will be many more soon. How much longer can BlackBerry stay afloat in an Apple, Android, and Windows dominated market? BlackBerry got touchscreens wrong, they got apps wrong, and now all they have left is security. It’s a nice feature, but is it enough? Tables of Contents Chapter I – BlackBerry Limited at First sight………………………………………. ?-? Chapter II – Decisions BlackBerry is Facing……………………………. ……………… ?-? Chapter III – Analysis: Android...

Words: 3799 - Pages: 16

Premium Essay

Business Review

...Launch Plans  Financial Data 2 TELUS Confidential 2 Market Problem and Opportunity Wireless IP Solution Portfolio – Problem and Opportunity What was this portfolio designed for? capabilities - Originally designed to support CDMA Architecture 7 years ago - Built to implement 2 to 3 enterprise clients per month - Focused on modem market in the enterprise segment (C BAN Only) - Mostly in ILEC territories with MPLS network (in Canada) Where does this need to evolve to? - Support M2M & Non M2M (Smartphone) growth on LTE network and beyond - >500K+ loads annually and more in coming years - Across ENT, TBS and Partner segments for all devices (Modems, POS, Routers, Smartphones, Tablets, ATMs, Cars) - Across ILEC / Non ILEC territories (TELUS, Non TELUS, Internet) and even international connectivity 4 TELUS Confidential TELUS restricted and confidential– not for distribution 4 Mobile Business Drivers the courage to innovate TBS Segment • Provide controlled real-time access to business applications and systems for mobile workers in the business market Machine-to-Machine • Provide secure closed remote access to monitored data devices used for alarming, dispatch, visual display, systems control with controlled usage costs Multiple Profiles (Smartphone, tablet, PC) • Enable business and personal communications and management on a single device (cellular or wifi enabled) while showing separate data usage costs 5 TELUS Confidential ...

Words: 5354 - Pages: 22

Premium Essay

Donta'

...information. But they may also allow people with more malicious intentions to access information. Companies may install firewalls, use encryption software, and passwords. But as fast as software developers invent new and more elaborate protective measures, hackers seem to break through their defenses. Thus, security is an ongoing battle” (pg. 509). A great example of this is the group call “Anonymous”. They have successfully hacked into a number of companies and government agencies. They also have plans to takedown or hack in to the most popular social website, Facebook. Determine if hacking into a Website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Over the years we have heard of individuals hacking into computers, but in the last couple of years we are seeing more and more websites being hacked into. If an individual can get convicted and arrested for breaking into a department store and taking complete control of it or even robbing a store or department store a person that hacks into a company’s website should get the same treatment. A website is part of a company’s business and in most cases it’s their only business and the only way that they can make money. By hacking into an organizations website you are affecting and organization’s profit and therefore should be consider a crime. More so, it is also a crime because you are invading and organizations or individuals privacy....

Words: 2401 - Pages: 10

Free Essay

Apple's Future

...BALDWIN Apple’s Future: Apple Watch, Apple TV, and/or Apple Car? Since the release of the iPod in 2001, Apple had been probably the most successful technology company in the world. It revolutionized three businesses in the next 10 years: music, smartphones, and tablets. When Steve Jobs died in 2011, it was up to his successor, Tim Cook, to revolutionize the next set of industries. In 2015, Cook appeared to have three potential targets: watches (wearables), television, and cars. All three were bets on highly uncertain futures. Watches were off to a promising start in their first quarter of shipments, but it was far too early to declare victory. Television seemed ripe for disruption, but many firms had tried and failed to change the TV landscape. And cars, of course, represented the biggest opportunity as well as the biggest leap for Apple. Financially, Tim Cook and his team were unconstrained: Apple was the most profitable company on the planet in the fourth quarter of 2014, generating $18 billion in net income (Exhibit 1). However, Steve Jobs had famously said that Apple’s success came “from saying no to 1,000 things to make sure we don’t get on the wrong track or try to do too much. We’re always thinking about new markets we could enter, but it’s only by saying no that you can concentrate on the things that are really important.”1 The big questions for Tim Cook and his team included: Were watches, TVs, and car the right focus? Was Apple doing down the best path...

Words: 11550 - Pages: 47

Premium Essay

Clicking Clean

...Pomerantz, Greenpeace Yifei Wang, Greenpeace Editor: David Pomerantz, Greenpeace Creative Direction & Design by: Arc Communications Published in April 2014 by Greenpeace Inc. 702 H Street, NW Suite 300 Washington, D.C. 20001 United States greenpeace.org 2 Contents Executive Summary 5 Company Scorecard 7 Cloud Source 9 Global Energy Snapshot 13 The Cloud’s Next Stop: China 17 The Road Map to a Green Internet 19 Your Online World: Green IRL, or #dirty? 25 Green Internet Leaders and Best Practices 29 Where the Cloud Touches the Ground -- Map: Global Data Center Hot Spots -- Map: US Data Center Hot Spots -- US Regional Profiles 35 36 38 40 Appendix 1: Methodology 42 Appendix 2: Company Scores Explained 44 Appendix 3: Company Data Center Facilities and Estimates of Power Demand 64 Notes 78 03 4 © Frank van Biemen / EvoSwitch / Greenpeace Greenpeace USA Clicking Clean: How Companies are Creating the Green Internet Executive Summary Executive Summary For the estimated 2.5 billion people around the world who are connected to the internet, it is impossible to imagine life without it. The internet has rewoven the fabric of our daily lives – how we communicate with each other, work and entertain ourselves – and become a foundation of the global economy. Seemingly on a daily basis, new businesses that use the internet...

Words: 14837 - Pages: 60

Premium Essay

Marketing Plan

...Company XIV. I. Executive Summary: Mobile phones and smart phones are growing in popularity all around the world. Mobile technology has become important in the developing world, by allowing it to “shoot ahead” and take advantage of advances in information and communication technologies without land lines. Many development projects are currently underway to bring information services via mobile phone and other devices to emerging societies. (Wei, 2014) So U is a small manufacturing company which creates customize carrying cases for the mobile technology industry. So U converts leather into any type of mobile carrying case that can be universally use to carry any small to large mobile device manufactured under brand names such as Apple, Sony, and T-Mobile; but with the clients own engraved style choice which reflects their life style. Established in 2012 from the basement of my home, my brother and I was able to craft personalized carrying cases from supple leather for small to large portable devices that would be suitable with any name brand cellular electronics. Sale are rising; however there are a few issue of concern with marketing and merchandising, and getting the customize orders out to the customer in an appropriate time frame. We have leased space and increased our workforce...

Words: 4639 - Pages: 19

Free Essay

Android

...Android vs iPhone Junyao Zhang April 12, 2010 This is a complete analysis and comparison between Android and iPhone OS. The rest of this report is organized as follows. Section ?? outlines the system architecture, history and detail management configuration. Section ?? discusses the iPhone system. In Section ??, a comparison between these two systems is presented. 1 Android Android, originally meaning “robot”, is a mobile operating system using a modified version of the Linux kernel. It was initially developed by Android Inc., a firm later purchased by Google,[?]and lately by the Open Handset Alliance[?]. It allows developers to write managed code in the Java language, controlling the device via Google-developed Java libraries.[8] It empolys the software stack architecture, as shown in Figure 1. • Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. The kernel also acts as an abstraction layer between the hardware and the rest of the software stack. It is implemented by programming language C. • The middleware level includes Runtime and Libraries. The Runtime includes core libraries, providing most of the functionality available in the core libraries of the Java programming language, and Dalvik virtual machine which allows every Android application runs in its own process. The Libraries is used by various components of the Android system, such as Media Libraries, 3D libraries...

Words: 6786 - Pages: 28

Premium Essay

Samsung Hbr Case

...or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be transmitted, photocopied, digitized or otherwise reproduced in any form or by any means without the permission of the copyright holder. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Business School, Western University, London, Ontario, Canada, N6G 0N1; (t) 519.661.3208; (e) cases@ivey.ca; www.iveycases.com. Copyright © 2014, Richard Ivey School of Business Foundation Version: 2014-06-18 In April 2014, Samsung released its new high-tech flagship phone, the Galaxy S5. The new Android phone came after another successful year for the company. After becoming the leading global mobile phone manufacturer in 2012, 2 Samsung had maintained that lead in 2013 and sold more phones than rivals such as Nokia and Apple. Samsung was also a major player in the increasingly popular tablet computer market. The success of the Galaxy S3 and S4 had created a lot of expectations for the S5 device, but both Samsung and industry analysts were predicting that the new phone would help the company boost sales even further. This success and the ever-changing landscape of the mobile computing and telecommunication industries had put Samsung in an interesting competitive position...

Words: 9646 - Pages: 39

Premium Essay

Sasasa

...9-609-066 REV: MARCH 4, 2010 STEFAN THOMKE BARBARA FEINBERG De esign Th hinking and I Innovation at Apple Th hink different. — Apple Advertising Slogan, 1997 e 7–2002 By the beginnin of March 2010, weeks after the dramatic debut of its iPad, A y ng Apple’s share price remai ined in the US$ 200 range, where it had hovered for more than f six month U d for hs—signaling solid g financ strength and future gr cial a rowth prospec as world e cts economies, an businesses continued t reel nd s, to from the worst rec cession since the Great De epression. Wit a market c th capitalization of nearly US 200 S$ billion and annual sales appro n oaching $50 b billion, Apple was now w e worth more t than the indu ustrial giant General Elec ctric and exce eeded the val of Sony C lue Corporation b a factor of five, even th by hough both f firms had larg revenue b ger bases. All the more amazin ngly, a scant 12 years earlie when Steve Jobs er, e return to Apple, the company share pric had hovere around $5 and the futur was uncert ned , y’s ce ed re tain at best. J Jobs, after all had already been fired fr l, y rom the firm he co-founde almost a d ed decade earlier and r, he wa coming bac when the c as ck company was nearly writte off. Even s through th difficult pe s en so, hat eriod, the co commitme to produc design and development had stayed a ore ent ct t alive. Sin being fou nce unded in 197 Apple has been consid 76, s dered a leading designer and integrat of tor computer hardwa and softw are ware...

Words: 7945 - Pages: 32

Premium Essay

Capture

...AN INTRODUCTION TO LTE LTE, LTE-ADVANCED, SAE AND 4G MOBILE COMMUNICATIONS Christopher Cox Director, Chris Cox Communications Ltd, UK A John Wiley & Sons, Ltd., Publication This edition first published 2012 © 2012 John Wiley & Sons Ltd Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor...

Words: 124044 - Pages: 497

Premium Essay

Case Study

...Professor Igor Vaysman © 2012 by Igor Vaysman. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the author. In February 2011, to avoid bankruptcy, the board of directors of Adapconn Technologies agreed to sell the company to a major competitor for $1 and the assumption of Adapconn’s liabilities. Paul Wesland, Adapconn’s CFO, could not understand what had gone wrong: “Our entire industry suffered in 2008 and 2009, but recovered in 2010. We had great people, equipment, knowledge. For some reason, our market share plunged in 2009 and again in 2010. I think we simply ran out of time.” Industry Background. Electronics firms that sell their products to end customers are known as original equipment manufacturers (OEMs). The vast majority of OEMs outsource some production to contract manufacturers, known as electronic-manufacturing service (EMS) providers. In the last fifteen years, the EMS industry has grown rapidly, as OEMs outsource an increasing proportion of their manufacturing, and as numerous OEMs (including Cisco Systems, Apple, and HP) have built their entire business models based on outsourcing all, or almost all, manufacturing to EMS providers. The global EMS market is concentrated. In 2008, the top ten leading EMS firms included Foxconn (Hon Hai); Flextronics;...

Words: 2791 - Pages: 12

Premium Essay

Marketing

...|Creative technology ltd | |[pic] | |Creative Zii Egg Plaszma | | | | | Table of Contents 1. Executive summary 4 2. Introduction 5 3. External Environment 6 3.1 Market Demographic Environment 6 3.2 Market Economics Environment 7 3.3 Market Technological Environment 8 4. Internal Environment 8 4.1 Internal Resources 8 4.2 Potential Market 9 4.3 Competitors 9 5. Internal Analysis 11 5.1 SWOT Analysis 11 5.1.1 Strength 12 5.1.2 Weaknesses 12 5.1.3 Opportunities 12 5.1.4 Threats 12 6. Mission Statement and Objectives 13 6.1 Mission Statement 13 6.2 Objectives 13 6.2.1 Quantitative Objectives 13 6.2.2 Qualitative Objectives 13 7. Selection and Measuring of Target Market 13 7.1 Outline of Marketing Research 13 7.2 Assessment of Potential Market 14 7.3 Market Segmentation (in relation...

Words: 9387 - Pages: 38