Apple Stores Customer Data In China

Apple has said that it has been storing Chinese customers' data inside data centres based in China in compliance with  the orders of Chinese authorities to keep the personal data of its Chinese customers within the country’s borders. 

The iPhone maker is building two new data centres in China to house the data, as the company seems to have reportedly ceded to the country’s law that requires all personal information and data collected in China, to not leave its borders.

Apple does claim that it has "never compromised the security" of either its customers or their data and is merely complying with Chinese law about the data storage of its nationals, as with the laws of all the countries in which it has a presence. However, China has long been accused of using technology to monitor its population and there are concerns that Apple user data may be easily accessible by the Chinese government.

"We retain control of the encryption keys for our users' data, and every new data centre we build affords us the opportunity to use Apple's most cutting-edge hardware and security technologies to protect those keys," Apple said in a statement. "In addition, we handle law enforcement requests in China through the appropriate legal process, just like we do everywhere else, and we regularly and transparently report the instances when we are compelled to provide user information."

In December 2020 Apple removed 46k apps from its China App Store, following a deadline set by the state.The majority were games, which require an official lisence to be available in the country and Apple employees were instructed to flag those apps that company management perceived would anger the Chinese government. 

 Topics on those apps that would get flagged under this policy would certainly include the exiled Tibetan Dalai Lama and exponents of  independence for Taiwan, which China argues is a province of the nation. Some of the apps removed from the Chinese store related to gay dating services and foreign news organisations.

Washington Post:      BBC:       Techradar:        Fortune:      New York Times:         Business Insider:     Image: Unsplash

You Might Also Read:

Russia To Block LinkedIn:

 

« Will Governments Ban Ransom Payments To Hackers?
The History Of The Internet And Its Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.