Apple Takes Legal Action Over Data Privacy

Apple is taking legal action over the British government's efforts to force the company to weaken iCloud encryption. As a first step, Apple has appealed to the Investigatory Powers Tribunal, an independent court with the power to investigate claims against the Security Service.

Now, Apple has filed a court appeal to overturn this order, issued by the UK government, that demanded sweeping access to users’ encrypted cloud data and prompted criticism from several quarters. This is an unprecedented row between one of the world's biggest technology firms and the British government over data privacy.

Recently, Apple was issued with a secret order by the Home Office to share encrypted data belonging to Apple users around the world with UK law enforcement in the event of a potential national security threat. Data protected by Apple's standard level of encryption is still accessible by the company if a warrant is issued, but the firm cannot view or share data encrypted using its toughest privacy cloud tool called Advanced Data Protection (ADP).

ADP is an opt-in feature and it is not known how many people use it

In late February Apple chose to remove ADP from the UK market rather than comply with the notice, that would mean creating a hidden way in for the UK Government to have access. Apple said at the time that it would never compromise its security features and it was disappointed at having to take the action in the UK.

The UK's order also angered the US administration with President Donald Trump describing it to The Spectator as "something that you hear about with China".

The newly appointed Director of US National Intelligence, Tulsi Gabbard, has said she had not been informed about the UK government's demand. In a letter she said that it was an "egregious violation" of US citizens' rights to privacy and added that she intended to find out whether it breached the terms of a legal data agreement between the US and the UK.

The  UK Home Office has so far has refused to confirm or deny that the notice issued in January exists, as legally this order cannot be made public. The Financial Times newspaper, which first revealed Apple's legal action, has reported that the tribunal case could be heard in the next few weeks, but may not be made public.

BBC    |    Indian Express     |    Times Of India     |   Reuters     |    Reddit  |   Security Online     |    

Apple Insider

You Might Also Read: 

Backdoor Access To Apple User Data Condemned:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Urgency Of AI Governance
Chinese Hackers Indicted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Forthright Technology Partners

Forthright Technology Partners

Forthright Technology Partners (Forthright) is a next-generation cloud and managed IT services provider serving a global clientele.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.