* indicates required


Apple Strengthens Privacy Protections
Apple Strengthens Privacy Protections

Apple recently changed its privacy policy which has made headlines – it will no longer unlock iPhones and iPads for law enforcement.  Prior to this change, Apple would assist law enforcement in unlocking Apple devices when presented with a valid subpoena or court order.

According to Apple’s CEO, Tim Cook, the company attempts to avoid collecting user data when it designs new technology and services.  The most recent version of Apple’s mobile device operating system, iOS 8, encrypts the data for all iOS 8 applications, such as email, call records, and iMessage, and this data is secure and inaccessible without the user’s passcode.  Unlike previous versions of the operating system, it is no longer possible for Apple to bypass the user’s passcode and unlock the device for law enforcement.  Only the user holds the “key” to unlock the encrypted data.

Of course, the deployment of Touch ID in more recent models of iPhones and iPads undercuts some of these new privacy protections.  Touch ID relies on a fingerprint, rather than a passcode, to access an iPhone or iPad device.  Law enforcement may be able to gain access to the contents of any of iPhone or iPad that utilizes Apple’s Touch ID feature.  A Virginia court recently held that law enforcement can lawfully require a suspect to unlock a phone using their fingerprint without violating the privilege against self-incrimination provided by the Fifth Amendment of the U.S. Constitution.

Forensic experts have also noted that is still possible for law enforcement to access sensitive data on the device stored in third-party applications such as Facebook, Instagram and Twitter as well as the device’s web browsers, photos and video. Through a trick called “siphoning,” this third-party application data can be accessed by impersonating a trusted computer to which a user has previously connected the device.   To employ this trick, law enforcement or a cyber hacker must either plant malware on a user’s computer or simply grab the user’s computer along with his or her mobile device.  In addition, the user would also have to leave the device unlocked; locked and freshly restarted devices are not vulnerable to siphoning.

While iPhones and iPads are not completely immune to access by law enforcement (or hackers) – it is clear that Apple is making an effort to improve their reputation for protecting the data of their customers.  It is widely believed that Apple’s new increased focus on privacy is in response to several high profile cyber hacks, including the recent embarrassing hack that stole celebrities’ nude photographs from their Apple iCloud accounts.  Apple’s efforts are generally being applauded by privacy advocates and Apple users.

Of course, Apple’s new policy (and operating system technology) has drawn sharp criticism from law enforcement and the intelligence community, which has labeled it a threat to national security and an impediment to criminal justice – though in light of the growing use of Touch ID (and law enforcement’s ability to compel a use of fingerprint to unlock smartphones and tables), at least some of the concerns expressed by law enforcement seem overblown.

It will be interesting to see how other mobile device manufacturers respond to Apple’s well-publicized privacy campaign.  Will they follow suit?  Will Apple’s change in operating system technology have any noticeable impact on preventing cyber hacking of Apple mobile devices?  Time will tell.

About Data Points: Privacy & Data Security Blog

The technology and regulatory landscape is rapidly changing, thus impacting the manner in which companies across all industries operate, specifically in the ways they collect, use and secure confidential data. Moore & Van Allen’s Privacy & Data Security Group recognizes the challenges clients face in the effort to stay abreast of such volatility. “Data Points” seeks to educate by providing transparent and cutting-edge insight on the most critical issues and dynamics. Our goal is to inform business decision-makers who are navigating these waters about the information they must protect, and what to do if/when security is breached. Read About Our Practice and Meet the MVA Privacy & Data Security Team.

Interested in Other Topics?

Jump to Page

Subscribe To Our Newsletter


* indicates required

By using this site, you agree to our updated Privacy Policy and our Terms of Use.