Apple Strengthens Privacy Protections

Moore & Van Allen PLLC
Contact

Privacy multiple locks - tealApple recently changed its privacy policy which has made headlines – it will no longer unlock iPhones and iPads for law enforcement.  Prior to this change, Apple would assist law enforcement in unlocking Apple devices when presented with a valid subpoena or court order.

According to Apple’s CEO, Tim Cook, the company attempts to avoid collecting user data when it designs new technology and services.  The most recent version of Apple’s mobile device operating system, iOS 8, encrypts the data for all iOS 8 applications, such as email, call records, and iMessage, and this data is secure and inaccessible without the user’s passcode.  Unlike previous versions of the operating system, it is no longer possible for Apple to bypass the user’s passcode and unlock the device for law enforcement.  Only the user holds the “key” to unlock the encrypted data.

Of course, the deployment of Touch ID in more recent models of iPhones and iPads undercuts some of these new privacy protections.  Touch ID relies on a fingerprint, rather than a passcode, to access an iPhone or iPad device.  Law enforcement may be able to gain access to the contents of any of iPhone or iPad that utilizes Apple’s Touch ID feature.  A Virginia court recently held that law enforcement can lawfully require a suspect to unlock a phone using their fingerprint without violating the privilege against self-incrimination provided by the Fifth Amendment of the U.S. Constitution.

Forensic experts have also noted that is still possible for law enforcement to access sensitive data on the device stored in third-party applications such as Facebook, Instagram and Twitter as well as the device’s web browsers, photos and video. Through a trick called “siphoning,” this third-party application data can be accessed by impersonating a trusted computer to which a user has previously connected the device.   To employ this trick, law enforcement or a cyber hacker must either plant malware on a user’s computer or simply grab the user’s computer along with his or her mobile device.  In addition, the user would also have to leave the device unlocked; locked and freshly restarted devices are not vulnerable to siphoning.

While iPhones and iPads are not completely immune to access by law enforcement (or hackers) – it is clear that Apple is making an effort to improve their reputation for protecting the data of their customers.  It is widely believed that Apple’s new increased focus on privacy is in response to several high profile cyber hacks, including the recent embarrassing hack that stole celebrities’ nude photographs from their Apple iCloud accounts.  Apple’s efforts are generally being applauded by privacy advocates and Apple users.

Of course, Apple’s new policy (and operating system technology) has drawn sharp criticism from law enforcement and the intelligence community, which has labeled it a threat to national security and an impediment to criminal justice – though in light of the growing use of Touch ID (and law enforcement’s ability to compel a use of fingerprint to unlock smartphones and tables), at least some of the concerns expressed by law enforcement seem overblown.

It will be interesting to see how other mobile device manufacturers respond to Apple’s well-publicized privacy campaign.  Will they follow suit?  Will Apple’s change in operating system technology have any noticeable impact on preventing cyber hacking of Apple mobile devices?  Time will tell.

 

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Moore & Van Allen PLLC | Attorney Advertising

Written by:

Moore & Van Allen PLLC
Contact
more
less

Moore & Van Allen PLLC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide