Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Data Security
Cisco UCS Invicta Series flash memory systems
Average Rating:
Rate this article:  
Yahoo, Apple Disclose Government Data Requests
Yahoo, Apple Disclose Government Data Requests

By Jennifer LeClaire
June 18, 2013 11:14AM

Bookmark and Share
"Regardless of the circumstances, our legal team conducts an evaluation of each request and, only if appropriate, we retrieve and deliver the narrowest possible set of information to the authorities," Apple said in a statement. "In fact, from time to time when we see inconsistencies or inaccuracies in a request, we will refuse to fulfill it."
 


Following disclosures from Microsoft and Facebook last Friday, Yahoo and Apple are releasing information on thousands of requests they have received for user data related to criminal and security investigations from law enforcement and the U.S. National Security Agency.

Requests for user data that investigative agencies in the U.S. made to Yahoo from Dec. 1, 2012, to May 31 numbered between 12,000 and 13,000, including both criminal requests and those under the Foreign Intelligence Surveillance Act (FISA), which is the authority the NSA uses to seek information. Yahoo said the most common requests for user data concerned fraud, homicides, kidnappings and other criminal investigations. Yahoo did not specify how many user accounts were involved in the requests.

"Democracy demands accountability," Yahoo said in a statement authored by CEO Marissa Mayer and General Counsel Ron Bell. "Recognizing the important role that Yahoo can play in ensuring accountability, we will issue later this summer our first global law enforcement transparency report, which will cover the first half of the year. We will refresh this report with current statistics twice a year.

"As always, we will continually evaluate whether further actions can be taken to protect the privacy of our users and our ability to defend it. We appreciate -- and do not take for granted -- the trust you place in us."

Apple Data Requests

For Apple, from Dec. 1, 2012, to May 31 the company received between 4,000 and 5,000 requests from U.S. investigative agencies for customer data. Between 9,000 and 10,000 accounts or devices were specified in those requests, which came from federal, state and local authorities and included both criminal investigations and national security matters. Apple said the most common form of request came from police investigating robberies and other crimes, searching for missing children, trying to locate a patient with Alzheimer's disease, or hoping to prevent a suicide.

"Regardless of the circumstances, our legal team conducts an evaluation of each request and, only if appropriate, we retrieve and deliver the narrowest possible set of information to the authorities," Apple said in a statement. "In fact, from time to time when we see inconsistencies or inaccuracies in a request, we will refuse to fulfill it."

Apple went on to say that it doesn't collect or maintain a mountain of personal details about its customers. In fact, the company said there were categories of information which it did not provide to law enforcement or any other group because it does not retain it. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Data Security
1.   Retailers Hacked by New Malware
2.   IBM Beefs Up Identity Intelligence
3.   Tor Internet Privacy Service Breached
4.   Tor Working To Fix Security Exploit
5.   Protect Yourself from Identity Theft


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New 'Backoff' Malware Slips Undetected into Retail Systems
'Malicious actors' are using a new variety of malware to access consumer payment data remotely through point-of-sale systems, according to a report from the Department of Homeland Security.
 
IBM Beefs Up Identity Intelligence Security Solutions
Big Blue is betting big on identity intelligence. IBM just acquired a private firm with security software to govern user access to apps and data across cloud and on-premise environments.
 
USB Security Flaw Lets Hackers Hijack PCs
Hackers can use the firmware that controls USB functions to take control of computers, say security experts. That means there may be a new class of attack for which there are no defenses.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
BlackBerry Messenger Now Available on Windows Phone
BlackBerry's free Messenger chatting and voice app is out of beta and widely available for Windows Phone users, the company said. BBM offers secure messaging, Groups, Voice, Channels and more.
 
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.