Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Apple’s Revamped Privacy Website Offers Users Access to Their Data

Apple users can now get a copy of the data the tech giant has on them, directly from a refreshed and expanded privacy website rolled out this week.

Apple users can now get a copy of the data the tech giant has on them, directly from a refreshed and expanded privacy website rolled out this week.

The revamped mini site provides users with easier and faster access to the personal information that Apple keeps, and appears meant to complement a series of new security and privacy features that were included in iOS 12 and macOS Mojave.

As expected, the Cupertino-based iPhone maker voices its commitment to user safety and privacy on the mini site, where it also lists the features that it has included in its products in this regard.

“We’re committed to keeping your personal information safe. That’s why we innovate ways to safeguard your privacy on your device, why we’re up front about how we personalize your experience, and why we equip developers with the best tools to protect your data,” Apple says.

On top of that, the company also provides users with information on how to manage their privacy and what tools they can take advantage of for that. Thus, the privacy-focused website offers details on how users can keep devices, data, and their Apple ID secure, as well as on how they can protect themselves from phishing.

Apple users can also access a Data and Privacy page where a series of dedicated privacy management tools are available. These allow users not only to grab a copy of their data, but also to request a correction to that data, and even deactivate their Apple ID temporarily, or delete their accounts and the data associated with them, permanently.

At the moment, the self-service data and privacy tools are available to users in the United States, the European Union, Australia, Canada, Iceland, Liechtenstein, New Zealand, Norway, and Switzerland.

However, Apple says customers around the world will get access to the same capabilities in the coming months. In the meantime, users in other countries or regions can request a correction to their data or delete their account and associated data, and can also contact Apple to request a copy of their data.

Advertisement. Scroll to continue reading.

The tech company also reveals that, after conducting a review of its data collection practices, it has decided to include new and updated data and privacy statements in Apple products, “to make it easier than ever to understand how Apple will use your personal information.”

These statements are showed before the user signs in with their Apple ID or turns on any new features that use their data, the company says.

The privacy website also allows users to access a transparency report page, which includes information on the “various forms of legal process requesting information from or actions by Apple.” These range from government requests for locating lost or stolen devices to requests for user data, emergency requests, and requests from private parties in the U.S. seeking customer data.

Related: U.S. Unveils First Step Toward New Online Privacy Rules

Related: Apple Boosts Security in iOS 12, macOS Mojave

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.