Apple Stores Customer Data In China

Apple has said that it has been storing Chinese customers' data inside data centres based in China in compliance with  the orders of Chinese authorities to keep the personal data of its Chinese customers within the country’s borders. 

The iPhone maker is building two new data centres in China to house the data, as the company seems to have reportedly ceded to the country’s law that requires all personal information and data collected in China, to not leave its borders.

Apple does claim that it has "never compromised the security" of either its customers or their data and is merely complying with Chinese law about the data storage of its nationals, as with the laws of all the countries in which it has a presence. However, China has long been accused of using technology to monitor its population and there are concerns that Apple user data may be easily accessible by the Chinese government.

"We retain control of the encryption keys for our users' data, and every new data centre we build affords us the opportunity to use Apple's most cutting-edge hardware and security technologies to protect those keys," Apple said in a statement. "In addition, we handle law enforcement requests in China through the appropriate legal process, just like we do everywhere else, and we regularly and transparently report the instances when we are compelled to provide user information."

In December 2020 Apple removed 46k apps from its China App Store, following a deadline set by the state.The majority were games, which require an official lisence to be available in the country and Apple employees were instructed to flag those apps that company management perceived would anger the Chinese government. 

 Topics on those apps that would get flagged under this policy would certainly include the exiled Tibetan Dalai Lama and exponents of  independence for Taiwan, which China argues is a province of the nation. Some of the apps removed from the Chinese store related to gay dating services and foreign news organisations.

Washington Post:      BBC:       Techradar:        Fortune:      New York Times:         Business Insider:     Image: Unsplash

You Might Also Read:

Russia To Block LinkedIn:

 

« Will Governments Ban Ransom Payments To Hackers?
The History Of The Internet And Its Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Information Services Group (ISG)

Information Services Group (ISG)

As a leading global research and advisory firm, ISG partners with our clients to determine a future vision, lead rapid change and realize the value of your digital investments at scale.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.