Apple Will Pay Compensation For Slowing Down iPhones

Apple has begun paying compensation for a long-running class action lawsuit over the claims that it deliberately slowed down certain iPhones.  Apple was intentionally slowing down iPhone performance as the batteries aged to prevent unexpected shutdowns and performance issues with the gadgets.

The complainants will now each receive about $92 from the total $500m (£394m) settlement.

To be eligible in the US, you had to have been a US-based owner of an iPhone 6, 6 Plus, 6s, 6s Plus, and/or SE device running iOS 10.2.1, and/or a US-based owner of an iPhone 7 or 7 Plus device running iOS 11.2 or later all before December 21, 2017.

A similar action is happening in the UK, which is legally pushing for £1.6bn in compensation. Apple has also agreed to settle a lawsuit in Canada for slowing down older iPhones, potentially paying up to $14.4 million Canadian dollars.

The US law suit dates from December 2017, when Apple had confirmed that it had deliberately slowed down aging iPhones. Apple said that as iPhone batteries got older, their performance decreased, and so the "slowdown" lengthened the phones' lifespan.

Apple reduced the performance of certain iPhones without telling its customers, and this resulted in Apple offering a cut-price battery replacement to fix the problem.

This led to a US legal action. At the time of the settlement, it was estimated that each person might receive as little as $25 each but the actual pay-out appears to be almost four times that sum. In the UK, Apple lost a bid to block a similar mass action lawsuit in November.

Apple had previously called the lawsuit "baseless" and said "we have never, and would never, do anything to intentionally shorten the life of any Apple product, or degrade the user experience to drive customer upgrades". 

Unlike the US settlement, which only applied to devices in the iPhone 6 and 7 ranges, the UK lawsuit also seeks damages for those who had iPhone 8, 8 Plus and X devices.

BBC:     Techradar:    India Today:      MailOnline:     Wired:    gagadget:     Image: Yiran Ding

You Might Also Read: 

Smartphones Are More Vulnerable Than You Think:
___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Are Your AWS Databases Secure? Critical Best Practices
US Space Force Has Plans To Use Artificial Intelligence  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

Quantropi

Quantropi

Quantropi is bound to be the standard for quantum-secure data communications – forever unbreakable, no matter what.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.