Apple Stores Customer Data In China

Apple has said that it has been storing Chinese customers' data inside data centres based in China in compliance with  the orders of Chinese authorities to keep the personal data of its Chinese customers within the country’s borders. 

The iPhone maker is building two new data centres in China to house the data, as the company seems to have reportedly ceded to the country’s law that requires all personal information and data collected in China, to not leave its borders.

Apple does claim that it has "never compromised the security" of either its customers or their data and is merely complying with Chinese law about the data storage of its nationals, as with the laws of all the countries in which it has a presence. However, China has long been accused of using technology to monitor its population and there are concerns that Apple user data may be easily accessible by the Chinese government.

"We retain control of the encryption keys for our users' data, and every new data centre we build affords us the opportunity to use Apple's most cutting-edge hardware and security technologies to protect those keys," Apple said in a statement. "In addition, we handle law enforcement requests in China through the appropriate legal process, just like we do everywhere else, and we regularly and transparently report the instances when we are compelled to provide user information."

In December 2020 Apple removed 46k apps from its China App Store, following a deadline set by the state.The majority were games, which require an official lisence to be available in the country and Apple employees were instructed to flag those apps that company management perceived would anger the Chinese government. 

 Topics on those apps that would get flagged under this policy would certainly include the exiled Tibetan Dalai Lama and exponents of  independence for Taiwan, which China argues is a province of the nation. Some of the apps removed from the Chinese store related to gay dating services and foreign news organisations.

Washington Post:      BBC:       Techradar:        Fortune:      New York Times:         Business Insider:     Image: Unsplash

You Might Also Read:

Russia To Block LinkedIn:

 

« Will Governments Ban Ransom Payments To Hackers?
The History Of The Internet And Its Future »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.

Exaforce

Exaforce

At Exaforce, we are on a mission to 10× improve the productivity and efficacy of security and operations teams using our transformative multi-model AI engine.