This document summarizes Google and Apple's privacy policies. It discusses what personal and non-personal information they collect, how they collect and use it, and how they share information with third parties. It also covers details about Google's privacy dashboard and tools that allow users to access and delete their data. The document compares the two companies' approaches, noting that Google relies on advertising revenue while Apple focuses on hardware sales. It emphasizes the importance of privacy policies and individual awareness of data collection and use.
Learn easy way to impact your content marketing and social media results - today. This presentation includes tips on Google+, Google Authorship, SlideShare, Chat Apps like Snapchat, writing and blogging advice, and more.
To design effective user-focused services, we need to use data. We need to understand how people are using the service, what works for them and what doesn’t. There can be no service without data.
But as designers, we have to focus on user needs. That means we need to address users’ data needs as well as their service needs. We must design good services based on good data that don’t infringe on people’s privacy. This means we have to look at questions like: what data is my service collecting? How and when is this data being used? Who has access to this data and who owns it? And how do we keep it secure?
As service designers working with data on a daily basis, Maria Izquierdo and Martin Jordan want to raise awareness of the value of data to services. And they also want to discuss fundamental questions around what happens to that data.
Maria is a designer interested in diversity, digital culture and the public. Martin helps create better public services in the UK and researches service innovation in Finland. Both Maria and Martin work as service designers at the UK’s Government Digital Service in London.
This edition of Service Design Drinks was hosted at HERE in Berlin-Mitte.
Using Data to Inform Information Architecture and User ExperienceElementive
Data about users is all around us and, more and more, we're being asked to utilize that data when architecting information, designing experiences and creating content. But, what is the right way to utilize all the data we have to understand our users?
Watch video of Matthew Edgar, web consultant at Elementive, delivering this presentation at IA Summit 2016. https://blueprintdigital.com/ia-summit-2016/matthew-edgar/
Socialytics: Accelerating IBM Connections Adoption with Watson AnalyticsFemke Goedhart
Session delivered at IBM Connect 2017 on Feb 21st 2017 by Femke Goedhart & Franz Walder - panagenda
Abstract: Social adoption is a challenge for many companies. What is the most effective utilization of the environment? Who is using which resources, what in the environment is dormant or orphaned? Where should efforts focus in order to improve adoption? All of these questions can be difficult to answer and there is no "one size fits all" solution as each organization has their own unique needs. Join Femke Goedhart and Franz Walder and learn how to tackle this topic using IBM Connections and Watson. Starting out with IBM Bluemix Data Connect to collect and combine data from relevant sources, they use the cognitive power of IBM Watson Analytics to answer those tricky questions and provide solutions to real-world adoption challenges.
Learn easy way to impact your content marketing and social media results - today. This presentation includes tips on Google+, Google Authorship, SlideShare, Chat Apps like Snapchat, writing and blogging advice, and more.
To design effective user-focused services, we need to use data. We need to understand how people are using the service, what works for them and what doesn’t. There can be no service without data.
But as designers, we have to focus on user needs. That means we need to address users’ data needs as well as their service needs. We must design good services based on good data that don’t infringe on people’s privacy. This means we have to look at questions like: what data is my service collecting? How and when is this data being used? Who has access to this data and who owns it? And how do we keep it secure?
As service designers working with data on a daily basis, Maria Izquierdo and Martin Jordan want to raise awareness of the value of data to services. And they also want to discuss fundamental questions around what happens to that data.
Maria is a designer interested in diversity, digital culture and the public. Martin helps create better public services in the UK and researches service innovation in Finland. Both Maria and Martin work as service designers at the UK’s Government Digital Service in London.
This edition of Service Design Drinks was hosted at HERE in Berlin-Mitte.
Using Data to Inform Information Architecture and User ExperienceElementive
Data about users is all around us and, more and more, we're being asked to utilize that data when architecting information, designing experiences and creating content. But, what is the right way to utilize all the data we have to understand our users?
Watch video of Matthew Edgar, web consultant at Elementive, delivering this presentation at IA Summit 2016. https://blueprintdigital.com/ia-summit-2016/matthew-edgar/
Socialytics: Accelerating IBM Connections Adoption with Watson AnalyticsFemke Goedhart
Session delivered at IBM Connect 2017 on Feb 21st 2017 by Femke Goedhart & Franz Walder - panagenda
Abstract: Social adoption is a challenge for many companies. What is the most effective utilization of the environment? Who is using which resources, what in the environment is dormant or orphaned? Where should efforts focus in order to improve adoption? All of these questions can be difficult to answer and there is no "one size fits all" solution as each organization has their own unique needs. Join Femke Goedhart and Franz Walder and learn how to tackle this topic using IBM Connections and Watson. Starting out with IBM Bluemix Data Connect to collect and combine data from relevant sources, they use the cognitive power of IBM Watson Analytics to answer those tricky questions and provide solutions to real-world adoption challenges.
Building a Foundational Tech Stack to Support Your First-Party Data StrategyTinuiti
D2C has led the way by building direct relationships with consumers, which has become essential across the retail landscape now that first-party data is king. In this 2-day virtual event, we discuss the emerging trends in 2021 and how brands can adapt their approach to meet ever-changing consumer expectations.
Digital Advertising, Personalisation & User PrivacyWestleyCogan
An overview of data collection & user privacy in the current digital marketing landscape. Includes data collection points that are used by the paid search platforms Google Ads, Bing Ads & Facebook Ads. The power of personalisation in advertising is highlighted and whether these are received positively by consumers or are seen as intrusive.
This is a brief policy primer on Google's Privacy and Terms of Use details. Explained without dogma, instead with an insight into how their guidelines impact on your digital shadow online.
Concent management the new insurance by Hanna WaldenmaierIT Knowledge Bank
In this presentation Hanna Waldenmaier is talking about consent management.
Hanna is director strategic partnerships at Usercentrics. She has been part of the company from the very beginning and therefore has plenty of interesting information to share with us.
Topic was presented at Women in Big Data Munich event at Usercentrics.
https://www.womeninbigdata.org/
You can watch the recording of the presentation in our YouTube channel:
https://youtu.be/hMKMtg79o2o
For more content like this, visit IT Knowledge Bank website:
https://www.itknowledgebank.com/
About Usercentrics
Headquartered in the heart of Munich, Usercentrics’ vision is to create a new infrastructure for user consent across data architectures – making privacy practical. As a leader in the area of Consent Management Platforms (CMP), the SaaS solution enables businesses to collect, manage and document user consents across all digital channels such as websites or apps. Thus, compliance with current and future international privacy regulations such as GDPR, ePrivacy and CCPA can be ensured.
The CMP offers its users an intuitive user interface, realtime monitoring, multifaceted variations for opt-in, A/B testing as well as optimization tools. Since its founding in late 2017, the company has grown dramatically and now counts hundreds of leading organizations as customers. For more information, visit https://usercentrics.com/.
Vorian Agency Google+ Seminar (Social Media Marketing)Matt Lynch
Not sure what Google's Social Media channel Google+ is all about? It is one of the top four social media channels for businesses to consider implementing as part of their online marketing strategy. Find out why from online marketing specialist Matt Lynch - General Manager of Vorian Agency, a Perth Social Media Marketing and Online Marketing company - in Western Australia, and a Google Partner and Bing Ads Professional.
This training seminar looks at why you should consider using Google+ for business, how to set up a Google profile, managing social media content marketing on Google+, cross pollination of social media marketing, the tie in to the whole Google ecosystem, and a run down on some very useful tools to use with Google+.
Partner Mauricio Uribe kicked off a two-part, comprehensive discussion on data privacy. The presentation served as an introduction to the topic and provided more general information.
Speakers: Mauricio Uribe
Building a Foundational Tech Stack to Support Your First-Party Data StrategyTinuiti
D2C has led the way by building direct relationships with consumers, which has become essential across the retail landscape now that first-party data is king. In this 2-day virtual event, we discuss the emerging trends in 2021 and how brands can adapt their approach to meet ever-changing consumer expectations.
Digital Advertising, Personalisation & User PrivacyWestleyCogan
An overview of data collection & user privacy in the current digital marketing landscape. Includes data collection points that are used by the paid search platforms Google Ads, Bing Ads & Facebook Ads. The power of personalisation in advertising is highlighted and whether these are received positively by consumers or are seen as intrusive.
This is a brief policy primer on Google's Privacy and Terms of Use details. Explained without dogma, instead with an insight into how their guidelines impact on your digital shadow online.
Concent management the new insurance by Hanna WaldenmaierIT Knowledge Bank
In this presentation Hanna Waldenmaier is talking about consent management.
Hanna is director strategic partnerships at Usercentrics. She has been part of the company from the very beginning and therefore has plenty of interesting information to share with us.
Topic was presented at Women in Big Data Munich event at Usercentrics.
https://www.womeninbigdata.org/
You can watch the recording of the presentation in our YouTube channel:
https://youtu.be/hMKMtg79o2o
For more content like this, visit IT Knowledge Bank website:
https://www.itknowledgebank.com/
About Usercentrics
Headquartered in the heart of Munich, Usercentrics’ vision is to create a new infrastructure for user consent across data architectures – making privacy practical. As a leader in the area of Consent Management Platforms (CMP), the SaaS solution enables businesses to collect, manage and document user consents across all digital channels such as websites or apps. Thus, compliance with current and future international privacy regulations such as GDPR, ePrivacy and CCPA can be ensured.
The CMP offers its users an intuitive user interface, realtime monitoring, multifaceted variations for opt-in, A/B testing as well as optimization tools. Since its founding in late 2017, the company has grown dramatically and now counts hundreds of leading organizations as customers. For more information, visit https://usercentrics.com/.
Vorian Agency Google+ Seminar (Social Media Marketing)Matt Lynch
Not sure what Google's Social Media channel Google+ is all about? It is one of the top four social media channels for businesses to consider implementing as part of their online marketing strategy. Find out why from online marketing specialist Matt Lynch - General Manager of Vorian Agency, a Perth Social Media Marketing and Online Marketing company - in Western Australia, and a Google Partner and Bing Ads Professional.
This training seminar looks at why you should consider using Google+ for business, how to set up a Google profile, managing social media content marketing on Google+, cross pollination of social media marketing, the tie in to the whole Google ecosystem, and a run down on some very useful tools to use with Google+.
Partner Mauricio Uribe kicked off a two-part, comprehensive discussion on data privacy. The presentation served as an introduction to the topic and provided more general information.
Speakers: Mauricio Uribe
Similar to Privacy management: Google and Apple (20)
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
4. •Privacy Management Pagina 4
Google Privacy Policy
Google’s privacy policy explains:
What information they collect and why they collect them.
How they use those information.
The choices they offer, including how to access and update
information.
25/05/2017
5. •Privacy Management Pagina 5
Google Privacy Policy: information that they collect
Why?
In order to provide a better service to all users.
An example: Google offers a personalized search called “Search, plus your
world”.
Main idea: you obtain, as
a conseguence of a
search, a result that is
based on your personal
information.
25/05/2017
6. •Privacy Management Pagina 6
Google Privacy Policy: informations that they collect
How?
They collect information in the following
ways:
Information that user gives to them: like
personal information that a user provides
through a Google Account in order to use
some services.
After this step, you can create a
publicly visible Google Profile
in order to take full advantage
of the sharing features they
offer.
25/05/2017
7. •Privacy Management Pagina 7
Google Privacy Policy: informations that they collect
Information that they get from the usage of their services: they
collect information about the used service and how a user interacts
with it. This information include:
Device information: they colletct infromation about specific
device’s characteristics.
Log information: it refers to the information stored in the server
log that come from the interaction between a Google service
and the user.
Location information: they may collect and process information
about the user’s actual location.
Unique application number: information that come from the
installation of a Google service on the user’s device.
25/05/2017
8. •Privacy Management Pagina 8
Google Privacy Policy: informations that they collect
Local storage: information that Google stores on your device.
Cookies and similar technologies: used to collect information
that come from the interaction of a user with a Google service
and also to offer services to Google’s partners.
25/05/2017
9. •Privacy Management Pagina 9
Google Privacy Policy: information that they collect
How Google use these information?
To provide, mantain, protect and improve their services.
Transparency
Google offers, to the users, the possibility to have complete control
over the privacy through a series of operations that are available in
the settings area of the user’s personal account. A better control
over the privacy is obtained also through some Google Chrome
extensions.
An example: a Chrome extension that allows the management of
cookies.
25/05/2017
10. •Privacy Management Pagina 10
Google Privacy Policy: information that they collect
Information that you
share
When a user shares
informations publicly,
they may be indexable
by search engines.
25/05/2017
11. •Privacy Management Pagina 11
Google Privacy Policy: information that they share
Information that Google shares:
With user’s consent: with this consent Google can share personal information
with companies, organizations or individuals outside Google.
With domain administrator: if your Google account is managed for you by a
domain administrator, he/she can use some basic operations such as: change
password, suspend access, view statistics, etc…
For external processing: Google provides personal information to affiliates to
process them for it.
For legal reason: Google shares information with third parties if this disclosure
of sensitive data is reasonably necessary to:
Meet any applicable law
Enforce applicable Term of Service
Detect, prevent or address fraud
Protect against harm to the rights
In addiction Google may share
non-personally identifiable information
with its partners to show trends about the
general use of our service.
25/05/2017
12. •Privacy Management Pagina 12
Google Transparency Report
Government removals
Google receives a lot of requests from courts and government agencies
around the world to remove some contents.
How the requests are
processed?
If they satisfy some some
requirements then they are
accepted, otherwise Google
sends them back to the
source asking for more
details.
25/05/2017
14. •Privacy Management Pagina 14
What is it google?
Google is not
a search company
Google is not a technology
company
Google sells
ADVERTISING
The more they know about you,
the more money they can make
by selling adverts aimed at you
25/05/2017
15. •Privacy Management Pagina 15
Knows what
you do online
Knows what
you think
Knows where
you go
Knows who
you talk to
Knows how
you spend
your money
25/05/2017
16. •Privacy Management Pagina 16
Google Knows What You Think
What They Know
Your interest and desires
Your needs
Your belifies (politics, religion, spirituality)
How They Know
25/05/2017
17. •Privacy Management Pagina 17
Google Knows What You Do Online
What They Know
Where you write
What you watch
What you read
How They Know
25/05/2017
18. 25/05/2017•Privacy Management Pagina 18
Google Knows Where You Go
What They Know
Where you have been
Where you are planning to go
Where you work
Where your regularly hangout
Where you live
Who you are meeting
How They Know
19. •Privacy Management Pagina 19
Google Knows Who You Talk To
What They Know
What you talk about
Where you talk about things
Who you have talked to
What you sound like
Which languages you speak
Who you email
How much you email
When you email
What you say in every
email you send (Gmail)
How They Know
25/05/2017
20. •Privacy Management Pagina 20
Google Knows How You Spend Your Money
What They Know
Where you shop
When you shop
What you buy
What your financial worth is
How much you spend
How They Know
25/05/2017
21. •Privacy Management Pagina 21
Google Knows All
If you use Google chrome, Gmail and
Google Drive, Google has access to pretty
much everything you do online. Google can
scan your file, emails and browsing habits to
serve you appropriate adverts
If you use an Android
phone, they also have your
call logs, messages and
mobile browsing data too
25/05/2017
22. •Privacy Management Pagina 22
Google Knows All 2.0
Did you know Google have acquired more the 150 companies over last decade?
Your call logs and browsing data
Your viewing habits and taster
Your images
Your photos
Which adverts you click
Your saved files
Your energy usage
Your location and travel
What you listen to
v
25/05/2017
24. •Privacy Management Pagina 24
Google stores two type of data
USER-GENERATED CONTENT
Which you control and which is
associated with your account
SERVER LOG DATA
Which is associated with one or more
browser cookie IDs stored on your
computer
Server log data is not visible to you
and is not considered to be personally
identifiable information
Logs contain details of how interact
with Google’s various services,
including: web page requests, query
history, IP address, Cookie IDs, other
metadata
25/05/2017
25. 25/05/2017•Privacy Management Pagina 25
6 ways to start preventing Google keeping data on you
Do not use any of these applications
Stop worrying and get on with life
Scott McNeally in 1999 (Founder of Sun Microsystems)
26. 25/05/2017•Privacy Management Pagina 26
The future – What will Google Know?
Where you
travel
What time of
day you travel
Who you
travel him What you do
in the car
What you talk
about the car
Google Car
27. 25/05/2017•Privacy Management Pagina 27
The future – What will Google Know?
Everything
you look at
Everything
you talk about
Who you spend
time with
Everywhere
you go
Everything
you do
Google Glass
28. 25/05/2017•Privacy Management Pagina 28
The future – What will Google Know?
Everything
your browse
online
Everything
you talk about
online
Everywhere
you buy online
Everything
you watch
online
Google Fiber + Google Aereospace + Loon
30. Privacy Management Pagina 30
Apple Privacy Policy
Why is privacy policy important ?
It defines how they collect, use, disclose,
transfer, and store users’ information.
25/05/2017
They divides information they collect in two main categories:
Personal Information: data that can be used to identify or contact a
single person.
Non-Personal Information: data in a form that does not, on its own,
permit direct association with any specific individual.
31. Pagina 31
Apple Privacy Policy: Personal information
What are personal information they collect ?
Name, mailing address, phone number, email address, contact preferences, and
credit card information.
When are these information collected ?
Creation of an Apple ID, purchase a product, download a software update.
Share your content with family and friends using Apple products.
In this case also the shared information about them are collected !
How are these information used ?
Product announcements, software updates, and upcoming events.
Create, develop, operate, deliver, and improve our products, services, content
and advertising.
Loss prevention and anti-fraud purposes.
Auditing, data analysis, and research.
25/05/2017Privacy Management
32. Privacy Management Pagina 32
Apple Privacy Policy: Non-Personal information
What are non-personal information they collect ?
Occupation, language, zip code, area code, unique device identifier, referrer
URL, location, and the time zone.
Customer activities on their website, iCloud services, our iTunes Store, App
Store.
How users use their services, including search queries.
How are these information used ?
Understand customer behavior and improve their products, services, and
advertising.
Provide more useful information to their customers and to understand which
parts of our website, products, and services are of most interest.
Improve the relevancy of results provided by their services. Others.
25/05/2017
33. Privacy Management Pagina 33
Apple Privacy Policy: Location-Based Services
What are we talking about ?
To provide location-based services on Apple
products, they collect, use, and share precise
location data, including the real-time
geographic location of your Apple computer
or device.
Unless you provide consent, this location data
is collected anonymously in a form that does
not personally identify you.
25/05/2017
34. Privacy Management Pagina 34
Apple Privacy Policy: Disclosure to Third Parties
Certain personal information are made available to strategic partners to
provide products and services.
Not shared for their marketing purposes.
Third party companies are obligated to protect your information.
When can they disclosure users’ personal information ?
Law, legal process, litigation, and/or requests from public and
governmental authorities.
National security, law enforcement, or other issues of public importance.
Enforce their terms and conditions or protect our operations or users.
25/05/2017
36. Privacy Management Pagina 36
Apple Government Information Requests
What are the most frequent request and
how do they respond ?
Device requests: information in relation to
Apple devices, such as an iPhone, iPad, or Mac.
Account requests: information in regard to an
Apple ID account and/or related Apple services
or transactions.
25/05/2017
National security-related requests are not
considered Device Requests or Account
Requests and are reported in a
separate category.
37. Privacy Management Pagina 37
Apple Government Information Requests
25/05/2017
On devices running iOS 8 and later
versions, your personal data is placed
under the protection of your passcode.
Therefore, Apple will not perform iOS
data extractions in response to
government search warrants because the
files to be extracted are protected by an
encryption key that is tied to the user’s
passcode, which Apple does not possess.
38. 25/05/2017 Pagina 38
Difference between privacy policies
Google gets 90%+ of its revenue from advertisers.
The ad
companies are
Google’s main
customers.
Google must
please the ad
companies.
Advertising
allows to offer
free google
Apple gets 90%+ of its revenue from selling computers and devices.
People are the
Apple’s main
customers.
Apple must
please the
people.
No need to
please ad
companies.
Ad companies want personal information, while people want privacy!
Privacy Management
40. 25/05/2017•Privacy Management Pagina 40
The #1 Place to see what Google knows about you
myaccount.google.com
/dashboard
This shows everything
Google is tracking about
you, based on your
accounts
47. Privacy Management Pagina 47
Apple VS FBI: Timeline
December 2, 2015: San Bernardino attack
o Killed 14 people and seriously injured 22.
o Attackers died in a shootout with police.
o Iphone 5C of one attacker recovered but locked with a four-digit
password.
February 9, 2016: FBI “procedure”
FBI unable to unlock recovered phone.
FBI asked the NSA to break into the phone but they couldn’t.
FBI asked Apple to create a new version of iOS (“GovtOS”) to disable
certain security features.
Apple declined due to its policy therefore FBI responded with a court
order issued under the “All Writs Act of 1789”.
25/05/2017
48. Privacy Management Pagina 48
Apple VS FBI: Timeline
Technical details about FBI order:
o Bypass or disable the auto-erase function.
o Enable to submit passcodes through different interfaces.
o Remove delay between passcode attempts.
February 16, 2016: Apple opposes the order
They don’t want to create a backdoor for security reasons.
No government had ever asked for similar access.
February 19, 2016: U.S. Department of Justice application
Apple could install the software in its own premises.
After the FBI had hacked the phone via remote connection, Apple could
remove and destroy the software.
25/05/2017
49. Privacy Management Pagina 49
Apple VS FBI: Timeline
March 28, 2016: FBI withdrawal of request
FBI Unlocked the iPhone with the third party's help.
Department of Justice withdrew the case.
25/05/2017
Information about the hack:
o Works only on iPhone models lacking the Touch
ID sensor.
o Costs more than $1.3 million.
o Exploits a zero-day vulnerability to bypass its ten-
try limitation.
o Developed by “Celebrate” (Israeli company) or
“professional hackers”.
50. Privacy Management Pagina 50
Apple VS FBI: Poll
Agree or disagree with Apple’s decision to oppose a court order to
unlock a smartphone that was used by one of the shooters in the San
Bernardino attack?
25/05/2017
51. 25/05/2017•Privacy Management Pagina 51
Possible evolution of privacy
Conclusions
Strong sensitization about the importance of privacy
Problem: great lack of awareness!
What does the society need?
Each user must be aware about what type of data is giving to the
service and how these data may be treated.