Compliance, Ethics & Sustainability An international journal with a European focus 2025 nr. 3

Apple Inc v Secretary of State for the Home Department: the latest iteration of the never-ending security versus privacy debate

Julian Hayes, Megan Curzon and Jenna Gayle1

Artikel kopen € 79,00 excl. BTW

In plaats van abonneren kunt u dit artikel ook afzonderlijk kopen.

The precise subject matter of the legal stand-off between international tech giant Apple and the UK Home Secretary, currently before the Investigatory Powers Tribunal (``IPT") in London, is unknown. Apple is forbidden from disclosing it, the Home Secretary refuses to disclose it and, when hearing cases, the IPT itself must ensure information is not disclosed which could jeopardise national security, the prevention or detection of serious crime, the UK's economic well-being or the ongoing work of the intelligence services. From a media leak in February and a preliminary IPT ruling in April disclosing the barest of case details, we know only that Apple is challenging the Home Secretary's decision to impose a Technical Capability Notice ("TCN") requiring it to maintain the capability to remove end-to-end encryption ("E2EE") from its iCloud storage. It is Kafkaesque that something about which so little is known has caused Apple to pull its Advanced Data Protection encryption entirely...

U heeft op dit moment geen toegang tot de volledige inhoud van dit product. U kunt alleen de inleiding en hoofdstukindeling lezen.

Wanneer u volledige toegang wenst tot alle informatie kunt u zich abonneren of inloggen als abonnee.


Verder in dit artikel:

1. The origins of encryption & the dilemma it poses

2. Lawful exceptional access measures

3. Data protection, human rights and encryption

4. Alternatives to compromising E2EE

5. Striking the right balance

Deel deze pagina:

Nog niet beoordeeld

Bijlage(n)

  • Bijlagen zijn alleen beschikbaar voor abonnees.

Artikel informatie

Type
Artikel
Auteurs
Julian Hayes, Megan Curzon and Jenna Gayle1
Auteursvermelding
Ik ben auteur van dit artikel
Datum artikel
Uniek Den Hollander publicatienummer
UDH:TvCo/18703

Verder in 2025 nr.3

 Public Data, Private Risks

How LLMs Might Reshape Compliance Investigations Since the explosion in use of generative AI tools in 2023, and more specifically, in the use of chatbots powered by Large Language Models ("LLMs"), ...

 Privacy vs. Whistleblowing: Can Data Breaches Be Justified During Public Disclosure?

Whistleblowing has recently been at the forefront of the public consciousness increasingly often. Wikileaks, Theranos, and Cambridge Analytics have become household names due to the efforts of inte...

 Europe’s Health Data Shift: Regulation, Anonymisation, and Security

The 2021 ransomware attack on Ireland's Health Service Executive[2], where attackers threatened to publish patient data, presaged a new era of healthcare vulnerability. As Europe implements ambitio...

 Uit de boekenkast van de bedrijfsethiek (94)

In de bedrijfsethiek is een groot aantal boeken en artikelen verschenen waarin op praktische wijze prangende vraagstukken worden behandeld en concrete aanbevelingen worden gedaan voor het bevordere...

 Editorial

Privacy, Data Protection and Cyber security will most likely be points, high on the agenda for most Risk Committee meetings. These are the themes for this, the third edition of the Compliance, Ethi...

 Apple Inc v Secretary of State for the Home Department: the latest iteration of the never-ending security versus privacy debate

The precise subject matter of the legal stand-off between international tech giant Apple and the UK Home Secretary, currently before the Investigatory Powers Tribunal (``IPT") in London, is unknown...

 Navigating a new era of reporting cyber incidents in the UK and EU

Cyber security continues to be an issue that gathers mainstream attention, and for good reason. Both the costs of, and length of time to recover from, a cyber incident are increasing. According to ...