Legal Process Guidelines
|
|
|
- Job Newton
- 10 years ago
- Views:
Transcription
1 apple Legal Process Guidelines EMEIA Law Enforcement These guidelines are provided for use by law enforcement or other government entities in the EMEIA (Europe, Middle East, India, Africa) geographical region when seeking information from Apple s relevant entities providing service in the region about users of Apple s products and services, or from Apple devices. In these Guidelines, Apple shall mean the relevant subsidiary responsible for customer information in a particular region as per our privacy policy at Apple will update these Guidelines as necessary. This version was released on 29th September All other requests for information regarding Apple users, including user questions about disclosure of information, should be directed to These Guidelines do not apply to requests that law enforcement agencies make to Apple Inc. or to Apple s relevant local subsidiaries outside the EMEIA geographical region. For government information requests, we comply with the laws pertaining to global entities that control our data and we provide details as legally required. For content requests from law enforcement agencies outside the U.S., with the exception of emergency circumstances (defined below in Emergency Requests), Apple will only provide content in response to a search warrant issued pursuant to the Mutual Legal Assistance Treaty process or through other cooperative efforts with the United States Department of Justice.
2 INDEX I. General Information II. Service of Process Guidelines A. Law Enforcement Information Requests B. Preservation Requests C. Emergency Requests D. Account Deletion Requests E. User Notice III. Information Available From Apple A. Device Registration B. Customer Service Records C. itunes D. Apple Retail Store Transactions E. Apple Online Store Purchases F. itunes Gift Cards G. icloud H. Find My iphone I. Extracting Data from Passcode Locked ios Devices J. Other Available Device Information K. Requests for Apple Retail Store Surveillance Videos L. Game Center M. ios Device Activation N. Sign-on Logs O. My Apple ID and iforgot Logs P. FaceTime IV. Frequently Asked Questions V. Appendix A Vl. Appendix B
3 I. General Information Apple designs, manufactures, and markets mobile communication and media devices, personal computers, and portable digital music players, and sells a variety of related software, services, peripherals, networking solutions, and third-party digital content and applications. Apple s products and services include Mac, iphone, ipad, ipod, Apple TV, a portfolio of consumer and professional software applications, the ios and Mac OS X operating systems, icloud, and a variety of accessory, service and support offerings. Apple also sells and delivers digital content and applications through the itunes Store, App Store, ibookstore, and Mac App Store. User information is held by Apple in accordance with Apple s privacy policy and the applicable terms of service/terms and conditions for the particular service offering. Apple is committed to maintaining the privacy of the users of Apple products and services ( Apple users ). Accordingly, information about Apple users will not be released without proper legal process. The information contained within these Guidelines is devised to provide information to law enforcement agencies in EMEIA regarding the legal process that Apple requires in order to disclose electronic information to law enforcement and government agencies in EMEIA. These Guidelines are not intended to provide legal advice. The frequently asked questions ( FAQ ) section of these Guidelines is intended to provide answers to some of the more common questions that Apple receives. Neither these Guidelines nor the FAQ will cover every conceivable circumstance that may arise. Accordingly, please contact [email protected] with any further questions. This address is intended solely for use by law enforcement and government agents. If you choose to send an to this address, it must be from a valid law enforcement/government address. Nothing within these Guidelines is meant to create any enforceable rights against Apple and Apple s policies may be updated or changed in the future without further notice to law enforcement. The majority of law enforcement requests that Apple receives seek information regarding a particular Apple device or customer and the specific service(s) that Apple may provide to that customer. Apple can provide Apple device or customer information in so far as Apple still possesses the requested information pursuant to its data retention policies. Apple retains data as outlined in certain Information Available sections below. All other data is retained for the period necessary to fulfill the purposes outlined in our privacy policy. Law enforcement should be as narrow and specific as possible when fashioning their requests to avoid misinterpretation and/or objections in response to an overly broad request. II. Service of Process Guidelines A. Law Enforcement Information Requests Apple will accept service of legally valid law enforcement information requests by from law enforcement agencies, provided these are transmitted from the official address of the law enforcement agency concerned. Law enforcement officers in EMEIA submitting an information request to Apple should complete a Law Enforcement Information Request template, available at Appendix A, and transmit it directly from their official law enforcement address to the mailbox [email protected]. This address is intended solely for submission of law enforcement requests by law enforcement and government agents. Apple considers a law enforcement information request to be legally valid if it is made in circumstances pertaining to the bona-fide prevention, detection or investigation of offences and will respond appropriately to what it considers to be such legally valid requests.
4 B. Preservation Requests All icloud content data stored by Apple is encrypted at the location of the server. When thirdparty vendors are used to store data, Apple never gives them the keys. Apple retains the encryption keys in its U.S. data centres. As such, law enforcement agencies outside the United States seeking such content must obtain legal process through the United States Department of Justice authorities. Where the foreign country has signed a Mutual Legal Assistance Treaty (MLAT) with the United States then appropriate legal process can be obtained through the process specified in the treaty or through other cooperative efforts with the United States Department of Justice authorities. If the preservation of data in advance of impending MLAT process is requested, such request should be submitted to Apple Inc. by to [email protected]. Preservation requests must include the relevant Apple ID/account address, or full name and phone number, and/or full name and physical address of the subject Apple account. When a preservation request has been received, Apple Inc. will preserve a one-time data pull of the requested existing user data available at the time of the request for 90 days. After this 90 day period, the preservation will be automatically removed from the storage server. However, this period can be extended one additional 90-day period upon a renewed request. More than two preservations for the same account will be treated as requests for an extension of the originally preserved materials, but Apple Inc. will not preserve new material in response to such requests. C. Emergency Requests Apple considers a request to be an emergency request when it relates to a circumstance involving a bona-fide immediate and serious threat to: 1) the life/safety of individual(s); 2) the security of a State; 3) commit substantial damage to critical infrastructure or installations. If the requesting law enforcement officer provides satisfactory confirmation that their request relates to a bona-fide emergency circumstance involving one or more of the above criteria, Apple will examine such a request on an emergency basis. In order to make an emergency request to Apple, the requesting law enforcement officer should complete the template entitled EMERGENCY Law Enforcement Information Request, available at Appendix B, and transmit it directly from their official law enforcement address to the mailbox: [email protected] with the words Emergency Law Enforcement Information Request in the subject line. In the event that Apple produces customer data in response to an Emergency Law Enforcement Information Request, a supervisor for the law enforcement agent who submitted the Emergency Law Enforcement Information Request will be contacted and will be asked to confirm to Apple that the emergency law enforcement information request was legitimate. Apple requires that the law enforcement agent who submits the Emergency Law Enforcement Information Request provide the supervisor's contact information upon submission of the request. In addition, the requesting law enforcement officer should contact Apple s Global Security Operations Centre (GSOC) at , advise that they have an emergency law enforcement information request, provide brief details of the request, and ask that it be brought to the attention of the appropriate team as an emergency request. This phone number has support for all languages.
5 D. Account Deletion Requests In the event that law enforcement is requesting that Apple delete a customer s Apple ID, law enforcement is required to provide Apple with a court order or warrant specifying the account that is to be deleted and the basis for the request. E. User Notice Apple will notify its customers when their personal information is being sought in a legally valid law enforcement information request except where it reasonably considers that to do so would likely pervert the course of justice or prejudice the administration of justice. Apple will provide delayed notice for emergency requests except where Apple reasonably considers that to do so would likely pervert the course of justice or prejudice the administration of justice. Apple will provide delayed notice for requests after expiration of a non-disclosure period specified in a court order except where Apple reasonably considers that to do so would likely pervert the course of justice or prejudice the administration of justice. III. Information Available From Apple A. Device Registration Basic registration or customer information, including, name, address, address, and telephone number is provided to Apple by customers when registering an Apple device prior to ios 8 and OS Yosemite Apple does not verify this information, and it may not be accurate or reflect the device s owner. Registration information for devices running ios 8 and later versions, as well as Macs running OS Yosemite and later versions is received when a customer associates a device to an icloud Apple ID. This information may not be accurate or reflect the device s owner. Registration information can be obtained with a legally valid request. Please note, Apple device serial numbers do not contain the letters O or I, rather Apple utilises the numbers 0 (zero) and 1 (one) in serial numbers. Requests for serial numbers with either the letter O or I will yield no results. B. Customer Service Records Contacts that customers have had with Apple customer service regarding a device or service may be obtained from Apple. This information may include records of support interactions with customers regarding a particular Apple device or service. Additionally, information regarding the device, warranty, and repair may also be available. This information can be obtained with a legally valid request. C. itunes itunes is a free software application which customers use to organise and play digital music and video on their computers. It s also a store that provides content for customers to download for their computers and ios devices. When a customer opens an itunes account, basic subscriber information such as name, physical address, address, and telephone number can be provided. Additionally, information regarding itunes purchase/download transactions and connections, update/re-download connections, and itunes Match connections may also be available. itunes subscriber information and connection logs with IP addresses can be obtained with a legally valid request. itunes purchase/download transactional records are controlled by itunes S.à.r.l., which is a Luxembourg company. Due to legislative provisions, itunes can only respond to requests such as
6 this when they have been validated by the Public Prosecutor of Luxembourg and forwarded to itunes for response. Requests for these records should be submitted to the Public Prosecutor of Luxembourg at the following address: Parquet Général, Procureur Général d Etat, Cité Judiciaire Bât. CR, Plateau du St Esprit, L-2080 LUXEMBOURG, fax number: , [email protected]. D. Apple Retail Store Transactions Point of Sale transactions are cash, credit/debit card, or gift card transactions that occur at an Apple Retail Store. A legally valid request is required to obtain information regarding the type of card associated with a particular purchase, name of the purchaser, address, date/time of the transaction, amount of the transaction, and store location. When providing a legally valid request requesting Point of Sale records, include the complete credit/debit card number used and any additional information such as date and time of transaction, amount, and items purchased. Additionally, law enforcement may provide Apple with the receipt number associated with the purchase(s) in order to obtain duplicate copies of receipts, in response to a legally valid request. E. Apple Online Store Purchases Apple maintains information regarding online purchases including name, shipping address, telephone number, address, product purchased, purchase amount, and IP address of the purchase. A legally valid request is required in order to obtain this information. When requesting information pertaining to online orders (excluding itunes purchases), a complete credit/debit card number, an order number, reference number, or serial number of the item purchased is required. A customer name in combination with these parameters may also be provided, but customer name alone is insufficient to obtain information. F. itunes Gift Cards itunes gift cards have a sixteen-digit alphanumeric redemption code which is located under the scratch-off grey area on the back of the card, and a nineteen-digit code at the bottom of the card. Based on these codes, Apple can determine whether the card has been activated 1 or redeemed as well as whether any purchases have been made on the account associated with the card. When itunes gift cards are activated, Apple records the name of the store, location, date, and time. When itunes gift cards are redeemed through purchases made on the itunes store, the gift card will be linked to a user account. itunes gift cards purchased through the Apple Online Store can be located in Apple systems by their Apple Online Store order numbers (note: this only applies to itunes gift cards purchased through Apple as opposed to third-party retailers). Information regarding the customer who redeemed the cards will require a legally valid request, and information about online itunes store purchases will require a request to be submitted to the Public Prosecutor of Luxembourg at the following address: Parquet Général, Procureur Général d Etat, Cité Judiciaire Bât. CR, Plateau du St Esprit, L-2080 LUXEMBOURG, fax number: , [email protected]. Apple is unable to deactivate itunes gift cards in response to a legally valid request from a law enforcement/government agency. G. icloud icloud is Apple s cloud service that allows users to access their music, photos, documents, and more from all their devices. icloud also enables subscribers to back up their ios devices to icloud. With the icloud service, subscribers can set up an icloud.com account. icloud domains 1 Activated means that the card was purchased at a retail point-of-sale but not that it was used or redeemed.
7 2 All icloud content data stored by Apple is encrypted at the location of the server. When third-party vendors are used to store data, Apple never gives them the keys. Apple retains the encryption keys in its U.S. data centres. icloud is a subscriber based service. Requests for icloud data must include the relevant Apple ID/ account address. If Apple ID/account address are unknown, Apple requires subscriber information in the form of full name and phone number, and/or full name and physical address to identify the subject Apple account. The following information may be available from icloud: i. Subscriber information When a customer sets up an icloud account, basic subscriber information such as name, physical address, address, and telephone number may be provided to Apple. Additionally, information regarding icloud feature connections may also be available. icloud subscriber information and connection logs with IP addresses can be obtained with a legally valid request. Connection logs are retained up to 30 days. ii. Mail Logs icloud mail logs include records of incoming and outgoing communications such as time, date, sender addresses, and recipient addresses. Mail logs may be obtained with a legally valid request. icloud mail logs are retained up to 60 days. H. Find My iphone iii. Content and Other icloud Content. Photo Stream, Docs, Contacts, Calendars, Bookmarks, ios Device Backups icloud only stores content a subscriber has elected to maintain in the account while the subscriber s account remains active. icloud content may include , stored photos, documents, contacts, calendars, bookmarks and ios device backups. ios device backups may include photos and videos in the users camera roll, device settings, app data, imessage, SMS, and MMS messages and voic . All icloud content data stored by Apple is encrypted at the location of the server. When third-party vendors are used to store data, Apple never gives them the keys. Apple retains the encryption keys in its U.S. data centres. Law enforcement agencies outside the United States seeking such content must obtain legal process through the United States Department of Justice authorities. Where the foreign country has signed a Mutual Legal Assistance Treaty (MLAT) with the United States then appropriate legal process can be obtained through the process specified in the treaty or through other cooperative efforts with the United States Department of Justice authorities. Apple Inc. will provide subscriber content, as it exists in the subscriber s account, only in response to a search warrant issued pursuant to the MLAT process. Apple does not retain deleted content once it is cleared from Apple s servers. Find My iphone is a user-enabled feature by which an icloud subscriber is able to locate his/her lost or misplaced iphone, ipad, ipod touch or Mac and/or take certain actions, including putting the device in lost mode, locking or wiping the device. More information about this service can be 2 icloud has replaced the MobileMe service. Accordingly, Apple does not have any separate content associated with former MobileMe accounts. If the content is not in icloud, it is no longer being stored.
8 found at Location information for a device located through the Find My iphone feature is user facing and Apple does not have records of maps or alerts provided through the service. Find My iphone connection logs may be available and can be obtained with a legally valid request. Find My iphone connection logs are available for a period of approximately 30 days. Find My iphone transactional activity for requests to remotely lock or erase a device may be available only following receipt of a legally valid request. Apple cannot activate this feature on users devices upon a request from law enforcement. The Find My iphone feature must have been previously enabled by the user for that specific device. Apple does not have GPS information for a specific device or user. I. Extracting Data from Passcode Locked ios Devices Requests for technical assistance to access certain content on specified devices should be directed to Apple Inc., via the Mutual Legal Assistance Treaty (MLAT) process. Law enforcement agencies outside the United States seeking such content must obtain legal process through United States Department of Justice authorities. Where the foreign country has signed an MLAT with the United States then appropriate legal process can be obtained through the process specified in the treaty or through other cooperative efforts with the United States Department of Justice authorities. For all devices running ios 8.0 and later versions, Apple will not perform ios data extractions as data extraction tools are no longer effective. The files to be extracted are protected by an encryption key that is tied to the user s passcode, which Apple does not possess. For ios devices running ios versions earlier than ios 8.0, upon receipt of a search warrant issued pursuant to the MLAT process, Apple Inc. can extract certain categories of active data from passcode locked ios devices. Specifically, the user generated active files on an ios device that are contained in Apple s native apps and for which the data is not encrypted using the passcode ( user generated active files ), can be extracted and provided to law enforcement on external media. Apple Inc. can perform this data extraction process on ios devices running ios 4 through ios 7. Please note that the only categories of user generated active files that can be provided to law enforcement, following receipt by Apple Inc. of a search warrant issued pursuant to the MLAT process, are: SMS, imessage, MMS, photos, videos, contacts, audio recording, and call history. Apple Inc. cannot provide: , calendar entries, or any third-party app data. The data extraction process can only be performed at Apple Inc. s, Cupertino, California headquarters for devices that are in good working order. For Apple Inc. to assist in this process, the language outlined below must be included in a search warrant, and the search warrant must include the serial or IMEI number of the device. For more information on locating the serial or IMEI number of an ios device, refer to: Please make sure that the name of the judge on the search warrant is printed clearly and legibly in order for the paperwork to be completed. Once law enforcement has obtained a search warrant containing this language, it may be served on Apple Inc. by to [email protected]. The ios device can be provided to Apple Inc. for data extraction either through an in-person appointment or through shipment. If law enforcement chooses to ship the device, the device should not be shipped unless and until the officer receives an from Apple requesting shipment. For an in-person data extraction process, Apple requires that the law enforcement agent bring a FireWire hard drive with a storage capacity of at least two times the memory capacity for the ios device. Alternatively, if law enforcement chooses to ship the device, law enforcement should provide Apple with an external hard drive or USB "thumb" drive with a storage capacity of at least two times the memory capacity for the ios device. Please do not send the device unless and until you receive an requesting its shipment.
9 After the data extraction process has been completed, a copy of the user generated content on the device will be provided. Apple Inc. does not maintain copies of any user data extracted during the process; accordingly all evidence preservation remains the responsibility of the law enforcement agency. Required Search Warrant Language: It is hereby ordered that Apple Inc. assist [LAW ENFORCEMENT AGENCY] in its search of one Apple ios device, Model #, on the network with access number (phone number), serial 3 or IMEI 4 number, and FCC ID# (the Device ), by providing reasonable technical assistance in the instance where the Device is in reasonable working order and has been locked via passcode protection. Such reasonable technical assistance consists of, to the extent possible, extracting data from the Device, copying the data from the Device onto an external hard drive or other storage medium, and returning the aforementioned storage medium to law enforcement. Law Enforcement may then perform a search of the device data on the supplied storage medium. It is further ordered that, to the extent that data on the Device is encrypted, Apple may provide a copy of the encrypted data to law enforcement but Apple is not required to attempt to decrypt, or otherwise enable law enforcement's attempts to access any encrypted data. Although Apple shall make reasonable efforts to maintain the integrity of data on the Device, Apple shall not be required to maintain copies of any user data as a result of the assistance ordered herein; all evidence preservation shall remain the responsibility of law enforcement agents. J. Other Available Device Information MAC Address: A Media Access Control address (MAC address), is a unique identifier assigned to network interfaces for communications on the physical network segment. Any Apple product with network interfaces will have one or more MAC addresses, such as Bluetooth, Ethernet, Wi-Fi, or FireWire. By providing Apple with a serial number (or in the case of an ios device, IMEI, MEID, or UDID), this information may be obtained with a legally valid request. UDID: The unique device identifier (UDID) is a sequence of 40 letters and numbers that is specific to a particular ios device. It will look similar to the following: 2j6f0ec908d137be2e f b If law enforcement is in possession of the device, the device may be connected to itunes in order to obtain the UDID. Under the itunes summary tab, the UDID can be revealed by clicking on the serial number. 3 Note, Apple device serial numbers do not contain the letters O or I, rather Apple utilises the numbers 0 (zero) and 1 (one) in serial numbers. ios extractions for serial numbers with either the letter O or I can not be performed. The IMEI number is engraved on the back of cellular ipads, the original iphone, iphone 5, 5c, 5s, 6 and 6 Plus. 4 For more information, see Note that for models with IMEI numbers engraved on the SIM tray, the SIM tray in the device may not be the matching original that came with the device.
10 K. Requests for Apple Retail Store Surveillance Videos Video surveillance records may vary by store location. Video surveillance records are maintained at an Apple retail store for a maximum of thirty days. In many jurisdictions in Europe it is as short as twenty four hours taking account of local laws. After this time frame has passed, video surveillance may not be available. A request from law enforcement for video surveillance can be made at any local Apple retail store. Law enforcement should provide specific date, time, and related transaction information regarding the video requested. L. Game Center Game Center is Apple s social gaming network. Information regarding Game Center connections for a user or a device may be available. Connection logs with IP addresses and transactional records are available only following receipt of a legally valid request. M. ios Device Activation When a customer activates an ios device or upgrades the software, certain information is provided to Apple from the service provider or from the device, depending on the event. IP addresses of the event, ICCID numbers, and other device identifiers may be available. This information is available only following receipt of a legally valid request. N. Sign-on Logs Sign-on activity for a user or a device to Apple services such as itunes, icloud, My Apple ID, and Apple Discussions, when available, may be obtained from Apple. Connection logs with IP addresses and transactional records are available only following receipt of a legally valid request. O. My Apple ID and iforgot Logs My Apple ID and iforgot logs for a user may be obtained from Apple. My Apple ID and iforgot logs may include information regarding password reset actions. Connection logs with IP addresses and transactional records are available only following receipt of a legally valid request. P. FaceTime FaceTime communications are end-to-end encrypted and Apple has no way to decrypt FaceTime data when it is in transit between devices. Apple cannot intercept FaceTime communications. Apple has FaceTime call invitation logs when a FaceTime call invitation is initiated. These logs do not indicate that any communication between users actually took place. Apple has no information as to whether the FaceTime call was successfully established or duration of a FaceTime call. FaceTime call invitation logs are retained up to 30 days. FaceTime call invitation logs are available only following receipt of a legally valid request.
11 IV. Frequently Asked Questions Q: Can I contact Apple with questions regarding my law enforcement information request or legal process? A: Yes, questions or inquiries regarding your law enforcement information request should be ed to [email protected]. Q: Does a device have to be registered with Apple in order to function or be used? A: No, a device does not have to be registered with Apple in order for it to function or be used. Q: Can Apple provide me with the passcode of an ios device that is currently locked? A: No, Apple does not have access to a user s passcode but, depending on the version of ios that the device is running, may be able to extract some data from a locked device with a valid search warrant issued pursuant to the MLAT process, as described in the Guidelines. Q: Does Apple store GPS information that can be provided with a legally valid request? A: No, Apple does not track geolocation of devices. Q: What should be done with response information when law enforcement has concluded the investigation/criminal case? A: Apple requires that any information and data produced for law enforcement containing personally identifiable information (including any copies made) must be destroyed after the related investigation, criminal case, and all appeals have been fully exhausted. Q: Do you notify users of receiving law enforcement information requests in relation to them? A: Yes, Apple will send notice to the user(s) concerned when their personal account information is being sought in a legally valid law enforcement information request except where it reasonably considers that to do so would likely pervert the course of justice or prejudice the administration of justice. Q: Can you help me return a stolen or lost device to the rightful owner? A: In cases where you as law enforcement in EMEIA have recovered a suspected lost or stolen device and want to return it to the original owner, you should forward a request to our mailbox: [email protected] and include the device s serial or IMEI number and any additional relevant information. If registration information is available, we will contact the registrant and advise him or her to contact you.
12 V. Appendix A The Law Enforcement Information Request form for EMEIA Geographical Region is available as an editable PDF at: Vl. Appendix B The EMERGENCY Law Enforcement Information Request form is available as an editable PDF at:
How To Protect Your Privacy On An Apple Iphone Or Ipod
Legal Process Guidelines U.S. Law Enforcement apple These Guidelines are provided for use by law enforcement or other government entities in the U.S. when seeking information from Apple Inc. ( Apple )
Legal Process Guidelines
Legal Process Guidelines U.S. Law Enforcement apple These Guidelines are provided for use by law enforcement or other government entities in the U.S. when seeking information from Apple Inc. ( Apple )
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Apple Deployment Programs Apple ID for Students: Parent Guide
Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows
itunes: About ios backups
itunes: About ios backups itunes can back up your settings, Messages, Camera Roll, documents, saved games, and other data. Backups don't contain content synced to the device, such as movies, music, podcasts,
Pryvate App User Manual
Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their
How to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
Report on Government Information Requests
Report on Government Information Requests January - June, Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and
Report on Government Information Requests
Report on Government Information July 1 - December 31, 2014 apple Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Report on Government Information Requests
Report on Government Information January 1 - June 30, 2015 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Student ipad User and Setup Guide
P a g e 1 Student ipad User and Setup Guide Clayton Public School District is excited to provide you with an ipad. Please complete the following steps to prepare your device for proper use. Each student
Report on Government Information Requests
Report on Government Information July 1 - December 31, 2015 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
ios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
The End is Near. Options for File Management and Storage
The End is Near Options for File Management and Storage Options Google Drive icloud Drive USB Drives H:Drive icloud icloud IOS 8 icloud Drive icloud With icloud Drive, you can safely store all your presentations,
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Apple Pay Questions & Answers
Apple Pay Questions & Answers Member FDIC Welcome Questions and Answers About Apple Pay Thomaston Savings Bank is pleased to announce that its customers may now use Apple Pay to make purchases with their
Mobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
ios How to Back Up from icloud
ios How to Back Up from icloud How to back up from icloud icloud automatically backs up the most important data on your device using ios 5 or later. After you have enabled Backup on your iphone, ipad,
Using the Apple Configurator and MaaS3360
Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes
FAQ for ipad (ios 5.x)
FAQ for ipad (ios 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online
Snapchat Law Enforcement Guide
Snapchat Law Enforcement Guide Last Updated: June 1, 2015 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snapchat, Inc. 63 Market Street
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
A guide for Purchasing and Syncing Apps on the ipad
A guide for Purchasing and Syncing Apps on the ipad All Apps for the ipad can only be purchased through the itunes Store. This can either be done via itunes on the designated MacBook or via the ipad itself.
Students Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
Deploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0)
umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0) Copyright UBNTEK CO., LTD. www.ubntek.com Contents 1. Introduction... 3 2. System Requirements...
Apple Configurator MDM Site - Review
Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?
FAQs about Cyberbanking Mobile Phone. Q1: What services are available via Cyberbanking Mobile Phone?
FAQs about Cyberbanking Mobile Phone Introduction Q1: What services are available via Cyberbanking Mobile Phone? Via Cyberbanking Mobile Phone, you can: Check your account balances See details of all transactions
Create shared Photostreams in ios 7
Create shared Photostreams in ios 7 Why use Shared Photostreams? Emailing photos and the person on the receiving end complains of either being unable to open them or didn t see them in their email. File
PhoneView Product Manual
PhoneView Product Manual PhoneView is a Mac application for accessing iphone, ipad or ipod touch imessages, SMS/MMS, WhatsApp messages, contacts, call history, voicemails, shared app data, Safari web bookmarks
1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.
Collaboration Collaboration simply means to work together and that is exactly what Yosemite and ios 8 do for individuals and organisations. Quite often organisations face challenges around how to get technology,
PocketSuite Terms of Service. Last modified: November 2015
PocketSuite Terms of Service Last modified: November 2015 These Terms of Service (these Terms ) constitute the agreement (this Agreement ) between PocketSuite, Inc. (the Company ) and the User (as defined
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
Mobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?
Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad? 1 Overview Time Machine Backups Mac Basics: Time Machine backs up your Mac Time Machine is the built-in backup feature of OS X. It
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
NHSmail mobile configuration guide Apple iphone
Only the Apple iphone 3GS and iphone 4 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone Version: V.6 Date: November 2011
Quick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Boss Revolution Direct to Consumer U.S. Website. Terms of Use for Non-Regulated Products and Services that IDT Distributes
Boss Revolution Direct to Consumer U.S. Website Terms of Use for Non-Regulated Products and Services that IDT Distributes 1. Introduction Welcome to Boss Revolution from IDT Domestic Telecom, Inc. and
Backup ipad. Withdrawing from LISD. Before turning in your ipad,
Backup ipad Withdrawing from LISD... 1 Before turning in your ipad,... 1 Backing up your files... 2 Select a backup method... 2 1 - Google Takeout... 3 2 -Transfer ownership of your Google Site or blogs...
Bell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
Deploying Apple ios in Education
Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Hello. Quick Start Guide
Hello. Quick Start Guide Welcome to your new MacBook Air. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
First United Bank. Mobile Banking Enrollment and FAQs
First United Bank Mobile Banking Enrollment and FAQs Mobile Banking Enrollment & FAQs MOBILE DEVICE MINIMUM REQUIREMENTS Apple: Apple iphone 4.3 or higher Apple ipod Touch 4.3 or higher Apple ipod 4.3
Information Systems. Connecting Smartphones to NTU s Email System
Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone
Mobile Banking Questions and Answers
Mobile Banking Questions and Answers How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text messaging and data usage
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles
Privacy Notice H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles Protecting your information is important to us. The following guidelines set forth our
ManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
ios Developer Program Information
apple ios Developer Program Information Introduction The ios Developer Program provides a complete and integrated process for developing and distributing ipad, iphone and ipod touch applications. With
PMDP is simple to set up, start using, and maintain
Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - [email protected] PMDP is simple to set
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
PRIVACY POLICY. I. Introduction. II. Information We Collect
PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting
LabTech Mobile Device Management Overview
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
NBT Bank Personal and Business Mobile Banking Terms and Conditions
This NBT Bank Mobile Banking terms and conditions will apply if you use a mobile device to access our Mobile Banking service. When you use NBT Bank s Mobile Banking service, you will remain subject to
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data
For Privacy and Security Change ios 9 Settings Immediately by Zack Whittaker ZDNet Security September 16, 2015 Source: http://www.zdnet.com/pictures/iphone-ipad-ios-9-privacy-security-settings-immediately/
PRIVACY POLICY. Types of Information Collected
PRIVACY POLICY Tres Carnes ( we, our, or us, ) respects and is committed to protecting your privacy. That is why we have adopted this Privacy Policy. This Privacy Policy lets you know how and for what
ipecs Communicator Installation and Operation Guide Please read this manual carefully before operating your set. Retain it for future reference.
ipecs Communicator Installation and Operation Guide ipecs is an Ericsson-LG Brand Please read this manual carefully before operating your set. Retain it for future reference. Revision History Issue Date
Apple ios 8 Security
Apple ios 8 Security Apple ios 8 Security Apple ios 8 Security What s this all about? For all devices running ios 8.0 and later versions, Apple will no longer be performing ios data extractions as the
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
Is there a fee to use U-Deposit? No, U-Deposit is a free*, convenient service provided to UNITED SA Federal Credit Union members.
U-Deposit: FAQs What is U-Deposit? Is U-Deposit secure? What are the requirements to use U-Deposit? Is there a fee to use U-Deposit? How can I sign up for U-Deposit? What are the hardware and software
Creating an Apple ID on an iphone, ipad, or ipod touch with a Credit / Debit Card
To purchase and download from the itunes Store, you'll need to have an Apple ID. If you have used other Apple services such as icloud, the Mac App Store, or have purchased from the Apple Online Store,
Supporting Apple ios Devices
Supporting Apple ios Devices 2016 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.
MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement
Mobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
Packerland Broadband Subscriber Privacy Notice
Packerland Broadband Subscriber Privacy Notice What This Privacy Notice Covers This Notice describes our practices with respect to your "personally identifiable information" and certain other information.
Getting to know your ipad For Beginners
Getting to know your ipad For Beginners In this guide you will learn how to: o Switch your device on/off. o Tap, swipe, and pinch to navigate your device. o Secure your device set a password. o Change
Click here for Explanatory Memorandum
Click here for Explanatory Memorandum AN BILLE CUMARSÁIDE (SONRAÍ A CHOIMEÁD) 2009 COMMUNICATIONS (RETENTION OF DATA) BILL 2009 Section 1. Interpretation. Mar a tionscnaíodh As initiated ARRANGEMENT OF
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
Introduction to AirWatch and Configurator
Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )
ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) IMPORTANT NOTICES: In order to access and/or use this Cloud Service
Use of Web Measurement and Customization Technologies
Use of Web Measurement and Customization Technologies Office of Management and Budget (OMB) Memorandum 10-22 (M-10-22), Guidance for Online Use of Web Measurement and Customization Technologies, authorizes
Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10.
Dictamus Manual Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10. Table of Contents Settings! 3 General! 3 Dictation!
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
Northeast Bank Mobile Deposit Service FAQ
Northeast Bank Mobile Deposit Service FAQ What is Northeast Bank Mobile Deposit? What items can be deposited via Northeast Bank Mobile Deposit service? What items cannot be deposited through Northeast
Mobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
Hello. Quick Start Guide
Hello. Quick Start Guide Welcome to your new Mac mini. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll use
Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.
Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Mercury VirtualTerminal ios Application
Mercury VirtualTerminal ios Application Quick Reference Guide v2.1 Contents Introduction... 3 Downloading the application from itunes:... 3 Launching the application:... 4 Login and configuration:... 5
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
