Privacy - Features (2024)

Table of Contents
We’re committed to protecting your data. Safari Intelligent Tracking Prevention Private Browsing Passkeys Privacy Report Password monitoring Social widget tracking prevention Fingerprinting defence Search Extension controls Safari Privacy Overview Maps Personalisation End-to-end encryption Random identifiers Location fuzzing Maps extensions Photos Lock Hidden and Recently Deleted albums in Photos Memories and SharingSuggestions iCloud Photos Sharing controls Third-party apppermissions Apps FaceTime, Messages and More Mail End-to-end encryption FaceTime NameDrop iMessage apps Link TrackingProtection iCloud Backup SharePlay Siri On-device suggestions Random identifiers On-device processing Siri and Dictation Improving Siri andDictation Suggestions in Spotlight andSafari Wallet Boarding passes andtickets Health Encrypted data Activity sharing anddeletion Health sharing HealthKit ResearchKit and CareKit Improve Health & Activity and Improve WheelchairMode Location Services App location permissions Approximate location Background tracking notifications Wi-Fi and Bluetooth location privacy enhancements Location controls for shared photos Sign in withApple Sign in using your AppleID Hide your email Two-factor authentication Upgrade to Sign in withApple Entertainment AppleMusic AppleTV AppleArcade AppStore App guidelines Privacy Nutrition Labels App permissions App Clips App tracking iCloud Data encryption Two-factor authentication iCloud sharing CloudKit Account Recovery Contacts DigitalLegacyprogramme iCloud+ Hide My Email iCloud Private Relay CarPlay Data minimisation Third-party apps Home Encryption Location protections App protections Random identifiers HomeKit Secure Video Matter HomeKit-enabled routers Children andFamilies Children’s safety Family Sharing Screen Time Education apps Student Privacy Pledge Kids apps and theAppStore Privacy protections are builtin. Data minimisation On-device intelligence Transparency and control Protecting your identity Data security Learn more about privacy at Apple. Our values lead theway. Accessibility Environment Education Supply Chain

We’re committed to protecting your data.

Our products and features include innovative privacy technologies and techniques designed to minimise how much of your data we— or anyone else — can access.
And powerful security features help prevent anyone except you from being able to access your information. We are constantly working on new ways to keep your personal informationsafe.

Safari

Safari includes state-of-the-art features to help protect your privacy, defending you against cross-site tracking and minimising the data passed to third parties. And Private Browsing adds even more protections, such as locking your windows when you’re not usingthem.

Intelligent Tracking Prevention

You may have noticed that when you look at something to buy online, you suddenly start seeing it everywhere else you go on the web. This happens when a third party tracks cookies and other website data to show you ads across various websites.

Intelligent Tracking Prevention uses the latest in machine learning and on-device intelligence to fight this cross-site tracking. It hides your IP address from trackers so what you look at on the web remains your business — not an advertiser’s. And you don’t have to change any settings for these protections because Intelligent Tracking Prevention is on by default.

Private Browsing

Safari protects your privacy automatically. Private Browsing adds even more protections. When it’s activated, Safari won’t add the sites you visit to your history, remember your searches or save any information from forms you fill out online — and advanced tracking and fingerprinting protections go even further to help prevent websites from tracking or identifying your device. Known trackers are completely prevented from loading on pages, and link tracking protection removes tracking added to URLs as you browse. Content blocker support is designed so that it can’t send developers information about what you’re looking at. And private browsing windows automatically lock — requiring your device password to be unlocked — when you’re not usingthem.

Passkeys

Passkeys replace passwords with an easier and safer sign-in method. Your private key is never kept on a web server, so you don’t have to worry about website leaks compromising your accounts. And passkeys never leave your device and are specific to the site you created them for, making it almost impossible for them to be phished. Passkeys are end-to-end encrypted and sync across your Apple devices through iCloud Keychain. On Apple devices, simply use FaceID or TouchID to sign in. Forwebsites or apps on non-Apple devices, useyour saved passkey by scanning the QR code with your iPhone or iPad and using FaceIDor TouchID toauthenticate.

Privacy Report

Your Privacy Report shows you all the cross-site trackers that are being blocked by Intelligent Tracking Prevention in Safari. You can access your report from the Safari toolbar and the Safari startpage.

Password monitoring

Safari checks to see whether your saved Keychain passwords have been compromised in data breaches. It uses secure and private cryptographic techniques to regularly check derivations of your passwords against a publicly available list of breached passwords. If Safari identifies a potentially compromised password, your device will notify you. Your password information is never revealed as part of this process — not even toApple.

Social widget tracking prevention

Social widgets embedded on websites, such as like buttons, share buttons and comment fields, can be used to track you even if you don’t click them or use them. Safari blocks this tracking bydefault, and it prevents social widgets from accessing your identity unless you grant thempermission.

Fingerprinting defence

Safari works to prevent advertisers and websites from using the unique combination ofcharacteristics of your device to create a “fingerprint” to track you. These characteristics include the device and browser configuration, and fonts and plug-ins you have installed. Tocombat fingerprinting, Safari presents a simplified version of the system configuration so more devices look identical to trackers, making it harder to single yours out. This protection is on by default, so there are no extrasteps for you totake.

Search

With the Smart Search field in Safari, you can type website names, web addresses and search queries all in one place. Safari minimises the amount of data sent to third-party search engines — for example, it won’t share cookies or your precise location, which may happen if you search by other means. Safari also offers the option to set DuckDuckGo as your default search engine, allowing you to search the web without beingtracked.

Extension controls

Browser extensions can help you do many things, like saving money on purchases or improving your grammar. However, they can also be used to track you, taking note of what you browse and even what you type. With Safari extension controls, you can grant extensions access to your information just for 1 day, just for this current website oralways.

Safari Privacy Overview

Like all of our products and services, Safari has built-in technologies designed to safeguard your personal information. Your privacy is protected automatically — without having to change your defaultsettings.

Maps

Personalised features are created using data on your device. And data that is sent from your device to the Maps service is associated with random identifiers so Apple doesn’t have a profile of your movements and searches.

Personalisation

Many helpful features, like finding your parked car, are created using data on your device. This helps minimise the amount of data sent to Apple servers.

End-to-end encryption

Maps keeps your personal data in sync across all your devices using end-to-end encryption. Your Significant Locations and collections are encrypted end-to-end so Apple cannot read them. And when you share your ETA with other Maps users, Apple can’t see your location.

Random identifiers

There is no sign-in when you start using Maps. The data that Maps collects while you use the app—like search terms, navigation routing and traffic information — is associated with random identifiers, not your AppleID. These identifiers reset themselves as you use the app to ensure the best possible experience and to improve Maps. When you share ratings or photos with Maps, the information that you share is associated with your AppleID.

Location fuzzing

Maps goes even further to obscure your location on Apple servers when you search using a process called “fuzzing”. Because your location can give away your identity, Maps converts the precise location where your search originated to a less-exact one within 24 hours. Apple doesn’t retain a history of what you’ve searched for or where you’vebeen.

Maps extensions

Maps extensions that are used in ride-booking and reservation apps run in their own sandboxes and share permissions with their parent apps. For ride-booking apps, Maps shares only your starting point and destination with the extension. And when you reserve a table at a restaurant, the extension knows only the point of interest you tapped.

Photos

Face recognition and scene and object detection are done completely on your device rather than in the cloud. This allows Apple to provide you with these advanced features without accessing your photos. And apps can access your photos only with yourpermission.

Lock Hidden and Recently Deleted albums in Photos

The Hidden and Recently Deleted albums in Photos are locked by default. You can
unlock them using your device’s authentication
method — Face ID, Touch ID or yourpasscode.

Memories and SharingSuggestions

The Memories and Sharing Suggestions features in the Photos app use on-device intelligence to analyse your photos and organise them by faces, places and more to help you findthem easily. Because this all happens on your device, Apple can provide you with these advanced features without accessing yourphotos.

iCloud Photos

If you choose to back up your photo library to iCloud Photos, Apple protects your photos on our servers with encryption. Photo data, like location or albums organised by places, can
be shared between your devices with iCloud Photos enabled. And if you choose to turn off iCloud Photos, you’ll still be able to use on-device analysis.

Sharing controls

macOS, iOS and iPadOS let you decide if youwant to include the photo’s location, edithistoryand depth data when you share a photo — whether you’re sharing it with afriend or with anapp.

Third-party apppermissions

Photo pickers help you select which photos to share with an app while keeping the rest of your library private. When apps ask for your entire photo library, you’ll be able to see how many photos and videos they can access, and asample of what they can use and share. You’llalso receive occasional reminders so you can check what you’re sharing — and make changes if youlike.

Apps

If an app requests access to your photos, you can choose which images you’d like to share without granting access to your entire library.
Or if an app wants to add a photo to your library, you can allow it to do so without accessing your photos. You can also choose to grant an app general access to yourphotos.

FaceTime, Messages and More

Your iMessage and FaceTime conversations are encrypted end-to-end, so they can’t be read while they’re sent between devices. Mail helps hide your activity from unwanted senders.

Mail

Mail Privacy Protection helps protect your privacy from prying email senders. It hides your IP address so senders can’t create a profile with your other online activity or see where you are, and they can’t tell if you’ve opened their email.

End-to-end encryption

End-to-end encryption protects your iMessage and FaceTime conversations across all your devices. With watchOS, iOS and iPadOS, your messages are encrypted on your device so they can’t be accessed without your passcode. iMessage and FaceTime are designed so that there’s no way for Apple to read your messages when they’re in transit between devices. You can choose to automatically delete your messages from your device after 30 days or a year or keep them on your deviceindefinitely.

FaceTime

Apple doesn’t store your FaceTime and GroupFaceTime calls on our servers. And during transit, these calls are protected with end-to-end encryption. Anyone can now join you in one-on-one and Group FaceTime calls from their browsers instantly with the same privacy protections. No Apple device or loginrequired.

And starting with iOS15, iPadOS15 and macOSMonterey, you can send friends and family a link to connect on FaceTime — even if they’re using Windows or Android.1 It’s still end-to-end encrypted, so your call is as private and secure as any other FaceTime call.

New

NameDrop

NameDrop is a feature in AirDrop that lets you hold your iPhone near another iPhone to share contact information with only your intended recipients. You can also choose the specific contact information you want to share — and just as important, which information you don’t want toshare.

iMessage apps

iMessage apps — which let you share stickers,songs and more without leaving Messages — do not have access to participants’ actual contact information orconversations. iOS and iPadOS provide eachapp with a random identifier for each participant, which is reset when the app isuninstalled.

New

Link TrackingProtection

When you share links in Messages, the extra information that some websites add to their URLs will be removed to prevent them from tracking you or the person you shared thelinkwith.

iCloud Backup

iMessage and SMS messages are backed up on iCloud for your convenience, but you can turn iCloudBackup off whenever you want. And Apple never stores the content of FaceTime calls on anyservers.

SharePlay

SharePlay allows you to share experiences from Apple or third-party apps in FaceTime calls.
The content that apps exchange over SharePlay is end-to-end encrypted, just like other FaceTimecalls.

Siri

Siri is designed to do as much learning as possible offline, right on your device. Searches and requests are associated with a random identifier — a long string of letters and numbers— not your AppleID.

On-device suggestions

When you ask Siri to read or search for information on your device, such as in Messages and Notes, and when Siri provides suggestions, like through widgets and Siri Search, all your personal information is keptonyour device rather than being sent toApple servers. Siri Suggestions in the QuickType keyboard are made possible by anApple-developed neural network language process that also runs directly on yourdevice.

Random identifiers

Although Apple attempts to do as much as possible on your device, when you use certain features— like making a voice request to Siri or searching in Spotlight or Safari—real-time input is needed from Apple servers. When we do send information to a server, we protect your privacy by using random identifiers, not your AppleID. Information like your location may be sent to Apple to improve the accuracy of responses, and we allow you to disable LocationServices at anytime.

On-device processing

The audio of your requests is processed entirely on your device unless you choose to share it with Apple. The Apple NeuralEngine enables speech recognition models with the same high quality as server-based speechrecognition.2

Siri and Dictation

The longer you use Siri and Dictation, the better they understand you and improve. To help Siriand Dictation recognise your pronunciation and provide better responses, certain information such as names of your contacts or music, books and podcasts you enjoy is sent to Apple servers using encrypted protocols. Siriand Dictation do not associate this information with your AppleID, but rather with a random, device-generated identifier. You can reset that identifier at any time by turning Siri andDictation off and back on, effectively restarting your relationship with them. When you turn Siriand Dictation off, your Siri data associated with the Siri identifier is deleted. Thelearning process starts over when you turn Siri back on. On-device dictation helps protect your privacy further by performing all processing completelyoffline.

Improving Siri andDictation

By default, Apple does not retain audio recordings of Siri and Dictation interactions. Computer-generated transcripts are used to improve Siri and Dictation. You can opt in to help Siri improve by allowing Apple to store and review audio of your Siri and Dictation interactions, and you can opt out at any time. These audio samples are associated with a random identifier instead of your AppleID. In addition, you can delete all the Siri and Dictation requests, including audio recordings and computer-generated transcripts, associated with the random identifier from Apple’s servers at any time. Note that requests more than 6months old and the small sample of requests that have been reviewed may not be deleted, as they are no longer associated with the randomidentifier.

Suggestions in Spotlight andSafari

When you use Safari or Spotlight in iOS, iPadOS or macOS, your searches are sent to Apple servers along with contextual information like your location or actions taken in the search session to provide you with the most relevant suggestions. This information is associated with a random identifier, not your Apple ID, so that searches and locations are not connected to you personally. For suggestions in Spotlight and Safari, a new random identifier is generated every 15 minutes, and your precise location is never shared with the server. Instead, an approximate location from your device is sent using location fuzzing. You can choose to disable suggestions in Spotlight and Safari. If you choose to disable location-based suggestions, Apple will still use your IP address to determine a general location to make suggestions morerelevant.

Wallet

Wallet helps keep your boarding passes, tickets and more secure.

Boarding passes andtickets

Tickets and boarding passes can be added toone convenient location in Wallet. And are protected and stored in the Secure Element onyourdevice.

Health

Apple’s health products are designed to help keepyour data secure and protect your privacy. You have control over which information is placed in theHealth app and which apps can access your data throughit.

Encrypted data

You decide what information is placed in theHealth app as well as who can access yourdata. When your phone is locked with apasscode, Touch ID or Face ID, all your health and fitness data in the Health app — other than your Medical ID — is encrypted. Any Health data backed up to iCloud is encrypted both in transit and on our servers. And if you use arecent version of watchOS and iOS and turn on two-factor authentication and a passcode, your health and activity data will be backed up in a way that Apple can’tread.

Activity sharing anddeletion

You can choose to share your Activity data from your AppleWatch with other users. If you later decide to stop sharing, then the other user’s iPhone will delete historical data stored in theFitness app. You also have the ability to temporarily hide youractivity.

Health sharing

Share your health data with people important to you or those who are caring for you. Choose which data and trends to share, including heart health, activity, lab results, vitals, MedicalID, cycletracking and more.

HealthKit

HealthKit allows developers to create health and fitness apps that can share data with the Health app or with each other. As a user, you have control over which elements of your HealthKit information are shared with which apps. Apple requires every app in the AppStore to provide a privacy policy for you to review, including apps that work with HealthKit. Apps that work with HealthKit are prohibited fromusing or disclosing HealthKit data to third parties for advertising or other datamining purposes, and apps can only share data for the purpose of improving your health, fitness or health research with your permission. When you choose to share that data with trusted apps, it goes directly from HealthKit to the third-party app and does not traverse Apple’s network.

ResearchKit and CareKit

ResearchKit and CareKit are open-source software frameworks that take advantage of thecapabilities of iPhone. ResearchKit enables developers to create apps that let medical researchers gather robust and meaningful data for studies. And CareKit is a platform for developers to create apps that help individuals take a more active role in their own well-being.

With ResearchKit, you choose which studies you want to join, and you control the information you provide to individual research apps. Apps using ResearchKit or CareKit can pull data from the Health app only with your consent. Any apps built using ResearchKit for health-related human subject research must obtain consent from the participants and must provide informationabout confidentiality rights, and thesharing and handling of data.

These apps must also be approved by anindependent ethics review board before thestudy canbegin. For certain ResearchKit studies, Apple may be listed as a researcher, receiving data from participants who consent to share their data with researchers, so we can participate with the larger research community in exploring how our technology could improve the way people manage theirhealth. This data is received in a way that does not directly identify the participants to Apple.

Improve Health & Activity and Improve WheelchairMode

Improve Health & Activity and Improve Wheelchair Mode send data from iPhone and AppleWatch to Apple so we can increase theeffectiveness of our health and fitness features. This includes data that is shown in theHealth and Activity apps, movement measurements, other fitness apps you have installed, your approximate location and how long you have been using AppleWatch. The data is not used for any other purpose and does not include personally identifiable information.

Location Services

LocationServices privacy controls are a powerful way to manage which apps have access to yourlocation.

App location permissions

Location permissions help you control the location data that you pass to apps using fine-grained controls. You can choose to grantan app access to your location once oranytime you useit.

Approximate location

Starting with iOS14, iPadOS14 and watchOS7, you can choose whether apps can see your approximate location — within an area of about 25 square kilometres — rather than your exact location. So you can use apps to find nearby restaurants or check the local weather without providing more information than you need to.

Background tracking notifications

Receive notifications when an app is using your location in the background, so you can decide whether to update yourpermission. Background tracking notifications include a map that shows you the places where an app used your location in the background.

Wi-Fi and Bluetooth location privacy enhancements

Starting in iOS13 and iPadOS13, API changes limit the kinds of apps that can see the names of Wi-Fi networks you connect to, which makes it harder for apps to determine your location without your consent. To protect you against apps using Bluetooth to determine your location without your consent, iOS and iPadOS include controls so that an app must ask before accessing Bluetooth for any other purpose than playing audio. And Bluetooth settings allow you to change whether an app has access at anytime.

Location controls for shared photos

macOS, iOS and iPadOS let you decide if you want to include the location when you share aphoto, whether you’re sharing it with a friend or with an app.

Sign in withApple

Sign in to apps and websites quickly and easily without having your activity tracked or profiled byApple.

Sign in using your AppleID

Sign in with Apple lets you sign in to apps and websites using the AppleID you already have. When you use Sign in with Apple, the most information websites and apps can ask for isyour name and email address. And Apple won’t track or profile you when you use SigninwithApple.

Hide your email

If you don’t want to share your email address with a particular app or website, you can choose to hide it. You can also choose to have Apple create a unique email address that forwards to your real address.

Two-factor authentication

Sign in with Apple requires your AppleID tobeprotected with two-factor authentication, so that access to accounts in your favourite apps is more secure.

Upgrade to Sign in withApple

Developers can offer you the option to upgrade existing app accounts using Sign in with Apple. You can quickly and easily sign in to your accounts using FaceID or TouchID and take advantage of Apple’s two-factor authentication for improved privacy and security, without having to set up a newaccount.

Entertainment

Our entertainment services use information
about what you read, listen to and watch to help personalise your experience. But Apple doesn’t build a comprehensive profile of your activity acrossservices.

AppleMusic

AppleMusic doesn’t contain advertisem*nts from other companies. To help personalised features like Listen Now, Autoplay, personal mixes and new release notifications reflect your musical tastes, Apple collects some information about your activity when you play or browse music. This is detailed during setup in “About AppleMusic & Privacy”. AppleMusic is obligated to share some aggregated data with partners, like record labels, for purposes such as royalty payments to artists, but it only does so with industry‑leading privacyprotections.

AppleMusic does not share data with partners using any user or device identifiers. And if you don’t want to keep your music collection on our servers, you can opt out of iCloud Music Library. iOS and iPadOS put you in control of which apps can access your Music account and associated details. The opt-in AppleMusic Friends feature lets you share your favourite music—and decide which friends can see the music in your profile. AppleMusic only has access to the contacts you choose to add to AppleMusic Friends specifically, not your entire contactlist.

AppleTV

To offer personalised recommendations and improve your AppleTV experience, Apple collects information about your purchases, downloads and activity in the AppleTV app, including what you watch on the AppleTV app, connected apps and your location. You can choose to share what you watch in connected apps to bring all your content together, and you have control over the viewing history used by Apple to provide you with personalised recommendations. You can delete the viewing history Apple holds from connected apps entirely, or choose to delete it app byapp.

AppleArcade

AppleArcade games do not collect any personal data about you, or track any information about how you play without your permission. Games in AppleArcade contain no in-game advertising and no third-party tracking.

AppStore

Every app in the AppStore is required to follow strict guidelines on protecting your privacy and to provide a self-reported summary of how it uses your data. And apps must ask for your permission before accessing things like your photos orlocation.

App guidelines

On the AppStore, Apple requires appdevelopers to adhere to specific guidelines designed to protect user privacy and security. Apple also requires them to provide a privacypolicy that you can review. When Apple becomes aware of an app that violates our guidelines, the developer must address the issue or the app will be removed from the AppStore. Apps go through a review process before becoming available on the AppStore.

Privacy Nutrition Labels

Developers are required to self‑report how they are using your data –– such as usage data, contact information or location –– and whether that data is used to track you. You can view each self-reported Privacy Nutrition Label on the app’s product page on the AppStore at any time, including before you choose to download. This is part of ongoing work to increase transparency and control over your data, and Apple will continue to update this feature and work with developers to ensure that users can make informedchoices.

App permissions

Once an app is installed on your device, you are prompted for permission the first time it tries to access information such as your location or photos. You can make changes to the permissions you’ve granted. And iOS11 or later and iPadOS give you the control to provide your location to any app only while you’re using it. Apple also makes sure that there are certain types of data on your device that apps simply can’t access, and that there is no way for an app to ask for complete access to all yourdata.

App Clips

When you use an App Clip, developers can only ask for a limited set of data. When an AppClip requires access to your location, camera or other sensitive data, it will require the same consent as a full app. You can also choose to grant permission to all AppClips. AppClips aren’t allowed to ask your permission to track you across other companies’ apps and websites –– only full apps can dothat.

App tracking

An app tracking section in Settings lets you easily see which of your apps have been given permission to track you, so you can change your preferences and disable apps from asking in the future. iOS14.5 and iPadOS14.5 or later require developers to get your permission before tracking your activity across other companies’ apps and websites for ads or databrokers.

iCloud

What you store in iCloud is protected with industry‑leading encryption, privacy and security. Developers do not have access to your AppleID.

Data encryption

iCloud secures your information — like photos, contacts and notes — by encrypting it when it’s in transit, storing it in an encrypted format and safeguarding your encryption keys in Apple datacentres. Both Apple and third‑party data centres may be used to store and process yourdata. When processing data stored in athird‑party data centre, encryption keys are accessed only by Apple software running on secure servers and only while conducting thenecessary processing. For additional security, you can enable Advanced Data Protection, which uses end‑to‑end encryption to ensure that iCloud data in many categories can be decrypted only on your trusted devices, protecting your information even in the case of a data breach in the cloud.

Two-factor authentication

Two-factor authentication is an extra layer of security for your AppleID. It’s designed to help ensure that you’re the only person who can access your account, even if someone else knows your password. It’s easy to set up and easy to use.

iCloud sharing

With iCloud sharing, the identities of participants are not made available to anyone who has not been invited to and accepted a private share. The names of your shared files and the first and last name associated with your AppleID are available to anyone who has access to the sharing link, including Apple. In iOS11 or later, iPadOS, and macOS HighSierra or later, end-to-end encryption in iCloud syncs certain types of personal data, such as your Health data, across all your devices in such a way that Apple cannot read or access it.

CloudKit

CloudKit is a way for third-party developers to use iCloud storage in their own apps. CloudKit helps keep your preferences, settings and app data up to date across your devices. Developers use CloudKit to make it easier for you to use their apps because you don’t have to sign in separately. By default, developers don’t have access to your AppleID, just a unique identifier. If you give your permission, developers can use your email to let others find you in their app. You’re always in control of these permissions and can turn them on or off at any time. Your data associated with CloudKit isn’t shared with developers unless you choose to share or postpublicly.

Account Recovery Contacts

Choose one or more people you trust to become an Account Recovery Contact to help you reset your password and regain access to your account. Apple does not know who your trusted contacts are, only whether you haveany.

DigitalLegacyprogramme

The Digital Legacy programme lets you designate people as Legacy Contacts so they can access your account and personal information in the event of yourdeath. Apple does not know who your Legacy Contacts are, only whether you have any.

iCloud+

iCloud+ includes great features to help protect your privacy when browsing the Internet and usingemail.

Hide My Email

Hide My Email allows you to create unique, random email addresses that forward to your personal inbox so you can send and receive email without having to share your real emailaddress.

iCloud Private Relay

iCloud Private Relay is an Internet privacy service that uses an innovative multi-hop architecture in which users’ requests are
sent through two separate Internet relays
operated by different entities. This way, no single party — including Apple — can view or collect the details of users’ browsing activity.3

CarPlay

All the rigorous privacy measures built into your iPhone and apps carry over to CarPlay. And iOS privacy updates apply to CarPlay too.

Data minimisation

When you use CarPlay, every app you see is powered from your iPhone rather than by the car. This means that Apple gives only limited metadata to the car to make the experience seamless, and only when that metadata is essential to delivering the service. For example, song information may be shared to display the current song you’re listening to, and the contact or call time for your current call may be displayed on an instrument cluster or head-up display to help you see helpful information.

Third-party apps

Third-party audio, messaging, voice dialling and navigation apps work in CarPlay, as well as apps that automakers create for their own cars. Because they run on your iPhone, all the protections that apply to third-party apps in iOS apply to CarPlay too. And Apple always requires third-party apps to provide a privacy policy for you to review.

Home

The Home app uses encryption to protect theinformation you transmit to HomePod and allyour HomeKit- or Matter-enabled smart home accessories. Apps that use HomeKit or Matter aresubject to requirements as part of our developer agreement.

Encryption

Data related to your home is encrypted and stored in a way that Apple can't read it. It’s also encrypted in transit between your Apple device and the devices you’re controlling in your home, even when you control your accessories from aremote location. Recordings from security cameras that use HomeKit Secure Video are analysed privately on your Apple devices at home and then sent securely to iCloud through end-to-end encryption.

Location protections

When apps perform automatic actions based on your location, such as turning on house lights, these actions are initiated by the AppleHome ecosystem, which makes your location invisible to the app. You can also disable use of your location at any time.

App protections

Apps that use HomeKit or Matter are restricted by our developer guidelines to using data solely for home configuration or automation services.

Random identifiers

Requests made using Siri, including those to control your smart home accessories, are associated with arandom identifier — not yourAppleID. So your identity is protected.

HomeKit Secure Video

In iOS13 and iPadOS13 or later, HomeKit Secure Video ensures that activity detected by your security cameras is analysed and encrypted by your Apple devices at home before being securely stored in iCloud.

Matter

Apple’s Matter implementation includes innovative privacy and security features designed to put you in control of your smarthome experience and to enhance interoperability between apps and ecosystems.

When pairing a new Matter accessory, iOS and iPadOS maintain the highest levels of privacy and security, ensuring that you are always aware of which accessories join your home and that you are in full control of your smart home network. Just as with your location information, contacts, calendar and photos, apps must request access to add an accessory to yourhome.

HomeKit-enabled routers

HomeKit-enabled routers let you see and manage your other accessories’ Internet traffic, both within your home and through theInternet.

Children andFamilies

Features like Communication Safety, Screen Time, Family Sharing and Apple-designed education apps help keep kids safe, and give parents and teachers control over what children can access andshare.

Children’s safety

Communication Safety adds protections for children who may receive or attempt to send photos or videos containing nudity. Parents can manage Communication Safety through their Family Sharing plan.

Content containing nudity will be blurred and the child will be warned, presented with helpful resources and reassured that it is OK if they do not want to view the photo or video. Similar protections are available if a child attempts to send photos or videos that containnudity. Inboth cases, children are given the option to message someone they trust for help. Thewarnings work across the Messages app, FaceTime video messages and AirDrop, and when using the Phone app to receive aContactPoster and the Photos picker to choose content to send.

All image and video processing for Communication Safety occurs on the device, meaning neither Apple nor any third party gets access to the content. Photos and videos are analysed to determine if they contain nudity. End-to-end encryption is maintained, and no indication of the detection of nudity leaves thedevice. Apple does not get access to themessages, and no notifications are sent to theparent or anyone else.

Family Sharing

With Family Sharing, parents have visibility into their children’s activity and content on their Apple devices, and children can have their own Apple IDs with the consent of the family organiser. In addition to Communication Safety features that help parents protect children from accessing or sharing content containing nudity, Apple has developed tools such as Ask to Buy. This feature allows parents to approve app downloads or in‑app purchases to give them control over their children’s purchases using their Apple ID.

Screen Time

You can use Screen Time to better understand and make choices about how much time your children spend using apps and websites. Activity Reports give you a detailed look at all their app usage, notifications and device pickups — and only you, your children and those you choose to share it with can view this information. You can also set the amount of time your kids can spend each day on specific apps andwebsites.

Education apps

Apple doesn’t sell student information, and we don’t share it with third parties to use for marketing or advertising. Apple doesn’t collect, use or disclose student information from AppleSchoolManager, the Schoolwork app, theClassroom app, iTunes U or Managed AppleIDsother than to provide relevant educational services. And Apple does not track students or build profiles based on their email or web browsing. Parents can decide if they want their child to participate, and students have access to their own data on their devices.

Student Privacy Pledge

To provide the best privacy protections for students and teachers, all relevant agreements and processes are aligned with the EuropeanUnion General Data Protection Regulation (GDPR). In addition, Apple has signed theStudent Privacy Pledge, further underscoring commitment to protecting theinformation students, parents and teachers share inschools.

Kids apps and theAppStore

Apple has guidelines that are designed to protect user privacy and security for all apps. For apps in the Kids category, we require additional safeguards to help protect children’s data and prevent improper advertising. We believe that when parents download an app for their children from the Kids category, they should have visibility into how their children’s device usage may be transmitted and confidence that their children won’t be subjected to inappropriate advertisem*nts.

Privacy protections are builtin.

Privacy is a foundational part of the design process. We incorporate these protections throughout Apple products, apps and services.

Data minimisation

At Apple, we believe in collecting only the personal data required to deliver what you need. Whenever possible, Apple processes and analyses personal data on your device. In instances where specific personal information is necessary, we minimise the amount we use to provide the intended service — like your location when searching in Maps. Apple does not maintain a comprehensive user data profile of your activity across all our products and services to serve you targeted advertising.

On-device intelligence

Apple uses machine learning to enhance your experience — and your privacy — by using on-device processing so other people don’t see your data. We’ve used it for on-device image and scene recognition in Photos, predictive text in keyboards and more. For example, theA13Bionic and later chips, and theNeuralEngine in iPhone can recognise patterns, make predictions and learn from experience, similar to the way you do. So your device can create personalised experiences without having to analyse personal information on Apple servers. Developers can use our frameworks, such as Create ML and Core ML, to create powerful new app experiences that don’t require your data to leave your device. That means apps can analyse user sentiment, classify scenes, translate text, recognise handwriting, predict text, tag music and more without putting your privacy atrisk.

Transparency and control

When Apple does collect personal data, we’re clear and transparent about it. We make sure you know how your personal information is being used, and how to opt out anytime you like. Data and privacy information screens help you understand how Apple will use your personal information before you sign in or start using new features. We also provide a set of dedicated privacy management tools on our Data and Privacy page. For example, in iOS14 or later you can choose to grant an app access to just the images you want. And you’ll receive anotification when an app is using your location in the background, so you can decide whether to update yourpermission.

Protecting your identity

Apple has developed technologies to help obscure your identity when data must go to Apple servers. Sometimes we use random identifiers so your data is not associated with your AppleID. We have also pioneered using DifferentialPrivacy to understand patterns of behaviour while protecting an individual user’s privacy. If you choose to send Appleanalytics about your device usage, the collected information doesnot identify you personally. When it’s collected, personal data is either not logged at all, removed fromreports before they’re sent to Apple or protected by techniques such as DifferentialPrivacy. Techniques like these help us deliver and improve services while protecting your privacy.

Data security

Without security protections, there is no privacy. Every Apple device combines hardware,software and services designed to work together for maximum security and a transparent user experience. Custom hardware — such as the Secure Enclave in iPhone, iPad and Mac — powers critical security features like data encryption. Software protections work to help keep the operating system and third-party apps safe. Services provide a mechanism for secure and timely software updates; power asafer app ecosystem, secure communications and payments; and provide a safer experience on the web. Apple devices help protect not only the device and its data at rest, but the entire ecosystem, including what you do locally, on networks and with key webservices.

Our values lead theway.

  • Accessibility

    Our built-in accessibility features are designed to work the way you do.

    Learn more

  • Environment

    We’re committed to bringing our net emissions to zero across our entire carbon footprint by2030.

    Learn more

  • Education

    We empower students and educators to learn, create and define their own success.

    Learn more

  • Supply Chain

    We prioritise providing safe, respectful and supportive workplaces for everyone.

    Learn more

Privacy - Features (2024)
Top Articles
5 Best Free Crypto Research and Analysis Websites for 2022
What Does It Mean To BTFD? - GFF Brokers
Golden Abyss - Chapter 5 - Lunar_Angel
Windcrest Little League Baseball
Craigslist Campers Greenville Sc
Toyota Campers For Sale Craigslist
Fort Carson Cif Phone Number
PontiacMadeDDG family: mother, father and siblings
25X11X10 Atv Tires Tractor Supply
Mr Tire Prince Frederick Md 20678
Sissy Transformation Guide | Venus Sissy Training
How do you mix essential oils with carrier oils?
Milk And Mocha GIFs | GIFDB.com
Camstreams Download
Lesson 2 Homework 4.1
Culos Grandes Ricos
Mlb Ballpark Pal
Craiglist Galveston
"Une héroïne" : les funérailles de Rebecca Cheptegei, athlète olympique immolée par son compagnon | TF1 INFO
Nhl Wikia
Plan Z - Nazi Shipbuilding Plans
Hollywood Bowl Section H
Morristown Daily Record Obituary
PowerXL Smokeless Grill- Elektrische Grill - Rookloos & geurloos grillplezier - met... | bol
Program Logistics and Property Manager - Baghdad, Iraq
Azur Lane High Efficiency Combat Logistics Plan
Jordan Poyer Wiki
Surplus property Definition: 397 Samples | Law Insider
Nesb Routing Number
Sorrento Gourmet Pizza Goshen Photos
27 Modern Dining Room Ideas You'll Want to Try ASAP
Watertown Ford Quick Lane
No Limit Telegram Channel
Table To Formula Calculator
Rgb Bird Flop
TJ Maxx‘s Top 12 Competitors: An Expert Analysis - Marketing Scoop
Pioneer Library Overdrive
Shoe Station Store Locator
1475 Akron Way Forney Tx 75126
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Great Clips On Alameda
Best Weapons For Psyker Darktide
Synchrony Manage Account
Woodman's Carpentersville Gas Price
South Bend Tribune Online
Homeloanserv Account Login
Pa Legion Baseball
Arcanis Secret Santa
Wpne Tv Schedule
Latina Webcam Lesbian
Deshuesadero El Pulpo
De Donde Es El Area +63
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 5426

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.