What we’re most commonly asked for and how we respond.
The most common requests we receive for information come from law enforcement in the form of either a Device Request or an Account Request. Our legal team carefully reviews each request, ensuring it is accompanied by valid legal process. All content requests require a search warrant. Only a small fraction of requests from law enforcement seek content such as emails, photos, and other content stored on users’ iCloud or iTunes account. National security-related requests are not considered Device Requests or Account Requests and are reported in a separate category altogether.
On devices running iOS 8.0 and later versions, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed under the protection of your passcode. For all devices running iOS 8.0 and later versions, Apple will not perform iOS data extractions in response to government search warrants because the files to be extracted are protected by an encryption key that is tied to the user's passcode, which Apple does not possess.
Information Requests
Device Requests
94% law enforcement seeking device-related customer data.
Account Requests
6% law enforcement seeking account-related information.
Device Requests
The vast majority of the requests Apple receives from law enforcement come from an agency working on behalf of a customer who has requested assistance locating a stolen device. We encourage any customer who suspects their device is stolen to contact their respective law enforcement agency.
Account Requests
Responding to an Account Request most often involves providing information about a customer’s iTunes or iCloud account. If we are legally compelled to divulge any information for an Account Request, we provide notice to the customer when allowed and deliver the narrowest set of information possible in response.
less than
0.00571%
of customers had data disclosed due to government information requests.