There is a fascinating discussion beginning to play out in the media regarding data privacy and security. It’s a battle between the FBI and Apple over a cell phone used by one of the attackers in the mass shooting at the San Bernadino County Department of Public Health on December 2, 2015.
Apple has been ordered by a federal court to create software that would bypass the security on their iPhone 5 so the FBI can extract the data stored on the phone. Investigators want to use the data to determine what occurred in the hours and days leading up to the attack – presumably to find out if there is a connection to ISIS or another larger terrorist organization that poses a threat to national security.
Apple responded by taking the discussion public, seeing this as an overreach of the government that could have far greater implications than just this case. In a letter to their customers, Apple CEO Tim Cook stated that he wants to make sure that their customers “understand what is at stake” if they comply with the request.
The order was issued by a Federal District Court judge for the District of Central California under the All Writs Act of 1789. This is not the first time the legislation has been used to order Apple to assist with a brute force entry into an iPhone. A similar order was issued by the Northern District of California US District Court in October of 2014, however it is not clear if Apple complied with that order.
This raises so many questions from so many different angles. For those of you who appreciate the value of debate, here are a few questions to consider regarding this case:
As a software provider, we make every attempt to build in an appropriate level of security into our application to protect the customer and the donors for whom they track information. Occasionally we’re asked by a customer to bypass that security to resolve a particular issue. We evaluate each request individually to weigh the risks and benefits and make decisions accordingly. Ultimately, we will make the right decision to safeguard both your data and the sense of trust that is so important in the process.
Where do you weigh in?