pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Apple Launches New Site for EU Users to Request Data Records

Apple launched a privacy site where its in the European Union will be able to download the information and data that the technology company has about them in association with their ID (identifier). This site should extend its capabilities to users in the United States later as well.

Both Facebook and Google have already implemented similar tools.

In the case of Apple, the portal will provide information that includes the person’s activity in the App Store, iTunes Store, iBooks Store, and Apple Music, as well as Apple’s online store and its retail stores. Their history may also be requested at the AppleCare support center and other data such as iCloud bookmarks, calendar entries, reminders, photos, and other documents.

To access the information, you will need to log in to the new portal with your Apple ID account.

At the moment, the site is only available for accounts based in the European Union, in light of changes under the new General Data Protection Regulations (RGPD) that will come into effect tomorrow in that continent. It will change the way companies and public bodies collect, store and use information from Europeans.

This is a process that began almost two years ago and means that any organization -whatever its geographical location- that works with European data will have to report in an “understandable” way how the data that is requested and eliminate it from their servers when that mission is fulfilled.

Apple indicated that its new privacy portal will be enabled for the rest of the world in the coming months.

Apple is covered by the European Union’s General Data Protection Regulations (GDRP), which will be binding from May 25. This week the technology launched a site to compile, collect and modify the personal data it has of its users, in favor of digital transparency.

The manufacturer of the iPhone joins Facebook, Google, Whatsapp, Twitter and other technologies that have new services of apparent horizontality with respect to data management, in compliance with the RGPD and also in response to the scandal of Cambridge Analytica, which exploded earlier this year.

Apple: All Apple Pay data, text messages and Facetime calls are “fully encrypted”.

Apple defends the protection of privacy through its encryption system. “When you pay at the supermarket with Apple Pay, send an iMessage to a friend, or make a Facetime call, your data is fully encrypted. The same goes for the personal information you store on your device,” the company explains.

To help its customers verify the security of their data, the company launched a new platform that lists all the information stored in an account and allows customers to select the references they want to download. The process can take up to seven days.

What does Apple know about its users?

Apple anticipates that copying data requested by users will include details about app usage and activity information in spreadsheets and other formats, as well as documents, photos and videos in their original format, and calendars, contacts, bookmarks, and mail messages in a variety of formats.

The technology also lists what the download will not include. These so far includes a specific listing of purchases of apps, books, movies, TV shows, or music, as well as a detailed history of transactions made in your digital store.

Apple’s privacy portal allows you to correct data stored in an account or delete the account and delete all associated data.

Messages from the iMessage platform will not appear either, as Apple explains that these chats are encrypted and can only be accessed from the devices. Transactions outside the App Store are also not recorded.

Apple’s new privacy page allows you to correct the data that Apple technology handles, deactivate the account or permanently delete it, which also presents the possibility of deleting all data associated with it.

Filed Under: Communications

Latest Articles

AMD Mobile K6 CPU Technology Guide

Just as the desktop version of its K6-2 processor with 3DNow! technology stole a march on Intel by reaching the market well before its Pentium III was able to offer similar 3D capability via its Katmai New Instructions, AMD's Mobile K6-2 … [Read More...]

How To Get Two Monitors On One Computer

Sometimes while attending to multiple tasks on your computer you feel the need for more monitor space to get all your work done at the same time. So, you can get one of the dell refurbished laptops uk for back up or you can actually purchase another cheap monitor. Having two monitors on one computer … [Read More...]

CMOS – complementary metal oxide silicon – RAM chips on motherboards

Motherboards also include a separate block of memory made from very low power consumption CMOS (complementary metal oxide silicon) RAM chips, which is kept alive by a battery even when the PC's power is off. This is used to store basic information about the PC's configuration: number and … [Read More...]

Best Laptops for Professional Writers in 2023

If you need a new laptop as a writer, you may find yourself bewildered by all the choices. For one thing, there are so many brands to choose from. … [Read More...]

What You Need to Know About Automation with Chrome

Automation is drastically changing the way we interact with the Internet. One survey found that 76% of businesses use automation to streamline … [Read More...]

9 Steps to Take When Building a Web Scraper in Python

Web scraping is a method for collecting, organizing and analyzing information that is spread over the Internet in a disorganized way. It can … [Read More...]

8 Steps To Streamline Your Business Operations with Virtual Data Rooms

With the increased reliance on networking and cloud computing, businesses generate and store an ever-increasing amount of sensitive information. As a … [Read More...]

Advantages and disadvantages of using Perl in web programming

Web pages are designed using programming codes and a number of technologies as tools to achieve the desired objectives. An example of the above … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Site Design Information

The current PCTechGuide design uses CSS layout to achieve a clean look, with clear navigation options to make the information easy to find and … [Read More...]

Remove AV Security Suite

AV Security Suite is one of those programs that will appear as a useful software at the first place, giving you the impression that it is going … [Read More...]

USB Sound Cards

Swiss semiconductor company Micronas has developed a technology which could render the sound card obsolete on future … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors