Maas360 and Ios

Total Page:16

File Type:pdf, Size:1020Kb

Maas360 and Ios MaaS360 and iOS A comprehensive guide to Apple iOS Management Table of Contents Introduction Prerequisites Basics and Terminology Integrating MaaS360 with Apple’s Deployment Programs Deployment Settings Enrollment: Manual Enrollment Enrollment: Streamlined Apple Configurator Device View Policy App Management Frequently Asked Questions "Apple’s unified management framework in iOS gives you the best of both worlds: IT is able to configure, manage, and secure devices and control the corporate data flowing through them, while at the same time users are empowered to do great work with the devices they love to use.” -Apple Business “Managing Devices and Corporate Data on iOS” Guide IBM Security / © 2019 IBM Corporation 3 Types of iOS Management “Supervision gives your organization more control iOS supports 3 “styles” of management that will over the iOS, iPadOS, and tvOS devices you own, determine the MDM capabilities on the device. allowing restrictions such as disabling AirDrop or Apple Music, or placing the device in Single App Standard – an out-of-the-box device with no additional Mode. It also provides additional device configurations. Would be enrolled over-the-air via a Safari configurations and features, so you can do things URL or the MaaS360 agent. like silently install apps and filter web usage via a global proxy, to ensure that users’ web traffic stays Supervised – Supervision unlocks the full management within the organization’s guidelines. capabilities available on iOS. Can be automated via the Apple streamlined enrollment program or enabled manually By default, iOS, iPadOS, and tvOS devices are not via Apple configurator. Supervision of an existing device supervised. You can, however, set up devices as always requires a factory restore. supervised prior to activation (before Setup Assistant first appears on a new or fully erased User Enrollment – new on iOS 13. Creates a user profile device)…” with limited device management capabilities. Coming to MaaS360 mid-2020. -Apple Business Manager User Guide IBM Security / © 2019 IBM Corporation 4 IBM MaaS360 and iOS Prerequisites IBM Security / © 2019 IBM Corporation 5 Prerequisites To manage iOS devices, Apple requires an Apple Push Notification service (APNs) certificate. MaaS360 has a wizard to walk you through the process of obtaining this certificate. • Safari, Chrome and Firefox web browsers are recommended for this straightforward process, which usually takes less than 5 minutes to complete. • Detailed step by instructions are available here. • It is strongly recommended that an Apple ID registered to the organization be used, and not an ID belonging to an individual. If a personal Apple ID is used, and the person leaves (rendering it inaccessible), a replacement Apple ID will be required, which can result in devices losing communication with MaaS360, resulting in a manual re-enrollment scenario. The setup and annual renewal of an APNs certificate is an Apple requirement, which is performed via the MaaS360 console. There are no end user steps required when a certificate is renewed. IBM Security / © 2019 IBM Corporation 6 IBM MaaS360 and iOS Getting Started: Basics and Terminology IBM Security / © 2019 IBM Corporation 7 What is Apple Business Manager? What is Apple School Manager? “Apple Business Manager is a simple, web-based Apple School Manager is a simple, web-based portal for IT administrators to deploy iPhone, portal for IT administrators to deploy iPhone, iPad, iPod touch, Apple TV, and Mac computers all iPad, iPod touch, Apple TV, and Mac computers all from one place. When used with your mobile device from one place. When used with your mobile device management (MDM) solution, you can configure management (MDM) solution, you can configure device settings and buy and distribute apps” device settings and buy and distribute apps” -Apple Business Manager User Guide -Apple School Manager User Guide IBM Security / © 2019 IBM Corporation 8 For organizations that will be utilizing Apple School Manager, or Apple Business Manager, enrollment is required: Apple School Manager or Apple Business Manager and work with reseller(s) to ensure devices (existing, or new orders going forward), are flagged as eligible for enrollment Apple Support Resources for Apple Support Resources for Apple Business Manager Apple School Manager Sign in to Apple Business Manager Sign in to Apple School Manager Apple Business Manager Getting Apple School Manager User Guide Started Guide Education Deployment Guide Apple Business Manager User Guide IBM Security / © 2019 IBM Corporation 9 IBM MaaS360 & iOS Key terminology Other terms iOS devices can be enrolled in MaaS360 manually, – Supervised/supervision A – Apple Configurator (AC)/Apple deeper level of management Configurator 2 (AC2) Software converted to supervised status using Apple Configurator for organizationally owned available on macOS devices that 2 software, or supervised over-the-air using Apple’s devices that provides allows for an iOS device to be additional functionality supervised by tethering to the streamlined enrollment programs. The method by which computer. Also allows for a device is enrolled is largely determined by ownership, conversion to ABM supervised where devices procured by the organization are eligible – Apple Business Manager for future over the air (ABM) and Apple School management for enrollment with supervision, and devices that are Manager (ASM) Apple’s personally owned by an end user are enrolled manually streamlined enrollment – Profile A management profile is without supervision. programs that facilitates the piece installed on a device over the air enrollment of either interactive or silently organizationally owned (depending on management devices style), to deliver policy payloads and configurations. The profile is what manages the device – Volume Purchase Program through MaaS360 (VPP) Part of Apple’s deployment programs that – Device Enrollment Program allows administrators to (DEP) & Apple for Education procure licenses for free or Legacy names for Apple’s paid applications from the deployment programs, often iTunes App Store, and used interchangeably with ABM deploy via MaaS360 and ASM IBM Security / © 2019 IBM Corporation 10 Outlined here are Apple Business/School Apple Configurator 2 Manual Enrollment Manager Supervision Supervision some of the key Devices are owned by the end differentiators Devices owned by the Devices owned by the user or cannot be supervised between ABM/ASM Business or Educational Business or Educational for some reason supervised, AC2 Institution Institution, but are not added to ABM/ASM – End user must interact with supervised, and – Profile is installed over the the device to install the manually enrolled iOS air by integrating MaaS360 – Admin must have access to profile during enrollment. devices. with ABM/ASM portal macOS device to install They can remove profile at AC2 app any time. – Provisions devices from start up to force enrollment – Devices must be tethered – Provides more user automatically and create a physically to macOS device focused settings for streamlined enrollment management, in order to experience – Devices must be wiped to protect privacy and prevent factory settings if already in too much control from – Admin must create an use being granted over a Apple account and work consumer device. with reseller to add devices – Allows for supervision of to Apple portal prior to devices that may not be – If devices are truly enrolling eligible for ABM/ASM organizationally owned, there are fewer policy – Devices must be wiped to – Provides ability to convert options available, which factory settings if already devices on iOS 11+ to ABM may prevent a business or activated account, for over the air educational institution from management going forward gaining the level of – Profile can be locked so management they are that user cannot remove looking for IBM Security / © 2019 IBM Corporation management 11 Apple Volume Purchase Program The Apple Volume Purchase Program (VPP) is part of Apple’s deployment programs. It is accessible within the ABM or ASM portal. It provides additional benefits for supervised General Benefits Supervised Benefits devices but can be – Allows administrators to – Deploy and install apps leveraged on non- purchase bulk licenses for silently with no end-user supervised devices as paid public applications, to interaction well. Instructions for avoid end user prompt for integrating Apple VPP with payment. – Device-based licensing MaaS360 can be found means public applications here. – Syncs via token in the can be installed without an MaaS360 portal, so license Apple ID configured on the quantities are kept up to device. date. – Silently “take over” user – Apps can be automatically install apps to make them imported into the MaaS360 managed. app catalog via VPP token, once licenses are obtained IBM Security / © 2019 IBM Corporation in ABM/ASM portal. 12 Deployment Profile The deployment profile for streamlined enrollment needs to be assigned to devices prior to activation (or wipe, in the case of a device that was previously in use). This profile handles the supervision of the device (all devices on 13+ will be supervised automatically, regardless of options selected), along with requiring enrollment, locking the profile, and skipping any startup items that the admin may not want to present to the end user. For complete instructions on creating and managing profiles, view the Apple DEP Setup Guide .in our Security Learning Academy IBM Security /
Recommended publications
  • On Client Ledger System™ Software
    Focus on Client Ledger System™ Software A Financial MicroSystems, Inc. Publication • Volume 18, Issue 1 • 4th Quarter of 2012 CLS II (1.61) and CLS-DOS (6.3) Updates are Scheduled for Release December 4th Year-end CLS updates for both CLS II and CLS-DOS are currently scheduled for release December 4th. We originally planned to discontinue CLS-DOS at the end of this year, because it has become increasingly difficult for us to make the required programming changes. However, we have decided to release one final year-end update for CLS-DOS and will continue to support it through September 2013. All future development will focus on CLS II. CLS updates include the new 2012 W-2 and 1099/1098 formats for both laser-printed plain-paper and preprinted forms. Dot-matrix preprinted W-2 and 1099 forms are available only in CLS-DOS. Formats for the standard, two-up, preprinted W-2 and W-3 forms are basically unchanged for 2012. However, the 1099- MISC form has alignment changes and formats for the 1099-INT, 1099-DIV, 1099-B, 1099-C, 1098 and 1096 forms are new. All W-2 and W-3 forms (including Copy A) may be printed on plain paper. Submittable 940, 941, 943 and 944 forms may also be printed on plain paper. For 1099, 1098 and 1096 forms, all copies except Copy A may be printed on plain-paper. Copy A must be filed using “official” scannable forms (the IRS may impose a penalty for using non-scannable forms). The CLS updates also include required changes to the federal 940, 941, 943 and 944 forms for the 2012 year-end.
    [Show full text]
  • Deploying Ios and Tvos Devices Using Apple Configurator 2 and Jamf Pro
    Deploying iOS and tvOS Devices Using Apple Configurator 2 and Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 7 October 2020 © copyright 2002-2020 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 Jamf, the Jamf Logo, JAMF SOFTWARE®, and the JAMF SOFTWARE Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Apple, Apple Configurator 2, the Apple logo, Apple TV, iTunes, Mac, macOS, OS X, and tvOS are trademarks of Apple Inc., registered in the United States and other countries. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies. Contents Contents 4 Introduction 4 What's in This Guide 4 Additional Resources 5 Choosing a Deployment Method 6 Supervision Identities 6 Use a Supervision Identity from Apple Configurator 2 7 Create and Use a Supervision Identity from Jamf Pro 8 Automated Enrollment 8 Requirements 8 Deploying Devices Using Automated Enrollment 11 Manual Enrollment with an Enrollment URL 11 Requirements 11 Deploy Devices Using Manual Enrollment with an Enrollment URL 13 Further Considerations 14 Manual Enrollment with an Enrollment Profile 14 Requirements 14 Create an Enrollment Profile 14 Create and Upload the Supervision Identity 14 Create the "Prepare" Blueprint 15 Create the "Enroll" Blueprint 15 Deploy Devices Using Manual Enrollment with an Enrollment Profile 3 Introduction What's in This Guide This guide provides step-by-step instructions for deploying iOS and tvOS devices using Apple Configurator 2 and Jamf Pro.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • Deploying Ipad to Patients Setup Guide
    Deploying iPad to Patients Setup Guide Contents Overview Overview Healthcare institutions are increasingly focused on engaging patients and Getting Prepared delivering a great experience throughout their stay in hospital. Deploying iPad Evaluate your infrastructure with patient-centred apps enables hospitals to enhance each step of the patient Create a configuration journey, from admission to discharge. With third-party iOS apps, hospitals can Automate device setup empower patients to access their daily schedule, connect with their care team, Distribute apps track their progress, get educated on their treatment plan and personalise In-Room Storage their entertainment — putting patients at the centre of care. Initial setup This Setup Guide offers guidance to hospital IT staff who are configuring and Reset your device deploying iPad for patients to use. iPad can be preconfigured with minimal setup Centralised Storage so patients have access to iOS apps, and IT can use mobile device management Set up Apple Configurator (MDM) to protect patient data while also preserving a great user experience. Automate device refresh Once a patient has been discharged, iPad can be securely wiped, so all Install Apple Remote Desktop patient-generated data is removed, and reset to factory settings so it’s ready for the next patient to use. Summary A key decision when deploying iPad to patients is to choose between in-room versus centralised storage of the device (described in the In-Room Storage and Centralised Storage sections). In-room storage is enabled by over-the-air (OTA) wiping and resetting of iPad, which allows devices to stay in the patient room at all times.
    [Show full text]
  • Initial Setup of Your IOS Device
    1. When you first turn on your iOS device, you'll see a screen displaying Hello in different languages. Slide from left to right anywhere on this screen. 2. Select the language you want your iOS device to use, and then the region in which you'll be using your iOS device. This will affect things such as date, time, and contact formatting. 3. Your iOS device requires an Internet connection to set up. Tap the name of your desired Wi-Fi network to begin device activation. § If you're activating an iPhone or iPad (Wi-Fi + Cellular) with active cellular service, you can instead choose cellular activation. 4. Choose whether to enable Location Services. 5. Set up your iPhone as a new device, from an iCloud backup, or from an iTunes backup. § If restoring from backup, you can learn how to restore your content. 6. Sign in with your Apple ID, which you've created previously, or create a free Apple ID. § Alternatively, you can tap Skip This Step to sign in or create an Apple ID later. § If necessary, learn how to create a free Apple ID: 1. Select your birthday, then tap Next: 2. Enter your first and last name, then tap Next: 3. You can then use either your current email address, or choose to get a free iCloud email address. Select the option you'd like, then tap Next. 4. Enter your current email address, or what you'd like for your iCloud email, then tap Next. 5. Enter what you'd like for your password and tap Next.
    [Show full text]
  • Hidemyapp : Hiding the Presence of Sensitive Apps on Android
    HideMyApp : Hiding the Presence of Sensitive Apps on Android Anh Pham Italo Dacosta Eleonora Losiouk John Stephan EPFL, Switzerland EPFL, Switzerland University of Padova, Italy EPFL, Switzerland Kévin Huguenin Jean-Pierre Hubaux University of Lausanne, Switzerland EPFL, Switzerland Abstract patients [23], and there are around 325,000 mHealth apps available in major mobile app stores.2 Millions of users rely on mobile health (mHealth) apps to Given the sensitivity of medical data, the threats of pri- manage their wellness and medical conditions. Although the vacy leakage are one of the main hindrances to the success of popularity of such apps continues to grow, several privacy and mHealth technologies [37]. In this area, a serious and often security challenges can hinder their potential. In particular, overlooked threat is that an adversary can infer sensitive infor- the simple fact that an mHealth app is installed on a user’s mation simply from the presence of an app on a user’s phone. phone can reveal sensitive information about the user’s health. Previous studies have shown that private information, such as Due to Android’s open design, any app, even without per- age, gender, race, and religion, can be inferred from the list of missions, can easily check for the presence of a specific app installed apps [22,29,47]. With the increasing popularity of or collect the entire list of installed apps on the phone. Our mHealth apps, an adversary can now infer even more sensitive analysis shows that Android apps expose a significant amount information. For example, learning that a user has a diabetes of metadata, which facilitates fingerprinting them.
    [Show full text]
  • Wirelessly Stream Videos and Photos to Apple TV Or a Smart TV from Iphone
    Skip to content Manuals+ User Manuals Simplified. Home » Support » Wirelessly stream videos and photos to Apple TV or a smart TV from iPhone Wirelessly stream videos and photos to Apple TV or a smart TV from iPhone Contents [ hide 1 Wirelessly stream videos and photos to Apple TV or a smart TV from iPhone 1.1 Play video on Apple TV or an AirPlay 2-enabled smart TV 1.2 Show photos on Apple TV or an AirPlay 2-enabled smart TV 1.3 Mirror your iPhone on Apple TV or a smart TV 1.3.1 Related Manuals Wirelessly stream videos and photos to Apple TV or a smart TV from iPhone You can wirelessly stream video or photos to Apple TV or an AirPlay 2-enabled smart TV. Play video on Apple TV or an AirPlay 2-enabled smart TV While playing video in the Apple TV app or another supported video app, tap the screen to show the controls, tap , then choose your Apple TV or AirPlay 2-enabled smart TV as the playback destination. The LEGO Movie 2: The Second Part is available on the Apple TV app If an AirPlay passcode appears on the TV screen, enter the passcode on your iPhone. Show photos on Apple TV or an AirPlay 2-enabled smart TV In Photos , tap a photo, tap , swipe up, tap AirPlay, then choose your Apple TV or an AirPlay 2-enabled smart TV as the playback destination. If an AirPlay passcode appears on the TV screen, enter the passcode on your iPhone.
    [Show full text]
  • Apple Configurator Presentation-Full
    The software and tools we use to deploy our iPads •We use Apple Configurator (AC) ! •Under 90 days Apple suggests AC instead MDM (Mobile Device Management) ! •We use Apple’s VPP (Volume Purchasing Program) to be able to buy multiple copies of apps and use redeemable codes to sync with AC Apple’s VPP program (how you deploy an app to many iPads as each needs to be paid for) • To put apps onto the iPads we use VPP (volume purchasing program) • VPP requires an Agent (Old name program Manager)- to enroll the college in the program. The Agent manages Administrators and an Administrator (old name Facilitator) can then Purchases apps • The Administrator ID needs to be clean (in other words a new Apple ID not associated with other accounts) • Agent can link a CC to the account and Administrator can use this to purchase apps (old way was a coupon through snail mail!) • From here you can shop for Apps like in the App Store but the difference is you are purchasing quantity. You do this through the VPP portal not iTunes App Store • Some developers give the education discount which is 50% off normal price for the purchase of 20 or more • You then download an XLS file and receive your list of codes • You open it and redeem one of the codes in the App Store. Go to “redeem” on right hand side of App Store. This effectively puts the App into iTunes on the computer that is running AC • Throw away the old XLS file and then download another XLS which refreshes the one code you’ve just burned to put the app into iTunes • Add the app to AC by either dragging it into AC under the Apps tab within either Prepare or Supervision tabs or adding through the “+” button at bottom of AC.
    [Show full text]
  • View Managing Devices and Corporate Data On
    Overview Managing Devices & Corporate Data on iOS Overview Overview Contents Businesses everywhere are empowering their employees with iPhone and iPad. Overview Management Basics The key to a successful mobile strategy is balancing IT control with user Separating Work and enablement. By personalizing iOS devices with their own apps and content, Personal Data users take greater ownership and responsibility, leading to higher levels of Flexible Management Options engagement and increased productivity. This is enabled by Apple’s management Summary framework, which provides smart ways to manage corporate data and apps discretely, seamlessly separating work data from personal data. Additionally, users understand how their devices are being managed and trust that their privacy is protected. This document offers guidance on how essential IT control can be achieved while at the same time keeping users enabled with the best tools for their job. It complements the iOS Deployment Reference, a comprehensive online technical reference for deploying and managing iOS devices in your enterprise. To refer to the iOS Deployment Reference, visit help.apple.com/deployment/ios. Managing Devices and Corporate Data on iOS July 2018 2 Management Basics Management Basics With iOS, you can streamline iPhone and iPad deployments using a range of built-in techniques that allow you to simplify account setup, configure policies, distribute apps, and apply device restrictions remotely. Our simple framework With Apple’s unified management framework in iOS, macOS, tvOS, IT can configure and update settings, deploy applications, monitor compliance, query devices, and remotely wipe or lock devices. The framework supports both corporate-owned and user-owned as well as personally-owned devices.
    [Show full text]
  • Apple Business Manager Overview Overview
    Getting Started Guide Apple Business Manager Overview Overview Contents Apple Business Manager is a web-based portal for IT administrators to deploy Overview iPhone, iPad, iPod touch, Apple TV, and Mac all from one place. Working Getting Started seamlessly with your mobile device management (MDM) solution, Apple Configuration Resources Business Manager makes it easy to automate device deployment, purchase apps and distribute content, and create Managed Apple IDs for employees. The Device Enrollment Program (DEP) and the Volume Purchase Program (VPP) are now completely integrated into Apple Business Manager, so organizations can bring together everything needed to deploy Apple devices. These programs will no longer be available starting December 1, 2019. Devices Apple Business Manager enables automated device enrollment, giving organizations a fast, streamlined way to deploy corporate-owned Apple devices and enroll in MDM without having to physically touch or prepare each device. • Simplify the setup process for users by streamlining steps in Setup Assistant, ensuring that employees receive the right configurations immediately upon activation. IT teams can now further customize this experience by providing consent text, corporate branding or modern authentication to employees. • Enable a higher level of control for corporate-owned devices by using supervision, which provides additional device management controls that are not available for other deployment models, including non-removable MDM. • More easily manage default MDM servers by setting a default server that’s based on device type. And you can now manually enroll iPhone, iPad, and Apple TV using Apple Configurator 2, regardless of how you acquired them. Content Apple Business Manager enables organizations to easily buy content in volume.
    [Show full text]
  • This EULA Includes the Privacy Policy ( and Terms of Service ( Last Revised
    This EULA includes the Privacy Policy (www.take2games.com/privacy) and Terms of Service (www.take2games.com/legal). Last revised January 22, 2018 LIMITED SOFTWARE WARRANTY AND LICENSE AGREEMENT This limited soware warranty and license agreement (this "Agreement") may be periodically updated and the current version will be posted at www.take2games.com/eula (the "Website"). Your connued use of the Soware aer a revised Agreement has been posted constutes your acceptance of its terms. THE "SOFTWARE" INCLUDES ALL SOFTWARE INCLUDED WITH THIS AGREEMENT, THE ACCOMPANYING MANUAL(S), PACKAGING, AND OTHER WRITTEN FILES, ELECTRONIC OR ON-LINE MATERIALS OR DOCUMENTATION, AND ANY AND ALL COPIES OF SUCH SOFTWARE AND ITS MATERIALS. THE SOFTWARE IS LICENSED, NOT SOLD. BY OPENING, DOWNLOADING, INSTALLING, COPYING, OR OTHERWISE USING THE SOFTWARE, AND ANY OTHER MATERIALS INCLUDED WITH THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT WITH THE UNITED STATES COMPANY TAKE- TWO INTERACTIVE SOFTWARE, INC. ("LICENSOR," “WE,” “US, OR “OUR”), AS WELL AS THE PRIVACY POLICY LOCATED AT www.take2games.com/privacy AND TERMS OF SERVICE LOCATED AT www.take2games.com/legal. PLEASE READ THIS AGREEMENT CAREFULLY. IF YOU DO NOT AGREE TO ALL THE TERMS OF THIS AGREEMENT, YOU ARE NOT PERMITTED TO OPEN, DOWNLOAD, INSTALL, COPY, OR USE THE SOFTWARE. LICENSE Subject to this Agreement and its terms and condions, Licensor hereby grants you a nonexclusive, non- transferable, limited, and revocable right and license to use one copy of the Soware for your personal, non-commercial use for gameplay on a single Game Plaorm (e.g. computer, mobile device, or gaming console) as intended by Licensor unless otherwise expressly specified in the Soware documentaon.
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]