{"id":26,"date":"2017-02-09T11:43:01","date_gmt":"2017-02-09T10:43:01","guid":{"rendered":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/?p=26"},"modified":"2017-02-13T13:11:15","modified_gmt":"2017-02-13T12:11:15","slug":"apple-vs-fbi","status":"publish","type":"post","link":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/2017\/02\/09\/apple-vs-fbi\/","title":{"rendered":"FBI vs Apple"},"content":{"rendered":"<p>Between August 2015 and February 2017 <strong>Apple has objected at least <a href=\"https:\/\/www.documentcloud.org\/documents\/2718704-Zwillinger-Chart.html\" target=\"_blank\">13 different courts requests<\/a> to unlock the iPhone of suspected terrorists<\/strong>.<\/p>\n<p>This situation obtained the attention of the public in December 2015 when, after the <strong>San Bernardino terrorist attack, FBI recovered an Apple iPhone 5c<\/strong> who was used by <strong>Syed Rizwan Farook<\/strong>, one of the shooters.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-31\" src=\"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-vs-FBI.jpg\" alt=\"Apple-vs-FBI\" width=\"744\" height=\"405\" srcset=\"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-vs-FBI.jpg 744w, https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-vs-FBI-300x163.jpg 300w, https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-vs-FBI-500x272.jpg 500w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/p>\n<p>Since the phone was locked with a four-digit password, <strong>FBI requested Apple to create a new operating system<\/strong> that could be installed in the phone and disable the security features that otherwise would prevent investigators <strong>to get the information<\/strong> contained in the mobile phone.<\/p>\n<p>Apple opposed FBI request taking <strong>officially<\/strong> a very strong stand. <strong>Tim Cook<\/strong>, Apple CEO has indeed <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/feb\/22\/tim-cook-apple-refusal-unlock-iphone-fbi-civil-liberties\" target=\"_blank\">declared to the press<\/a>: \u201cAt stake is the <strong>data security<\/strong> of hundreds of millions of law-abiding people and setting a <strong>dangerous precedent<\/strong> that threatens everyone\u2019s <strong>civil liberties<\/strong>.\u201d<\/p>\n<p>To be honest I am not very interested in the legal battle (a court order requested Apple to create and make available the necessary software to FBI, and again, Apple opposed to the sentence). The reason is simple: I have the impression that <strong>Apple is using this situation for marketing reasons<\/strong>. On one hand, it loudly stands against courts\u2019 rulings, on the other, <a href=\"http:\/\/www.reuters.com\/article\/us-apple-encryption-doj-idUSKCN0VS2FT\" target=\"_blank\">some top managers had admitted<\/a> that <strong>the company is silently providing the necessary help to investigators<\/strong>.<\/p>\n<figure id=\"attachment_29\" aria-describedby=\"caption-attachment-29\" style=\"width: 744px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.youtube.com\/watch?v=Z3Pvqpoxrqo\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-29 size-full\" src=\"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-versus-FBI-user-security-data.jpg\" alt=\"Apple versus FBI user security data\" width=\"744\" height=\"411\" srcset=\"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-versus-FBI-user-security-data.jpg 744w, https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-versus-FBI-user-security-data-300x166.jpg 300w, https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/files\/2017\/02\/Apple-versus-FBI-user-security-data-500x276.jpg 500w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/a><figcaption id=\"caption-attachment-29\" class=\"wp-caption-text\">Source: CBS<\/figcaption><\/figure>\n<p>I don\u2019t even want to make any ethical consideration about this strategy that ignites the outrage of a public that is left with very partial information\u2026 because I am interested in another point.<\/p>\n<p>I believe that in this situation a <strong>stakeholder-engagement approach<\/strong> can be very helpful for compliance managers.<\/p>\n<p>Let\u2019s take a different perspective of this story: the Government is asking to modify iPhone\u2019s software that in some way <strong>could change the relationship between the company and its customers<\/strong> with some possible impact on the security of customers\u2019 devices.<\/p>\n<hr \/>\n<h2><strong>This is a typical situation where\u00a0the compliance department could and should launch a serious stakeholder-engagement program to explore and understand the opinions and\u00a0ethical expectations\u00a0of its customers.<\/strong><\/h2>\n<hr \/>\n<p>Fantastic! This is a typical situation where <strong>the compliance department could and should launch a serious stakeholder-engagement program to explore and understand the opinions and ethical expectations of its customers<\/strong>.<\/p>\n<p>Many relatives of the victims of the terrorists attacks have publicly requested Apple to collaborate with Government\u2026 this is a clear indication that <strong>at least a part of the gigantic Apple population is supportive of the national security requests<\/strong> made by the Government.<\/p>\n<p>This is a very interesting part of the activities of compliance department today: <strong>matching the requests of governments and legislators with the expectations and real needs our customers<\/strong>.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Between August 2015 and February 2017 Apple has objected at least 13 different courts requests to unlock the iPhone of suspected terrorists. This situation obtained the attention of the public in December 2015 when, after the San Bernardino terrorist attack, FBI recovered an Apple iPhone 5c who was used by Syed Rizwan Farook, one of [&hellip;]<\/p>\n","protected":false},"author":354,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[82892],"tags":[16,82892,90585,102295,28129],"coauthors":[102292],"class_list":["post-26","post","type-post","status-publish","format-standard","hentry","category-compliance","tag-apple","tag-compliance","tag-fbi","tag-san-bernardino","tag-stakeholders","megacategoria-mc-business-ethics-and-corporate-social-responsibility"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/users\/354"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":5,"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"predecessor-version":[{"id":34,"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/posts\/26\/revisions\/34"}],"wp:attachment":[{"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/tags?post=26"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.iese.edu\/compliance-and-managers-accountabilty\/wp-json\/wp\/v2\/coauthors?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}