From the foregoing, as much as data and privacy ought to be protected, technology companies, Apple included, should comply with giving required information in terrorism cases. However, encrypted devices should not be unlocked for other criminal activities. Technology vendors always need to consider the possible adversaries when trying to protect their customer’s privacy. However, this does not require that Apple and other technology companies provide a backdoor in which governments and other legal bodies can solely access the information of the terrorists. It means that the technology vendors, should have their own way, secret to them in which they can use to provide required information in the worst of scenarios (Khamooshi, 2016).
The requests for provision of such information should however, be reviewed to assess the disclosure viability and only then can the company give a very slim and specific information. The processes should not be a forceful one but rather a systematic request that is subject to reviews. This is because forceful unprecedented requests by legal bodies is similar to violation of freedom of speech that would appear more political than legal (Khamooshi, 2016). The consent of any such instances, should be declared in the Terms and Conditions at the purchase point and setting up of the device so that a customer is aware of such eventualities in the event, they ever get attached to terrorism.
Delegate your assignment to our experts and they will do the rest.
Developers of the complex security features ought to consider national security in their endeavors. Because for instance, if the terrorism in reference had touched Tim Cook’s family, and an electronic device stood between justice and the deaths, would he still claim that privacy is more important than national security – a privacy that protects terrorists? It is illogical to let privacy undermine the laws of a nation or better still, allow technology companies to determine what is right when other bodies especially legal ones know better (Grachis, 2016).
References
Grachis, G. (2016). Privacy at what costs? Apple vs the US Government . Retrieved 17 th October 2018, from https://www.csoonline.com/article/3037992/security/privacy-at-what-cost-apple-vs-the-us-government.html
Khamooshi, A. (2016). Breaking down Apple’s iPhone Fight with the US Government . Retrieved 17 th October 2018, from https://www.nytimes.com/interactive/2016/03/03/technology/apple-iphone-fbi-fight-explained.html