With Apple Intelligence, many requests are processed on your iPhone, iPad or Mac. For complex requests, Private Cloud Compute extends the privacy and security of your Apple devices into the cloud to unlock even more intelligence for you. Your data is never stored and is used only to respond to your requests. And independent experts can inspect the software that runs on these servers to verify its privacy promise. On-device processing The cornerstone of Apple Intelligence is onâdevice processing. Weâve integrated it deep into your iPhone, iPad and Mac, and throughout your apps, so itâs aware of your personal data, without collecting your personal data. This is only possible through Appleâs unique integration of hardware and software and yearslong investment in building advanced silicon for onâdevice intelligence. Private Cloud Compute When you make a request, Apple Intelligence analyzes whether it can be processed on the device. If it requires greater computational capacity, it can draw on Private Cloud Compute and send only the data relevant to your task to be processed on Apple siliconâbased servers. Your data is never made accessible to Apple â itâs used exclusively to fulfil your requests. And independent experts can inspect the code that runs on the servers to verify our privacy promise. Private Cloud Compute uses cryptography to help ensure that your iPhone, iPad and Mac will refuse to talk to a server unless that serverâs software has been publicly logged for inspection. Our approach to responsible AI development. Apple Intelligence is designed with our core values at every step and built on a foundation of groundbreaking privacy innovations. We do not use our usersâ private personal data or their interactions when training our foundation models. Learn more about our focus on responsible AI development Learn more about model training and individual privacy rights Safari Safari includes state-of-the-art features to help protect your privacy, defending you against cross-site tracking and minimizing the data passed to third parties. And Private Browsing adds even more protections, such as locking your windows when youâre not using them. Learn more about Safari Switch to Safari Intelligent Tracking Prevention You may have noticed that when you look at something to buy online, you suddenly start seeing it everywhere else you go on the web. This happens when a third party tracks cookies and other website data to show you ads across various websites. Intelligent Tracking Prevention uses machine learning and on-device intelligence to fight this cross-site tracking. It hides your IP address from trackers so what you look at on the web remains your business â not an advertiserâs. And you donât have to change any settings for these protections because Intelligent Tracking Prevention is on by default. Private Browsing Safari protects your privacy automatically. Private Browsing adds even more protections. When itâs activated, Safari wonât add the sites you visit to your history, remember your searches or save any information from forms you fill out online â and advanced tracking and fingerprinting protections go even further to help prevent websites from tracking or identifying your device. Known trackers are completely prevented from loading on pages, and link tracking protection removes tracking added to URLs as you browse. Content blocker support is designed so that it canât send developers information about what youâre looking at. And private browsing windows automatically lock â requiring your device password to be unlocked â when youâre not using them. Passkeys Passkeys replace passwords with an easier and safer sign-in method. Your private key is never kept on a web server, so you donât have to worry about website leaks compromising your accounts. And passkeys never leave your device and are specific to the site you created them for, making it almost impossible for them to be phished. Passkeys are end-to-end encrypted and sync across your Apple devices through iCloud Keychain. On Apple devices, simply use Face ID or Touch ID to sign in. For websites or apps on non-Apple devices, use your saved passkey by scanning the QR code with your iPhone or iPad and using Face ID or Touch ID to authenticate. Privacy Report Your Privacy Report shows you all the cross-site trackers that are being blocked by Intelligent Tracking Prevention in Safari. You can access your report from the Safari toolbar and the Safari start page. Password monitoring Safari checks to see whether your saved Keychain passwords have been compromised in data breaches. It uses secure and private cryptographic techniques to regularly check derivations of your passwords against a publicly available list of breached passwords. If Safari identifies a potentially compromised password, your device will notify you. Your password information is never revealed as part of this process â not even to Apple. Social widget tracking prevention Social widgets embedded on websites, such as like buttons, share buttons and comment fields, can be used to track you even if you donât click them or use them. Safari blocks this tracking by default, and it prevents social widgets from accessing your identity unless you grant them permission. Fingerprinting defence Safari works to prevent advertisers and websites from using the unique combination of characteristics of your device to create a âfingerprintâ to track you. These characteristics include the device and browser configuration, and fonts and plug-ins you have installed. To combat fingerprinting, Safari presents a simplified version of the system configuration so more devices look identical to trackers, making it harder to single yours out. This protection is on by default, so there are no extra steps for you to take. Search With the Smart Search field in Safari, you can type website names, web addresses and search queries all in one place. Safari minimizes the amount of data sent to third-party search engines â for example, it wonât share cookies or your precise location, which may happen if you search by other means. Safari also offers the option to set DuckDuckGo as your default search engine, allowing you to search the web without being tracked. Extension controls Browser extensions can help you do many things, like saving money on purchases or improving your grammar. However, they can also be used to track you, taking note of what you browse and even what you type. With Safari extension controls, you can grant extensions access to your information just for one day, just for this current website, or always. Safari Privacy Overview Like all of our products and services, Safari has built-in technologies designed to safeguard your personal information. Your privacy is protected automatically â without having to change your default settings. View the Safari Privacy white paper (PDF) Maps Many personalized features are created using data on your device. And data that is sent from your device to the Maps service is associated with random identifiers, not your identity, so Apple doesnât have a profile of your movements and searches. Personalization Many helpful features, like Visited Places or finding your parked car, are created using data on your device. This helps minimize the amount of data sent to Apple servers. End-to-end encryption Maps keeps your personal data in sync across all your devices using end‑to-end encryption. Your Significant Locations and collections are encrypted end‑to‑end so Apple cannot read them. And when you share your ETA with other Maps users, Apple canât see your location. Random identifiers There is no sign-in when you start using Maps. The data that Maps collects while you use the app â like search terms, navigation routing and traffic information â is associated with random identifiers, not your Apple Account. These identifiers reset themselves as you use the app to ensure the best possible experience and to improve Maps. When you share ratings or photos with Maps, the information that you share is associated with your Apple Account. Location fuzzing Maps goes even further to obscure your location on Apple servers when you search using a process called âfuzzing.â Because your location can give away your identity, Maps converts the precise location where your search originated to a less-exact one after 24 hours. Apple doesnât retain a history of what youâve searched for or where youâve been. Maps extensions Maps extensions that are used in ride-booking and reservation apps run in their own sandboxes and share permissions with their parent apps. For ride-booking apps, Maps shares only your starting point and destination with the extension. And when you reserve a table at a restaurant, the extension knows only the point of interest you tapped. Photos Face recognition and scene and object detection are done completely on your device rather than in the cloud. This allows Apple to provide you with these advanced features without accessing your photos. And apps can access your photos only with your permission. Lock Hidden and Recently Deleted albums in Photos The Hidden and Recently Deleted albums in Photos are locked by default. You can unlock them using your deviceâs authentication method â Face ID, Touch ID or your passcode. Memories and Sharing Suggestions The Memories and Sharing Suggestions features in the Photos app use on-device intelligence to analyze your photos and organize them by faces, places and more to help you find them easily. Because this all happens on your device, Apple can provide you with these advanced features without accessing your photos. iCloud Photos If you choose to back up your photo library to iCloud Photos, Apple protects your photos on our servers with encryption. Photo data, like location or albums organized by places, can be shared between your devices with iCloud Photos enabled. And, if you choose to turn off iCloud Photos, youâll still be able to use on-device analysis. Sharing controls macOS, iOS and iPadOS let you decide if you want to include the photoâs location, edit history and depth data when you share a photo â whether youâre sharing it with a friend or with an app. Third-party app permissions Photo pickers help you select which photos to share with an app while keeping the rest of your library private. When apps ask for your entire photo library, youâll be able to see how many photos and videos they can access and a sample of what they can use and share. Youâll also receive occasional reminders so you can check what youâre sharing â and make changes if you like. Apps If an app requests access to your photos, you can choose which images youâd like to share without granting access to your entire library. Or, if an app wants to add a photo to your library, you can allow it to do so without accessing your photos. You can also choose to grant an app general access to your photos. FaceTime, Messages and More Your iMessage and FaceTime conversations are encrypted end-to-end, so they canât be read while theyâre sent between devices. Mail lets you go incognito. New Call Screening Call Screening helps eliminate distractions by automatically answering calls from unknown numbers and asking the caller for their name and reason for calling. Once the caller has provided this information, your phone will ring and you can decide whether to pick up, decline, or ask for more information. Call Screening processing occurs entirely on your device and isnât shared with Apple.1 Call recording When you start recording live phone calls or FaceTime audio calls from the Phone app, it automatically announces to all participants present at that time that the call is being recorded. Mail Mail Privacy Protection helps protect your privacy from prying email senders. It hides your IP address so senders canât create a profile with your other online activity or see where you are, and they canât tell if youâve opened their email. And Mail categorization, which organizes your email based on relevance and priority, is processed entirely on your device to protect your privacy and minimize data collection. End-to-end encryption End-to-end encryption protects your iMessage and FaceTime conversations across all your devices. With watchOS, iOS and iPadOS, your messages are encrypted on your device so they canât be accessed without your passcode. iMessage and FaceTime are designed so that thereâs no way for Apple to read your messages when theyâre in transit between devices. You can choose to automatically delete your messages from your device after 30 days or a year or keep them on your device indefinitely. FaceTime Apple doesnât store your FaceTime and Group FaceTime calls on our servers. And during transit, these calls are protected with end‑to‑end encryption. Anyone can now join you in one-on-one and Group FaceTime calls from their browsers instantly with the same privacy protections. No Apple device or login required. And starting with iOS 15, iPadOS 15 and macOS Monterey, you can send friends and family a link to connect on FaceTime â even if theyâre using Windows or Android.2 Itâs still end-to-end encrypted, so your call is as private and secure as any other FaceTime call. Live Voicemail When someone leaves a phone message, Live Voicemail shows a live transcription as soon as the caller starts to speak. When Silence Unknown Callers is turned on, calls from unknown numbers will go directly to Live Voicemail without ringing. Calls identified as spam by carriers wonât appear as Live Voicemail and will instead be instantly declined. Thanks to the power of the Neural Engine, Live Voicemail processing occurs entirely on your device, and isnât shared with Apple. NameDrop NameDrop is a feature in AirDrop that lets you hold your iPhone near another iPhone to share contact information with only your intended recipients. You can also choose the specific contact information you want to share â and just as important, which information you donât want to share. iMessage apps iMessage apps â which let you share stickers, songs and more without leaving Messages â do not have access to participantsâ actual contact information or conversations. iOS and iPadOS provide each app with a random identifier for each participant, which is reset when the app is uninstalled. Link Tracking Protection When you share links in Messages, the extra information that some websites add to their URLs will be removed to prevent them from tracking you or the person you shared the link with. iCloud Backup iMessage and SMS messages are backed up on iCloud for your convenience, but you can turn iCloud Backup off whenever you want. And Apple never stores the content of FaceTime calls on any servers. SharePlay SharePlay allows you to share experiences from Apple or third-party apps in FaceTime calls. The content that apps exchange over SharePlay is end-to-end encrypted, just like other FaceTime calls. Siri Siri is designed to do as much learning as possible offline, right on your device. Searches and requests are associated with a random identifier â a long string of letters and numbers â not your Apple Account.
And for Apple Intelligence requests that use Private Cloud Compute, your data is never stored or made accessible to Apple. On-device suggestions When you ask Siri to read or search for information on your device, such as in Messages and Notes, and when Siri provides suggestions, like through widgets and Siri Search, all your personal information is kept on your device rather than being sent to Apple servers. Siri Suggestions in the QuickType keyboard are made possible by an Apple-developed neural network language process that also runs directly on your device. Random identifiers Although Apple attempts to do as much as possible on your device, when you use certain features â like making a voice request to Siri or searching in Spotlight or Safari â real-time input is needed from Apple servers. When we do send information to a server, we protect your privacy by using random identifiers, not your Apple Account. Information like your location may be sent to Apple to improve the accuracy of responses, and we allow you to disable Location Services at any time. On-device processing The audio of your requests is processed entirely on your device unless you choose to share it with Apple. The Apple Neural Engine enables speech recognition models with the same high quality as server-based speech recognition.3 Siri and Dictation The longer you use Siri and Dictation, the better they understand you and improve. To help Siri and Dictation recognize your pronunciation and provide better responses, certain information such as names of your contacts or music, books and podcasts you enjoy is sent to Apple servers using encrypted protocols. Siri and Dictation do not associate this information with your Apple Account, but rather with a random, device-generated identifier. You can reset that identifier at any time by turning Siri and Dictation off and back on, effectively restarting your relationship with them. When you turn Siri and Dictation off, your Siri data associated with the Siri identifier is deleted. The learning process starts over when you turn Siri back on. On-device dictation helps protect your privacy further by performing all processing completely offline. Improving Siri and Dictation By default, Apple does not retain audio recordings of Siri and Dictation interactions. Computer-generated transcripts are used to improve Siri and Dictation. You can opt in to help Siri improve by allowing Apple to store and review audio of your Siri and Dictation interactions, and you can opt out at any time. These audio samples are associated with a random identifier instead of your Apple Account. In addition, you can delete all the Siri and Dictation requests, including audio recordings and computer-generated transcripts, associated with the random identifier from Appleâs servers at any time. Note that requests more than six months old and the small sample of requests that have been reviewed may not be deleted, as they are no longer associated with the random identifier. Learn more about Ask Siri and Privacy Suggestions in Spotlight and Safari When you use Safari or Spotlight in iOS, iPadOS or macOS, your searches are sent to Apple servers along with contextual information like your location or actions taken in the search session to provide you with the most relevant suggestions. This information is associated with a random identifier, not your Apple Account, so that searches and locations are not connected to you personally. For suggestions in Spotlight and Safari, a new random identifier is generated every 15 minutes, and your precise location is never shared with the server. Instead, an approximate location from your device is sent using location fuzzing. You can choose to disable suggestions in Spotlight and Safari. If you choose to disable location-based suggestions, Apple will still use your IP address to determine a general location to make suggestions more relevant. Learn more about Siri Suggestions and Privacy Wallet Wallet helps keep your ID cards, keys, credit and debit cards, transit cards, boarding passes, tickets and more secure. Adding cards When you add a credit, debit or prepaid card to Apple Pay through the Wallet app, your device securely sends your card information, along with other information about your account and device, to your card issuer. Your actual card numbers are never stored on the device or on Apple servers. Instead, a unique Device Account Number is created, which is encrypted in a way that Apple canât decrypt, and stored in the Secure Element on your device. The Device Account Number in the Secure Element is walled off from your operating system and is not stored on Apple Pay servers or backed up to iCloud. Your Apple Pay purchase history is yours, and isnât used by Apple to serve you ads. After your card is approved, your bank, your bankâs authorized service provider or your card issuer creates a device-specific Device Account Number, encrypts it, and sends it along with other data to Apple. The Device Account Number canât be decrypted by Apple and is stored in the Secure Element on your device. Keys and passes Corporate passes and home, hotel and car keys can all be added to one convenient location in Wallet. Your passes and keys are protected and stored in the Secure Element on your device.4 Apple Pay Apple doesnât know what you buy, including where you bought it or for how much, when you pay with a credit or debit card. Unique Device Account Number When you add a credit, debit or prepaid card to Apple Pay through the Wallet app, your device securely sends your card information, along with other information about your account and device, to your card issuer. Your actual card numbers are never stored on the device or on Apple servers. Instead, a unique Device Account Number is created, which is encrypted in a way that Apple canât decrypt, and stored in the Secure Element on your device. The Device Account Number in the Secure Element is walled off from your operating system and is not stored on Apple Pay servers or backed up to iCloud. Apple doesnât track what youâre buying when you use Apple Pay, so we canât build a purchase history to serve you ads. Learn more about Apple Pay Security and Privacy In-store merchant transactions In stores, payments are processed by using the Device Account Number and a transaction-specific, dynamic security code. Neither Apple nor your device shares actual credit or debit card numbers with merchants. If you use a rewards card, Apple requires any personally identifiable information â like your email address or phone number â to be encrypted when itâs sent. No rewards information is ever shared without your permission. In-app and website purchases When you make payments in an app or on a website, Apple receives your encrypted transaction information and re-encrypts it with a developer-specific key before itâs sent to the developer. When you make payments on a Mac with Touch ID or the Touch Bar, the payment is processed in the Secure Element, a certified chip designed to store your payment information safely. On other Mac computers, your Mac and any iOS or iPadOS device signed in to the same Apple Account communicate over an encrypted channel either locally or via Apple servers. Apple requires all apps and websites using Apple Pay to have a privacy policy you can view, so you know how your data is being used. Health Appleâs health products are designed to help keep your data secure and protect your privacy. You have control over which information is placed in the Health app and which apps can access your data through it. View the Health Privacy white paper (PDF) View the Health and Fitness Apps Privacy Overview (PDF) Encrypted data You decide what information is placed in the Health app as well as who can access your data. When your phone is locked with a passcode, Touch ID or Face ID, all your health and fitness data in the Health app â other than your Medical ID â is encrypted. Any Health data backed up to iCloud is encrypted both in transit and on our servers. And if you use a recent version of watchOS and iOS and turn on two-factor authentication and a passcode, your health and activity data will be backed up in a way that Apple canât read. Activity sharing and deletion You can choose to share your Activity data from your Apple Watch with other users. If you later decide to stop sharing, then the other userâs iPhone will delete historical data stored in the Fitness app. You also have the ability to temporarily hide your activity. Health sharing Share your health data with people important to you. Choose which data and trends to share, including heart health, activity, labs, vitals, Medical ID, cycle tracking and more. HealthKit HealthKit allows developers to create health and fitness apps that can share data with the Health app or with each other. As a user, you have control over which elements of your HealthKit information are shared with which apps. Apple requires every app in the App Store to provide a privacy policy for you to review, including apps that work with HealthKit. Apps that work with HealthKit are prohibited from using or disclosing HealthKit data to third parties for advertising or other data mining purposes, and apps can only share data for the purpose of improving your health, fitness or health research with your permission. When you choose to share that data with trusted apps, it goes directly from HealthKit to the third-party app and does not traverse Appleâs network. ResearchKit and CareKit ResearchKit and CareKit are open source software frameworks that take advantage of the capabilities of iPhone. ResearchKit enables developers to create apps that let medical researchers gather robust and meaningful data for studies. And CareKit is a platform for developers to create apps that help individuals take a more active role in their own well-being. With ResearchKit, you choose which studies you want to join, and you control the information you provide to individual research apps. Apps using ResearchKit or CareKit can pull data from the Health app only with your consent. Any apps built using ResearchKit for health-related human subject research must obtain consent from the participants and must provide information about confidentiality rights and the sharing and handling of data. These apps must also be approved by an independent ethics review board before the study can begin. For certain ResearchKit studies, Apple may be listed as a researcher, receiving data from participants who consent to share their data with researchers, so we can participate with the larger research community in exploring how our technology could improve the way people manage their health. This data is received in a way that does not directly identify the participants to Apple. Learn more about ResearchKit and CareKit Apple Research app Appleâs research platform makes it simple to bring together researchers with people eager to help advance medical discovery. You can sign up for a study (or studies) right from your iPhone. If you meet the criteria for a given study, then with your consent you can join. Any data collected through the Apple Research app will be encrypted if you have a passcode set on your device. Once shared, the data is stored securely within Apple in a system designed to meet the technical safeguard requirements of the Health Insurance Portability and Accountability Act (HIPAA). Apple will not have access to any contact information or other data that directly identifies you through the Research app. And you can withdraw from any study at any time, ending any future data collection. Improve Health & Activity and Improve Wheelchair Mode Improve Health & Activity and Improve Wheelchair Mode send data from iPhone and Apple Watch to Apple so we can increase the effectiveness of our health and fitness features. This includes data that is shown in the Health, Activity and Fitness apps, movement measurements, which other fitness apps you have installed, your approximate location and how long you have been using Apple Watch. The data is not used for any other purpose and does not include personally identifiable information. Location Services Location Services privacy controls are a powerful way to manage which apps have access to your location. View the Location Services Privacy white paper (PDF) App location permissions Location permissions help you control the location data that you pass to apps using fine-grained controls. You can choose to grant an app access to your location once or anytime you use it. Approximate location Starting with iOS 14, iPadOS 14 and watchOS 7, you can choose whether apps can see your approximate location â within an area of about 26 square kilometres â rather than your exact location. So you can use apps to find nearby restaurants or check the local weather without providing more information than you need to. Background tracking notifications Receive notifications when an app is using your location in the background, so you can decide whether to update your permission. Background tracking notifications include a map that shows you the places where an app used your location in the background. Wi-Fi and Bluetooth location privacy enhancements Starting in iOS 13 and iPadOS 13, API changes limit the kinds of apps that can see the names of Wi-Fi networks you connect to, which makes it harder for apps to determine your location without your consent. To protect you against apps using Bluetooth to determine your location without your consent, iOS and iPadOS include controls so that an app must ask before accessing Bluetooth for any other purpose than playing audio. And Bluetooth settings allow you to change whether an app has access at any time. Location controls for shared photos macOS, iOS and iPadOS let you decide if you want to include the location when you share a photo, whether youâre sharing it with a friend or with an app. Sign in with Apple Sign in to apps and websites quickly and easily without having your activity tracked or profiled by Apple. View the Sign in with Apple tech brief (PDF) Sign in using your Apple Account Sign in with Apple lets you sign in to apps and websites using the Apple Account you already have. When you use Sign in with Apple, the most information websites and apps can ask for is your name and email address. And Apple wonât track or profile you when you use Sign in with Apple. Hide your email If you donât want to share your email address with a particular app or website, you can choose to hide it. You can also choose to have Apple create a unique email address that forwards to your real address. Two-factor authentication Sign in with Apple requires your Apple Account to be protected with two-factor authentication, so that access to accounts in your favourite apps is more secure. Upgrade to Sign in with Apple Developers can offer you the option to upgrade existing app accounts using Sign in with Apple. You can quickly and easily sign in to your accounts using Face ID or Touch ID and take advantage of Appleâs two-factor authentication for improved privacy and security, without having to set up a new account. News and Entertainment Our news and entertainment services use information about what you read, listen to and watch to help personalize your experience, with built-in privacy protections. Random identifier in Apple News The more news articles you read, the more personalized the Apple News app becomes. Information Apple collects about articles you read is used to improve Apple News. This information is linked to an Apple Newsâspecific identifier and is not linked to other services. You can reset your Apple News identifier at any time by clearing your history in Saved Stories. Recommendations for channels, topics and content are created on your device. By default, Apple News uses iCloud to sync the channels and topics you follow, your reading history and your reading preferences across your devices. On-device suggestions in Apple News Siri suggests stories, channels and topics you may like based on on-device information pulled from the apps you use and the websites you visit in Safari. And when you search in Apple News, your query is combined with information about recently used and popular apps on your device to provide you with relevant search results. Apple News subscriptions If you buy a third-party subscription in Apple News, you can choose whether to share your personal information with the publisher. If you have enabled notifications for an Apple News channel, Apple stores that information to notify you about breaking events, including from your subscription publications. Learn more about Apple News and Privacy Apple Music Apple Music doesnât contain advertisements from other companies. To help personalized features like Listen Now, Autoplay, personal mixes and new release notifications reflect your musical tastes, Apple collects some information about your activity when you play or browse music. This is detailed during setup in âAbout Apple Music & Privacy.â Apple Music is obligated to share some aggregated data with partners, like record labels, for purposes such as royalty payments to artists, but it only does so with industry‑leading privacy protections. Apple Music does not share data with partners using any user or device identifiers. And if you donât want to keep your music collection on our servers, you can opt out of iCloud Music Library. iOS and iPadOS put you in control of which apps can access your Music account and associated details. The opt‑in Apple Music Friends feature lets you share your favourite music â and decide which friends can see the music in your profile. Apple Music only has access to the contacts you choose to add to Apple Music Friends specifically, not your entire contact list. Learn more about Apple Music and Privacy Apple TV To offer personalized recommendations and improve your Apple TV experience, Apple collects information about your purchases, downloads and activity in the Apple TV app, including what you watch on the Apple TV app, connected apps and your location. You can choose to share what you watch in connected apps to bring all your content together, and you have control over the viewing history used by Apple to provide you with personalized recommendations. You can delete the viewing history Apple holds from connected apps entirely, or choose to delete it app by app. Learn more about the Apple TV app and Privacy Apple Arcade Apple Arcade games do not collect any personal data about you, or track any information about how you play without your permission. Games in Apple Arcade contain no in-game advertising and no third‑party tracking. Learn more about Apple Arcade and Privacy App Store Every app in the App Store is required to follow strict guidelines on protecting your privacy and to provide a self-reported summary of how it uses your data. And apps must ask for your permission before accessing things like your photos or location. App guidelines On the App Store, Apple requires app developers to adhere to specific guidelines designed to protect user privacy and security. Apple also requires them to provide a privacy policy that you can review. When Apple becomes aware of an app that violates our guidelines, the developer must address the issue or the app will be removed from the App Store. Apps go through a review process before becoming available on the App Store. Learn more about the app review process (PDF) Privacy Nutrition Labels Developers are required to self‑report how they are using your data ââ such as usage data, contact information or location ââ and whether that data is used to track you. You can view each self-reported Privacy Nutrition Label on the appâs product page on the App Store at any time, including before you choose to download. This is part of ongoing work to increase transparency and control over your data, and Apple will continue to update this feature and work with developers to ensure that users can make informed choices. Learn more about privacy labels on the App Store See how apps from Apple handle your data App permissions Once an app is installed on your device, you are prompted for permission the first time it tries to access information such as your location or photos. You can make changes to the permissions youâve granted. And iOS 11 or later and iPadOS give you the control to provide your location to any app only while youâre using it. Apple also makes sure that there are certain types of data on your device that apps simply canât access, and that there is no way for an app to ask for complete access to all your data. App Clips When you use an App Clip, developers can only ask for a limited set of data. When an App Clip requires access to your location, camera or other sensitive data, it will require the same consent as a full app. You can also choose to grant permission to all App Clips. App Clips arenât allowed to ask your permission to track you across other companiesâ apps and websites ââ only full apps can do that. App tracking An app tracking section in Settings lets you easily see which of your apps have been given permission to track you, so you can change your preferences and disable apps from asking in the future. iOS 14.5 and iPadOS 14.5 or later require developers to get your permission before tracking your activity across other companiesâ apps and websites for ads or data brokers. iCloud What you store in iCloud is protected with industry‑leading encryption, privacy and security. Developers do not have access to your Apple Account. Data encryption iCloud secures your information â like photos, contacts and notes â by encrypting it when itâs in transit, storing it in an encrypted format, and safeguarding your encryption keys in Apple data centres. Both Apple and thirdâparty data centres may be used to store and process your data. When processing data stored in a thirdâparty data centre, encryption keys are accessed only by Apple software running on secure servers, and only while conducting the necessary processing. For additional security, eligible users can enable Advanced Data Protection, which uses endâtoâend encryption to ensure that iCloud data in many categories can be decrypted only on your trusted devices, protecting your information even in the case of a data breach in the cloud. Learn more about iCloud data encryption Two-factor authentication Two-factor authentication is an extra layer of security for your Apple Account. Itâs designed to help ensure that youâre the only person who can access your account, even if someone else knows your password. Itâs easy to set up and easy to use. Learn more about twoâfactor authentication iCloud sharing With iCloud sharing, the identities of participants are not made available to anyone who has not been invited to and accepted a private share. The names of your shared files and the first and last name associated with your Apple Account are available to anyone who has access to the sharing link, including Apple. In iOS 11 or later, iPadOS, and macOS High Sierra or later, endâtoâend encryption in iCloud syncs certain types of personal data, such as your Health data, across all your devices in such a way that Apple cannot read or access it. CloudKit CloudKit is a way for third-party developers to use iCloud storage in their own apps. CloudKit helps keep your preferences, settings and app data up to date across your devices. Developers use CloudKit to make it easier for you to use their apps because you donât have to sign in separately. By default, developers donât have access to your Apple Account, just a unique identifier. If you give your permission, developers can use your email to let others find you in their app. Youâre always in control of these permissions and can turn them on or off at any time. Your data associated with CloudKit isnât shared with developers unless you choose to share or post publicly. Account Recovery Contacts Choose one or more people you trust to become an Account Recovery Contact to help you reset your password and regain access to your account. Apple does not know who your trusted contacts are, only whether you have any. Digital Legacy program The Digital Legacy program lets you designate people as Legacy Contacts so they can access your account and personal information in the event of your death. Apple does not know who your Legacy Contacts are, only whether you have any. iCloud+ iCloud+ includes great features to help protect your privacy when browsing the internet and using email. Hide My Email Hide My Email allows you to create unique, random email addresses that forward to your personal inbox so you can send and receive email without having to share your real email address. iCloud Private Relay iCloud Private Relay is an internet privacy service that uses an innovative multihop architecture in which usersâ requests are sent through two separate internet relays operated by different entities. This way, no single party â including Apple â can view or collect the details of usersâ browsing activity.5 Learn how iCloud Private Relay protects usersâ privacy on the internet (PDF) CarPlay All the rigorous privacy measures built into your iPhone and apps carry over to CarPlay. And iOS privacy updates apply to CarPlay, too. Data minimization When you use CarPlay, every app you see is powered from your iPhone rather than by the car. This means that Apple gives only limited metadata to the car to make the experience seamless, and only when that metadata is essential to delivering the service. For example, song information may be shared to display the current song youâre listening to, and the contact or call time for your current call may be displayed on an instrument cluster or head‑up display to help you see helpful information. Third-party apps Third-party audio, messaging, voice dialling and navigation apps work in CarPlay, as well as apps that automakers create for their own cars. Because they run on your iPhone, all the protections that apply to third-party apps in iOS apply to CarPlay too. And Apple always requires third-party apps to provide a privacy policy for you to review. Home The Home app uses encryption to protect the information you transmit to HomePod and all your HomeKit- or Matter-enabled smart home accessories. Apps that use HomeKit or Matter are subject to requirements as part of our developer agreement. Encryption Data related to your home is encrypted and stored in the iCloud Keychain of your device. Itâs also encrypted in transit between your Apple device and the devices youâre controlling in your home, even when you control your accessories from a remote location. Recordings from security cameras that use HomeKit Secure Video are analyzed privately on your Apple devices at home and then sent securely to iCloud through end-to-end encryption. Location protections When apps perform automatic actions based on your location, such as turning on house lights, these actions are initiated by the Apple Home ecosystem, which makes your location invisible to the app. You can also disable use of your location at any time. App protections Apps that use HomeKit or Matter are restricted by our developer guidelines to using data solely for home configuration or automation services. Random identifiers Siri requests you make from your HomeKit devices, including requests to control your smart home accessories, are associated with a random identifier â not your Apple Account. So your identity is protected. HomeKit Secure Video In iOS 13 and iPadOS 13 or later, HomeKit Secure Video ensures that activity detected by your security cameras is analyzed and encrypted by your Apple devices at home before being securely stored in iCloud. Matter Appleâs Matter implementation includes innovative privacy and security features designed to put you in control of your smart home experience and to enhance interoperability between apps and ecosystems. When pairing a new Matter accessory, iOS and iPadOS maintain the highest levels of privacy and security, ensuring that you are always aware of which accessories join your home and that you are in full control of your smart home network. Just as with your location information, contacts, calendar and photos, apps must request access to add an accessory to your home. HomeKit-enabled routers HomeKit-enabled routers let you see and manage your other accessoriesâ Internet traffic, both within your home and through the Internet. Children and Families Features like Communication Safety, Screen Time, Family Sharing and Apple‑designed education apps help keep kids safe and give parents and teachers control over what children can access and share. Childrenâs safety Communication Safety adds protections for children who may receive or attempt to send photos or videos containing nudity. Parents can manage Communication Safety through their Family Sharing plan. Content containing nudity will be blurred and the child will be warned, presented with helpful resources and reassured that it is OK if they do not want to view the photo or video. Similar protections are available if a child attempts to send photos or videos that contain nudity. In both cases, children are given the option to message someone they trust for help. The warnings work across the Messages app, FaceTime video messages and AirDrop, and when using the Phone app to receive a Contact Poster and the Photos picker to choose content to send. All image and video processing for Communication Safety occurs on the device, meaning neither Apple nor any third party gets access to the content. Photos and videos are analyzed to determine if they contain nudity. End-to-end encryption is maintained, and no indication of the detection of nudity leaves the device. Apple does not get access to the messages, and no notifications are sent to the parent or anyone else. Family Sharing With Family Sharing, parents have visibility into their childrenâs activity and content on their Apple devices, and children can have their own Apple Accounts with the consent of the family organizer. In addition to Communication Safety features that help parents protect children from accessing or sharing content containing nudity, Apple has developed tools such as Ask to Buy. This feature allows parents to approve app downloads or inâapp purchases to give them control over their childrenâs purchases using their Apple Account. And now, parents will have the ability to share their childâs age range with the apps they use while protecting their childâs privacy. Through this new feature, parents can allow their kids to share the age range associated with the Child Account with app developers in a way that does not reveal the childâs birth date and keeps them in control of their data. Learn more about Family Sharing Screen Time You can use Screen Time to better understand and make choices about how much time your children spend using apps and websites. Activity Reports give you a detailed look at all their app usage, notifications and device pickups â and only you, your children and those you choose to share it with can view this information. You can also set the amount of time your kids can spend each day on specific apps and websites. Learn more about Screen Time Education apps Apple doesnât sell student information, and we donât share it with third parties to use for marketing or advertising. Apple doesnât collect, use or disclose student information from Apple School Manager, the Schoolwork app, the Classroom app, iTunes U or Managed Apple Accounts other than to provide relevant educational services. And Apple does not track students or build profiles based on their email or web browsing. Parents can decide if they want their child to participate, and students have access to their own data on their devices. Learn more about Privacy and Security in Education View ISO certifications Student Privacy Pledge To provide the best privacy protections for students and teachers, all relevant agreements and processes are aligned with the EU General Data Protection Regulation (GDPR). In addition, Apple has signed the Student Privacy Pledge, further underscoring our commitment to protecting the information students, parents and teachers share in schools. Read the Student Privacy Pledge Kids apps and the App Store Apple has guidelines that are designed to protect user privacy and security for all apps. For apps in the Kids category, we require additional safeguards to help protect childrenâs data and prevent improper advertising. We believe that when parents download an app for their children from the Kids category, they should have visibility into how their childrenâs device usage may be transmitted and confidence that their children wonât be subjected to inappropriate advertisements. Privacy protections are built in. Privacy is a foundational part of the design process. We incorporate these protections throughout Apple products, apps and services. Data minimization At Apple, we believe in collecting only the personal data required to deliver what you need. Whenever possible, Apple processes and analyzes personal data on your device. In instances where specific personal information is necessary, we minimize the amount we use to provide the intended service â like your location when searching in Maps. Apple does not maintain a comprehensive user data profile of your activity across all our products and services to serve you targeted advertising. On-device intelligence Apple uses machine learning to enhance your experience â and your privacy â by using on-device processing so other people donât see your data. Weâve used it for on-device image and scene recognition in Photos, predictive text in keyboards and more. For example, the A13 Bionic and later chips and the Neural Engine in iPhone can recognize patterns, make predictions and learn from experience, similar to the way you do. So your device can create personalized experiences without having to analyze personal information on Apple servers. Developers can use our frameworks, such as Create ML and Core ML, to create powerful new app experiences that donât require your data to leave your device. That means apps can analyze user sentiment, classify scenes, translate text, recognize handwriting, predict text, tag music and more without putting your privacy at risk. Transparency and control When Apple does collect personal data, weâre clear and transparent about it. We make sure you know how your personal information is being used, and how to opt out anytime you like. Data and privacy information screens help you understand how Apple will use your personal information before you sign in or start using new features. We also provide a set of dedicated privacy management tools on our Data and Privacy page. For example, in iOS 14 or later you can choose to grant an app access to just the images you want. And youâll receive a notification when an app is using your location in the background, so you can decide whether to update your permission. Visit your Data and Privacy page Protecting your identity Apple has developed technologies to help obscure your identity when data must go to Apple servers. Sometimes we use random identifiers so your data is not associated with your Apple Account. We have also pioneered using Differential Privacy to understand patterns of behaviour while protecting an individual userâs privacy. If you choose to send Apple analytics about your device usage, the collected information does not identify you personally. When itâs collected, personal data is either not logged at all, removed from reports before theyâre sent to Apple, or protected by techniques such as Differential Privacy. Techniques like these help us deliver and improve services while protecting your privacy. View the Differential Privacy white paper (PDF) Data security Without security protections, there is no privacy. Every Apple device combines hardware, software and services designed to work together for maximum security and a transparent user experience. Custom hardware â such as the Secure Enclave in iPhone, iPad and Mac â powers critical security features like data encryption. Software protections work to help keep the operating system and third-party apps safe. Services provide a mechanism for secure and timely software updates; power a safer app ecosystem, secure communications and payments; and provide a safer experience on the web. Apple devices help protect not only the device and its data at rest, but the entire ecosystem, including what you do locally, on networks and with key web services. Learn more about Apple Platform Security Learn more about privacy at Apple. Go to privacy overview Control what you share See how apps from Apple handle your data Our values lead the way. Accessibility
Our built-in accessibility features are designed to work the way you do.
EducationWe empower students and educators to learn, create and define their own success.
EnvironmentWeâre committed to bringing net emissions to zero across our entire carbon footprint by 2030.
Supply Chain InnovationWe prioritize providing safe, respectful, supportive workplaces for everyone.
Apple Footer * Apple Intelligence is available in beta. Some features may not be available in all regions or languages. For feature and language availability and system requirements, see support.apple.com/en-ca/121115. Available in Cantonese (China mainland, Hong Kong, Macao), English, French (Canada, France), German (Germany), Japanese, Korean, Mandarin Chinese (China mainland, Macao, Taiwan), Portuguese (Brazil) and Spanish (Mexico, Puerto Rico, Spain, U.S.). Users with non-Apple devices can join using the latest version of Chrome or Edge. Sending video requires H.264 video encoding support. Some shared content may require a subscription to view. Available on iPhone with A12 Bionic and later. Requires download of speech models. Available in English (Australia, Canada, India, UK, U.S.), Cantonese (Hong Kong), French (France), German (Germany), Japanese (Japan), Mandarin Chinese (China mainland) and Spanish (Spain, Mexico, U.S.). Car keys and home keys are available on iPhone Xs and later. Device requirements vary by hotel and workplace. ID: Available late 2021. Without access to your IP address, some websites may require extra steps to sign in or access content. Some features may not be available for all countries or all areas or in all languages. View the complete list.  Apple Privacy Features Shop and Learn Shop and Learn Store Mac iPad iPhone Watch Vision AirPods TV & Home AirTag Accessories Gift Cards Apple Wallet Apple Wallet Wallet Apple Pay Account Account Manage Your Apple Account Apple Store Account iCloud.com Entertainment Entertainment Apple One Apple TV Apple Music Apple Arcade Apple Fitness+ Apple News+ Apple Podcasts Apple Books App Store Apple Store Apple Store Find a Store Genius Bar Today at Apple Group Reservations Apple Camp Apple Store App Certified Refurbished Apple Trade In Financing Order Status Shopping Help For Business For Business Apple and Business Shop for Business Business Financing For Education For Education Apple and Education Shop for Kâ12 Shop for University Education Financing For Healthcare For Healthcare Apple and Healthcare For Government For Government Apple and Government Apple Values Apple Values Accessibility Education Environment Privacy Supply Chain Innovation About Apple About Apple Newsroom Apple Leadership Career Opportunities Investors Ethics & Compliance Events Contact Apple More ways to shop: Find an Apple Store or other retailer near you. Or call 1-800-MY-APPLE (1-800-692-7753). Canada (English) Français Copyright © 2026 Apple Inc. All rights reserved. Privacy Policy Use of Cookies Terms of Use Sales and Refunds Legal Site Map智能索引记录
-
2026-02-28 16:12:03
综合导航
成功
标题:ASTM/AASHTO CBR mould accessories ELE International
简介:Browse our range of ASTM/AASHTO CBR mould accessories online
-
2026-02-27 20:04:38
综合导航
成功
标题:Bent Rear Contol Arm? [Archive] - Toyota MR2 Message Board
简介:Ok, so the other day i let my friend drive my car (he has ne
-
2026-02-28 06:36:38
教育培训
成功
标题:2023动物药学专业考研方向有哪些?都与兽医学相关-高顿教育
简介:如今考研已经成为一种趋势,越来越多的人选择考研。那动物药学专业考研方向有哪些呢?动物药学考研方向有基础兽医学、预防兽医学
-
2026-02-28 04:13:52
综合导航
成功
标题:46mm Light Blush Solo Loop - Size 3 - Apple
简介:Customize the look and feel of your Apple Watch with a 46mm
-
2026-02-27 22:09:25
综合导航
成功
标题:Paper Dolls DIY Diary: Dress Up Games Online Yad
简介:Paper Dolls DIY Diary is a free dress up doll game on Yad. D
-
2026-02-27 22:33:14
综合导航
成功
标题:Play Free Online Games from radicalplay.com
简介:There are 1 games from radicalplay.com on 4J.Com. We have ch
-
2026-02-28 15:38:19
健康养生
成功
标题:云大夫 - 大健康,大未来
简介:云大夫是以“服务高端医生、生产权威医疗IP、构建精准医患连接”为定位,致力于通过互联网技术推动医生共享、知识共享、服务共
-
2026-02-27 19:28:01
综合导航
成功
标题:SSH Communications Security - Insiders
简介:SSH Communications Security - Insider Guidelines
-
2026-02-28 12:52:08
综合导航
成功
标题:生成AIを用いた営業計画業務の高度化ソリューション PwC Japanグループ
简介:PwCコンサルティングは、営業計画をサプライチェーンの起点としてDX化し、不確実性を前提に複数シナリオと高速な予実管理で
-
2026-02-27 19:39:20
综合导航
成功
标题:Apple Archives - Making Sense of the Infinite
简介:Apple Archives - Making Sense of the Infinite
-
2026-02-27 19:48:49
综合导航
成功
标题:What Is Data Center Virtualization?
简介:Data center virtualization has grown in popularity in recent
-
2026-02-28 04:05:26
综合导航
成功
标题:Kings Clash - Play The Free Game Online
简介:Kings Clash - click to play online. Kings Clash is a war str
-
2026-02-28 16:12:33
数码科技
成功
标题:北京孤凡电子商务有限公司
简介:北京孤凡电子商务有限公司专注于为客户带来卓越的产品和服务,致力于满足每一位客户的独特需求。我们深知,只有提供高品质的产品
-
2026-02-27 20:08:37
综合导航
成功
标题:Bret Thorn Nation's Restaurant News
简介:Explore the latest news and expert commentary by Bret Thorn,
-
2026-02-28 09:38:16
游戏娱乐
成功
标题:天书世界pk技巧是什么 如何拥有战斗优势_欢乐园游戏
简介:天书世界不仅仅只是刷怪练级拿经验,更是PK战斗的好地方。究竟天书世界pk技巧是什么?如何拥有战斗优势?在天书世界里,野外
-
2026-02-27 21:26:33
综合导航
成功
标题:Färbereihilfsmittel - CHT Gruppe - Spezialchemikalien
简介:CHT - chemische Hilfsmittel und Spezialitäten-Chemie für Tex
-
2026-02-28 13:26:57
综合导航
成功
标题:法律图书馆:法律法规数据库 法律论文 法律图书,法律门户网站
简介:法律图书馆_法律门户网站,提供法律法规数据库、法学论文、裁判文书、律师黄页、法治动态、司法考试资料、法律图书、法律书刊、
-
2026-02-28 12:14:03
健康养生
成功
标题:脾气极佳的眉毛面相特点_一世迷命理网
简介:在面相学中,眉毛作为面部的重要特征之一,往往能够反映出一个人的性格、情绪以及健康状况。而那些脾气超好的人,往往在眉毛上有
-
2026-02-28 05:23:30
综合导航
成功
标题:The Samsung Galaxy Tab S7 has leaked T3
简介:The Samsung Galaxy Tab S7 looks familiar, but with a couple
-
2026-02-28 12:19:00
综合导航
成功
标题:RT - Breaking News, Russia News, World News and Video
简介:RT is the first Russian 24/7 English-language news channel w
-
2026-02-27 14:37:39
综合导航
成功
标题:David Lindop EY Global Consulting Chief Data Officer EY in Kazakhstan
简介:<p>David’s role is to help EY Consulting clients make the sh
-
2026-02-28 05:22:20
母婴亲子
成功
标题:儿童手绘可爱清新通用PPT模板-果果圈模板
简介:儿童手绘可爱清新通用PPT模板主要是帮助大家制作各种类型的ppt,主要是以儿童手绘为主题,呈现可爱清新风,喜欢的话就来下
-
2026-02-28 06:34:34
综合导航
成功
标题:Glossaire XS
简介:Comprenez les termes financiers les plus importants grâce à
-
2026-02-28 10:09:55
游戏娱乐
成功
标题:迷你世界如何驯服团子 团子在哪里_欢乐园游戏
简介:迷你世界野外有种生物叫做团子,看起来比其他的野兽可爱多了,那么团子该怎么驯服呢?下面就让小编给大家讲讲团子的驯服技巧吧!
-
2026-02-28 10:22:46
综合导航
成功
标题:黑色高跟鞋梦境解析是什么含义?_一世迷命理网
简介:在人类的梦境世界中,黑色高跟鞋常常出现,给人们带来无尽的遐想。梦见黑色高跟鞋究竟意味着什么呢?本文将从心理学、文化背景等
-
2026-02-27 22:36:24
新闻资讯
成功
标题:602《女神联盟》195服6月8日13点火爆开启 - 新闻公告 - 602游戏平台 - 做玩家喜爱、信任的游戏平台!cccS
简介:602《女神联盟》195服6月8日13点火爆开启
-
2026-02-28 11:43:57
综合导航
成功
标题:Byrne Dairy Co.
简介:Byrne Dairy convenience store chain overview
-
2026-02-27 20:37:16
新闻资讯
成功
标题:什么是模块化数据中心?模块化数据中心有什么, 站长资讯平台
简介:模块化数据中心是基于云计算的新一代数据中心部署形式,为了应对云计算、虚拟化、集中化、高密化等服务器发展的趋势,其采用模块
-
2026-02-28 05:32:09
综合导航
成功
标题:Socket.find method Node.js net module Bun
简介:API documentation for method node:net.Socket.find Bun
-
2026-02-28 12:46:28
数码科技
成功
标题:电脑按了睡眠模式后开不了机怎么办 5种有效解决方法-驱动人生
简介:电脑按了睡眠模式后开不了机?本文提供五种有效解决方法,帮助你快速修复睡眠唤醒失败问题。