iCloud: iCloud security and privacy overview
Apple takes data security and the privacy of your personal information very seriously. iCloud is built with industry-standard security practices and employs strict policies to protect your data.
iCloud secures your data by encrypting it when it is sent over the Internet, storing it in an encrypted format when kept on server (review the table below for detail), and using secure tokens for authentication. This means that your data is protected from unauthorized access both while it is being transmitted to your devices and when it is stored in the cloud. iCloud uses a minimum of 128-bit AES encryption—the same level of security employed by major financial institutions—and never provides encryption keys to any third parties.
Security and iCloud Features
The table below summarizes how your data is secured when using various iCloud features:
|Calendars||Yes||Yes||A minimum of 128-bit AES encryption|
Uses 256-bit AES encryption to store and transmit passwords and credit card information. Also uses elliptic curve asymmetric cryptography and key wrapping.
|iCloud.com||Yes||N/A||All sessions at iCloud.com are encrypted with SSL. Any data accessed via iCloud.com is encrypted on server as indicated in this table.|
|Yes||N/A||Back to My Mac does not store data on iCloud. Data retrieved from other computers is encrypted with SSL while in transit.|
|Yes||N/A||Purchased or matched music files are not encrypted on server because they do not contain any personal information.|
|Mail and Notes||Yes||No||All traffic between your devices and iCloud Mail and Notes is encrypted with SSL. Consistent with standard industry practice, iCloud does not encrypt data stored on IMAP mail servers. All Apple email clients support optional S/MIME encryption.|
Use of Secure Tokens for Authentication
When you access iCloud services using Apple’s built-in apps (for example, Mail, Contacts, and Calendar apps on iOS or OS X), authentication is handled using a secure token. Using secure tokens eliminates the need to store your iCloud password on devices and computers. Even if you choose to use a third-party application to access your iCloud data, your username and password are sent over an encrypted SSL connection.
When creating an Apple ID to use with iCloud, your password must have a minimum of 8 characters, a number, an uppercase letter, and a lowercase letter. Using a strong password is the most important thing you can do to help keep your data secure. Learn more about creating a strong password.
Find My iPhone
- You must turn on Find My iPhone, iPad, and iPod touch in iOS Settings before your device can be located.
- You must turn on Find My Mac in OS X System Preferences before your Mac can be located.
- Location data is sent from your device only when you request its location—it is not transmitted or recorded at any other time.
- Last known device location data is stored on Apple's servers in an encrypted format for 24 hours and then permanently deleted.
- Lost Mode data is stored on the device that is in Lost Mode and retrieved on-demand by you only.
- You are automatically signed out of the Find My iPhone app (on device or on the web) after 15 minutes of inactivity.
- Remote Lock allows you lock a device's screen to prevent others from accessing your data.
- Remote Wipe lets you permanently and securely erase your data from a device.
Learn more about Find My iPhone.
Find My Friends
- To use Find My Friends, you must first download the optional and free Find My Friends app from the App Store.
- For someone to see your location, you must first give that person explicit permission.
- Your location is sent from your device only when a friend requests to see your location—it is not transmitted or recorded at any other time.
- There is a single switch you can use to hide from all of your friends at any time.
- Last known location data is stored on Apple's servers in an encrypted format for only 2 hours, and then permanently deleted.
- If you do not have a passcode lock set on your device, you will be automatically signed out of Find My Friends after 15 minutes of inactivity.
Learn more about Find My Friends.
- iCloud Keychain encryption keys are created on your devices, and Apple can't access those keys. Only encrypted keychain data passes through Apple's servers, and Apple can't access any of the key material that could be used to decrypt that data.
- Only trusted devices that you approved can access your iCloud Keychain.
- Advanced settings allow you to choose an iCloud Security Code longer than four digits or have your device generate one for you.
- You can choose to disable keychain recovery, which means that iCloud Keychain is kept up to date across your approved devices, but the encrypted data is not stored with Apple and cannot be recovered if all of your devices are lost.
- You can delete unwanted photos from My Photo Stream at any time. Learn about deleting your photos.
- You can delete unwanted photos and videos from your shared photo streams at any time. Learn how to delete photos and videos from a shared photo stream.
- You can remove subscribers from shared photo streams that you created at any time. Learn how to move subscribers from your shared photo stream.
Learn more about iCloud Photo Sharing and My Photo Stream.