A man accused of a crime is jailed for refusing to unlock his iPhone

Privacy

In recent times there are great debates on ethics, technology and privacy. To all users privacy is important, not only because we can trust our devices but because we better value services that put user safety ahead of any other feature. But this issue is getting more and more complicated. This time, a man accused of mistreating his daughter has been jailed in America for refusing to unlock your iPhone. And the controversy is served. American privacy advocates lean on the American Fifth Amendment, while retractors put court cases first.

Privacy is a double-edged sword: unlock and / or imprison?

The American press reported a few days ago that Christopher Wheeler He was arrested on suspicion of mistreating his minor daughter. The police wanted access your iPhone in order to corroborate the version that they defended, that of abuse, but the accused refused to provide the unlock code.

Later, a judge authorized "forced" access to the iPhone, but attempts to gain access were unsuccessful. The next step was, again, judicial: computer to the accused to provide the unlock code. As it counts Miami Herald, the defendant provided a code but it did not unlock the terminal. Now, they claim that if Wheeler gives the correct code to law enforcement, contempt charges will be dropped, remaining, of course, the child abuse charges.

Nor will you be deprived of life, liberty or property without due process of law; nor will your private property be occupied for public use without just compensation.

This one that you have above is part of the Fifth Amendment to the United States Constitution. Some American judges have declared that the blocking codes are within the legality of the Fifth Amendment. Instead, Touch ID fingerprints, they can be used without the consent of the accused.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.