Tim Cook determined to fight the leaks

At Apple they want to put the maximum possible impediments to the leaks. In this case, a statement leaked online and published by media such as 9To5Mac shows that the Apple's battle against people who leak sensitive information just started.

In this sense, the statement sent to all Apple employees is clear and direct. According to this statement, Apple is doing everything possible to identify these individuals and ensures that "People who leak confidential information are not welcome in the company."

A complicated battle but they will use all the resources

What they come to say with the statement sent to the employees is that they have a difficult job to manage but not impossible. Apple has enough financial and logistical capacity to pursue these possible leaks and while it is true that it can be a difficult battle to manage, they will use all the necessary resources to fight.

Cook, speaks of frustration of some employees to see that secrecy is prioritized but things end up leaking between employees. On the other hand, he also says that this frustration is the same that he feels when he sees something that was confidential published ... He assures in the statement that he is using all the tools they have in their hands to identify those who filter this data and ends by thanking them for the effort made to preserve this information and above all create products like those that will be launched next Friday, September 24, around the world.

Possibly the search for leakers in the company will continue to be a clear objective of the company in the coming years, it will be difficult to stop them but Cook is clear that they will continue to wage war against these leaks. 


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.