

Written by Roland Rabben, Kim, and Roy Larsen.
JOTTACLOUD WIKI WINDOWS
If we stop updating this document, our users can assume that we have been served with a secret warrant. Jottacloud CLI for Debian/Ubuntu, Redhat/CentOS, macOS and Windows systems. Miners weren’t worried about carbon monoxide when the canaries chirped they were worried when the chirping stopped.Įach week we will publish an updated statement, if no warrents have been received. Hence the “canary” (as in “canary in a coal mine”) name. We can, however, suddenly stop saying everything is okay. Jottacloud is a Cloud Storage (backup) service provider, which offers unlimited storage space for personal use. The idea behind a warrant canary: if the government comes to us with legal demands and a gag order, that we can’t say anything to our users about it. Docker of Jottacloud client side backup daemon with jotta-cli and jottad inside. What is a Warrant Canary, and how does it work? So instead of publishing information about secret warrants, we have implemented a Warrant Canary, which is publicly available to all our users. That would would be violating Norwegian law. “Secret” warrants cannot be made public by Jottacloud. We will post information that we have received a warrant and how it was handled. We will notify the user that we have received a warrant from the government, and that we will comply with it. Jottacloud promises to provide advance notice to users about government data demands, unless we are legally unable to do so.

Read more in our Privacy Guarantee.Īlthough in some cases laws permit us to reveal such warrants, there are also cases where there are criminal penalties for revealing “secret” warrants. Jottacloud requires a warrant before giving data or content to Norwegian government or law enforcement. That is why we have implemented policies on how we handle warrants and subpoenas. We believe in transparency regarding requests made for our users’ nonpublic information. This also applies to Norwegian laws and government practice. Existing laws allow for governments to issue warrants for search and seizures of customers nonpublic data.
