Apple has published a document that explains the circumstances in which it will share its customers' information with law enforcement authorities.
Apple makes it clear that it could update the guidance, but said that as of now it stands as is.
"These guidelines are provided for use by law enforcement or other government entities in the U.S. when seeking information from Apple Inc. ('Apple') about users of Apple's products and services, or from Apple devices," it says.
The document's release comes after Apple and other firms complained of being prevented from revealing as much information about data access requests as they'd like.
In an FAQ, Apple said that all subpoenas must be served on the company directly, and that all information being sought must be included in that application.
"Requests for information not included within the body of the signed subpoena, search warrant, or court order will be disregarded; all information requested must be in the actual legal process document," said Apple.
"Responsive production of records and information will be sent in an encrypted electronic container via email or, in some instances, via FedEx delivery. If no responsive information is available, a letter indicating this will be sent via email or, in some cases, via US mail."
If user information is sought as part of a criminal investigation, Apple will tell its user. It said that users would be notified "unless there is a non-disclosure order", or in other extreme situations where "we believe in our sole discretion that such notice may pose immediate risk of serious injury or death to a member of the public or the case relates to a child endangerment matter".
Apple said that it would intercept communications, when it is presented with a valid Wiretap Order, but added that iMessage and FaceTime communications have end-to-end encryption.
Microsoft claims Check Point's methodology is all wrong - figure more like five million, not 250 million
Microsoft's explanation still raises as many questions as it answers
Wikileaks dumps info on 'Brutal Kangeroo', the CIA's malware toolkit for hacking 'air-gapped' networks
CIA's Brutal Kangeroo malware suite likened to Stuxnet
Commuters less than chuffed - many fined for not having a ticket