Cisco Blogs

Cisco’s First Transparency Report on Law Enforcement Requests for Customer Data

April 21, 2015 - 2 Comments

As Cisco’s products and services evolve to new models, we find ourselves coming in contact with our customer’s data more regularly. We approach this role as stewards of this data with our customers interest foremost in our mind. One area of widespread interest as it relates to this data is how we interact with Global Law Enforcement regarding this data.   To that end, today Cisco is launching its first global Transparency Report on Law Enforcement Requests for Customer Data. In this report, Cisco details our principles regarding how we will treat law enforcement requests for customer data if, and when we receive such requests. We also provide specifics regarding how many requests we have received from global law enforcement agencies for our customer’s data.

Cisco is committed to publishing data regarding requests or demands for customer data that we receive from law enforcement and national security agencies around the world. We will publish this data twice yearly (covering a reporting period of either January-June or July-December). Like other technology companies, we will publish this data six months after the end of a given reporting period in compliance with restrictions on the timing of such reports.  Please see Cisco’s principles for handling government requests for customer data as well as the reporting data in the Cisco Transparency Report.

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. With all due respect, Dinna, I’m not sure you read the policies completely:

    “Cisco will only make an exception to these commitments in emergency cases where we believe disclosing customer data will prevent imminent death or serious physical harm to an individual.”

    It would seem that any request involving any type of preditory behavior or actions would fall squarely in that category. This is common practice in this area that is most likely identical to that of your ISP and/or mobile service provider.

  2. I foresee lots of child preditors destroying evidence because of this and similar policies. But they’re only children, right?