Posted by Andy LeesPresident, Mobile Communications Business, Microsoft
Many consumers and policymakers are asking important questions about how today’s phones are collecting and using information about a phone user’s location. The discussion has intensified over the past few weeks when the practices of two other companies in the mobile market were called into question. As a result, several members of the House of Representatives sent a letter to a number of companies that provide mobile phone services seeking clarity on this issue.
We at Microsoft believe this is an important discussion to have. To that end, below, I’ve included what we’ve shared with Congress about the ways Microsoft has taken privacy into account proactively with Windows Phone 7. (You can also find a copy of our response here.)
Editor’s note: The following is a guest post authored by Ernie Allen, president and CEO of the National Center for Missing and Exploited Children.
In late 2009, I wrote on this blog about PhotoDNA, an important technological step forward in preventing the spread of child sexual exploitation online.
Microsoft donated PhotoDNA, a technology created by Microsoft Research in cooperation with Dartmouth College professor Hany Farid, to the National Center for Missing & Exploited Children, so that we could use the groundbreaking image-matching technology with online services companies to stop the online distribution of the worst known images of child rape (aka child pornography).
Today, I’m proud to say that Facebook – a company that has revolutionized life online and, among other accomplishments, is one of the leading photo-sharing services in the world – will implement PhotoDNA on its network to further its commitment to keeping children from being victimized.
Posted by Brad SmithGeneral Counsel and Senior Vice President, Legal & Corporate Affairs, Microsoft
Tomorrow, the Senate Judiciary Committee will consider the Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011 – the PROTECT IP Act. We support the goals and approach of this important legislation, and urge the committee to report it.
The PROTECT IP Act is aimed at providing new tools to challenge the proliferation of “rogue sites” -- Internet sites that are dedicated to infringing content or counterfeit goods. It would establish both governmental and private rights of action in an effort to address what the U.S. Chamber of Commerce estimates to be a multi-billion dollar a year problem that threatens U.S. creators and innovators, places U.S. consumers at risk, harms our economy and costs American jobs.
Posted by Linda ZecherCorporate Vice President, Worldwide Public Sector, Microsoft
This week I was honored to represent Microsoft as we entered a new partnership with the United Nations Education, Scientific and Cultural Organization (UNESCO). Through this partnership we will endeavor to address the growing social and economic issue of unequal education opportunities and low literacy rates for women and girls across the world.
Education and empowering women are two issues I am personally passionate about – a passion also shared by many of my colleagues at Microsoft and across the technology industry.
On Thursday, I joined with other leaders, such as U.S. Secretary of State Hilary Clinton, Bangladesh Prime Minister Sheikh Hasina and Mali Prime Minister Cissé Mariam Kaidama Sidibé in helping UNESCO launch the Global Partnership for Girls’ and Women’s Education for improving literacy and the quality of education for girls and women.
Posted by Vinny GullottoGeneral Manager, Microsoft Malware Protection Center
Today’s release of Microsoft’s Security Intelligence Report volume 10 is our most comprehensive global threat report to date, with in-depth regional threat intelligence for 117 countries from more than 600 million machines worldwide. The report highlights a polarization of cybercriminal behavior and an increasing trend of cybercriminals using “marketing-like” approaches and deception methods to target consumers.
Since 2006, we have released 10 volumes of the Security Intelligence Report, providing customers with unparalleled insight into the software threat landscape and guidance to better protect themselves. The threat landscape has changed significantly during those years with advancements in security and privacy technology and general awareness of cybercrime.