Posted by John FrankDeputy General Counsel & Vice President, Legal & Corporate Affairs, Microsoft
On Thursday, we published our most recent Law Enforcement Requests Report, which details the number of legal demands for customer data we received from law enforcement agencies around the world and how Microsoft responded to those requests. This is our third report and covers the period from July to December 2013.
(Note: As with prior editions, this report focuses on demands from criminal law enforcement agencies and does not include legal demands under U.S. national security laws. However, following legal action against the U.S. government, we’ve recently been able to separately publish data about the number of these requests we receive. Our first and most recent report of this data can be found here.)
Posted by Mark WilliamsChief Security Officer, Microsoft Federal
Organizations of all types today face a daily and growing assault from nation states, lone actors and organized crime. The effects of a cyber-attack can be as far-reaching, troublesome and significant as physical attacks, and can make or break organizations that are not sufficiently prepared. The question is, how can an organization embed cyber security into its suite of core business functions?
Tom Ridge, the first secretary of the U.S. Department of Homeland Security and one of the world’s most prominent security experts, shared his assessment of the current cyber security landscape at this week’s 2014 Microsoft Federal Executive Forum, an annual event hosted by Microsoft for its federal government community customers.
Posted by Peter CullenGeneral Manager, Trustworthy Computing, Microsoft
This week is particularly exciting for the many people at Microsoft who focus on data privacy. Several of us will attend the annual Global Privacy Summit in Washington, D.C., hosted by the International Association of Privacy Professionals (IAPP). It is a week for privacy professionals from around the world to convene and discuss the big topics that industry, civil society and governments work on collectively to advance the state of privacy protections in today’s data-rich world.
Scott Charney, Corporate Vice President of Microsoft’s Trustworthy Computing group, will deliver a keynote address on Thursday that explores both the trust dynamics resulting from ongoing disclosures regarding government data access and the challenges facing commercial data privacy models in a world of increasingly ubiquitous computing.
Posted by Scott CharneyCorporate Vice President, Trustworthy Computing, Microsoft
At Microsoft, establishing and sustaining trust with our customers is essential. If our customers can’t rely on us to protect their data—whether from crooks, mismanagement or excessive government intrusion—they will look elsewhere for a technology provider.
Government access to data is a hot topic. But it’s not new. In fact, our General Counsel, Brad Smith, has addressed the issue in a series of blog posts covering, among other topics, our efforts to protect customers and our support for reforming government surveillance.
On Tuesday at the RSA Security Conference in San Francisco, I gave a speech on the changing cybersecurity landscape and the respective roles of governments, users and the IT industry. I’d like to share some of my thoughts here.
Posted by David TennenhouseCorporate Vice President, Microsoft Technology Policy
The Internet is critical to our economy and our future. Today, it enables anyone, anywhere, to connect, access content and share ideas. These attributes have been at the center of the Internet’s ability to catalyze innovation in numerous industries, create new employment opportunities and positive economic growth.
For this to carry on, consumers must continue to have access to any legal content and services they choose, and their traffic should not be subject to unreasonable discrimination by their broadband provider.