Posted by Brad SmithGeneral Counsel & Executive Vice President, Legal & Corporate Affairs, Microsoft
Amid the current public debates about government surveillance, this is a good day to step back and remember the Third of July.
Of course, the first question you might ask is, what happened on the Third of July?
Many Americans will recall, of course, that it was in Philadelphia at Independence Hall on July 2, 1776, that the colonies voted for their independence. And then it was two days later on July 4 that our Founders signed the Declaration of Independence.
But on the day in between, on July 3, 1776, something interesting happened as well.
Posted by Matt ThomlinsonVice President, Trustworthy Computing Security, Microsoft
In December, we announced our commitment to further increase the security of our customers’ data. We also announced our plans to reinforce legal protections for our customers’ data, and continue to increase transparency in how we engage with governments around the world. We are making positive progress on all of these fronts.
We are in the midst of a comprehensive engineering effort to strengthen encryption across our networks and services. Our goal is to provide even greater protection for data across all the great Microsoft services you use and depend on every day. This effort also helps us reinforce that governments use appropriate legal processes, not technical brute force, if they want access to that data.
As part of that, today we’re announcing three important milestones that honor our commitments to security and increased transparency.
Over time, privacy protection has advanced in key moments. These have involved judges and advocates who appreciated new technologies and found ways to ensure privacy prevailed in a changing world. This week’s unanimous decision by the Supreme Court in the case of Riley v. California ranks with other key historical moments.More than in any other recent decision, the Supreme Court this week advanced privacy in a digital era characterized by ubiquitous computing.
As a result, the scales of justice shifted in a profound way toward a new ideal of privacy in a digital world. There is an important history for privacy that points in this direction and is worth appreciating. But it’s important to start simply by saying this: it was not just a historic week, but a very good week for privacy. A scale implies balance. The Supreme Court’s decision strikes the right balance between public safety and the privacy concerns of users of mobile technology.
Posted by Jessica TanManaging Director, Microsoft Singapore
On Monday, Singapore’s Infocomm Development Authority (IDA) announced a regulatory framework for unlicensed access to unused radio spectrum in the broadcast TV frequency bands, known as TV white spaces (TVWS).
Radio spectrum is, more than ever, being identified by policy makers as a key asset in developing the digital economy and, more broadly, the overall economy. The remarkable growth in the use of smartphones and other wireless devices in recent years has exponentially increased demands on radio spectrum. Mobile traffic is predicted to increase 11-fold over the next five years globally, with wireless devices contributing the majority. Policymakers in many countries are actively looking to both maximise spectrum resources and increase the efficiencies made in their use.
Editor’s Note: The following post is from J. Paul Nicholas, Senior Director, Global Security Strategy and Diplomacy at Microsoft and Cristin Goodwin, Senior Attorney, Regulatory Affairs at Microsoft.
The 2013 Executive Order on Improving Critical Infrastructure Cybersecurity (EO) set forth the U.S. Government’s two-phase approach to strengthening critical infrastructure cybersecurity.In the first phase, the National Institute of Standards and Technology (NIST) led collaborative development of a Cybersecurity Framework; in the second phase, the Department of Homeland Security (DHS) established a voluntary program and continues work towards incentives for organizations to utilize the Framework, while government agencies examined their cybersecurity authorities and regulations relative to the Framework.