Microsoft Privacy & Safety

Microsoft's Approach to Helping Protect Privacy and Safety Online

Browse by Tags

Related Posts
  • Blog Post: Phishing scheme affecting some Hotmail customers

    The Windows Live Team Blog writes : Over the weekend Microsoft learned that several thousand Windows Live Hotmail customers’ credentials were exposed on a third-party site due to a likely phishing scheme. Upon learning of the issue, we immediately requested that the credentials be removed and launched...
  • Blog Post: Leading Privacy Advocates Release New Tracking Protection Lists for IE9

    Ryan Gavin writes on the Microsoft Exploring IE Blog : Privacy is top of mind for many people this week, as we get ready to celebrate Data Privacy Day on January 28. Over the next few days, you will hear quite a bit from Microsoft on this topic since we, as a company, continue to be very committed...
  • Blog Post: A Guide to Data Governance for Privacy, Confidentiality and Compliance Part 5: Moving to Cloud Computing

    Javier Salido, Senior Program Manager, Trustworthy Computing Group and Doug Cavit, Principal Security Strategist, Trustworthy Computing Group of Microsoft will be presenting a webcast on data governance for cloud computing. Maintaining the privacy and confidentiality of data, as well as meeting the...
  • Blog Post: Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security

    Today, I’m happy to announce we are releasing Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security at the International Association of Privacy Professionals (IAPP) Global Privacy Summit in Washington, D.C. Complimentary copies are available for conference attendees...
  • Blog Post: SkyDrive: Everything on SkyDrive that you upload is private until you tell us otherwise.

    Microsoft recently released a number of upgrades to our file storing and sharing service, SkyDrive.com. A lengthy blog post by Omar Shahine on the Inside Windows Live blog describes the changes, which include strong privacy protections to help prevent the kind of “inadvertent sharing” which...
  • Blog Post: Government Requirements for a Secure Cloud

    Ron Markezich, Corporate Vice President, Microsoft Online Services, writes on the Microsoft Online Services Blog : This week, U.S. Chief Information Officer Vivek Kundra unveiled the federal government’s vision for cloud computing, beginning with Apps.gov , an online marketplace that will enable...
  • Blog Post: New Cloud Privacy Infographic

    We just created a new infographic on cloud computing privacy . The infographic outlines concerns with privacy in the cloud, then spells out Microsoft’s approach to addressing them – Transparency, Control, and Responsibility. There’s much more on cloud computing privacy on the cloud...
  • Blog Post: Microsoft Launches Privacy Ads

    Frank X. Shaw, Corporate Vice President, Corporate Communications, Microsoft writes on The Official Microsoft Blog : During the last week or so, there has been a fair amount of discussion about how Google is making some unpopular changes to some of its most popular products. You can see some of the...
  • Blog Post: SkyDrive adds “Recycle Bin” for easier cloud data recovery

    A concern many have with the integrity of cloud data is the ability to easily recover deleted files. Microsoft’s SkyDrive recently added a new feature to make it easier for customers to retrieve deleted files, as reported on the Inside SkyDrive blog : SkyDrive already keeps previous versions...
  • Blog Post: Harmonizing Cloud Security Requirements to Enable Cloud Adoption

    Posted by Posted by: Mark Estberg, Senior Director, Online Services Security and Compliance on the Trustworthy Computing Blog : Microsoft’s Global Foundation Services (GFS) organization delivers the global infrastructure and network for over 200 consumer and enterprise cloud services. The security...
  • Blog Post: Privacy in the Cloud Computing Era: A Microsoft Perspective

    Brendon Lynch here. Today we released a new position paper, Privacy in the Cloud Computing Era: A Microsoft Perspective . This new paper discusses how Microsoft is approaching privacy as it relates to cloud computing. We wrote this paper based on our experience over the past decade examining...
  • Blog Post: Microsoft’s Brad Smith Testifies on Updating the Electronic Communication Privacy Act (ECPA) for Cloud Computing

    Today Microsoft General Counsel Brad Smith testified before the Senate Judiciary Committee today in a hearing entitled “ The Electronic Communications Privacy Act: Promoting Security and Protecting Privacy in the Digital Age .” Smith urged Congress to update ECPA to ensure the right balance...
  • Blog Post: Windows Live is giving you more meaningful choices to control your privacy

    From the Windows Live Blog : by Omar Shahine A few months ago I authored a post that sets the context for some of the privacy discussion that’s currently happening, and how we think about privacy in Windows Live. This post describes the new privacy features in Windows...
  • Blog Post: Talking Cloud Privacy in Washington, D.C.

    Susie Adams, Chief Technology Officer, Microsoft Federal, writes on the Microsoft on the Issues Blog : Greater adoption of cloud computing is considered an inevitable trend by regulators and lawmakers from both sides of the political aisle, according to my fellow panelists at Tuesday’s “...
  • Blog Post: Hotmail email access issue now resolved

    Chris Jones, Microsoft Corporate Vice President, Windows Live, relates on the Windows Live Blog that customers who lost access to their hotmail inboxes have had access restored : Beginning on December 30th we had an issue with Windows Live Hotmail that impacted 17,355 accounts. Customers impacted...
  • Blog Post: Balancing Risk and Potential in Considering the Cloud

    Adrienne Hall writes on the Microsoft Trustworthy Computing blog : Years ago I was a part of a team in Microsoft that did a lot of work in the hospitality sector. At that time hotels were Internet-enabling their chains and the business decision they had to make was whether to invest in big TVs or...
  • Blog Post: RSA 2010: The Need for Workable Cross-Border Regulatory Frameworks

    Last week, Scott Charney, corporate vice president for Microsoft Trustworthy Computing, gave a keynote address at the RSA Conference in San Francisco about progress Microsoft has made on the company’s End to End Trust vision for a safer, more trusted internet. As part of his remarks, he explained how...
  • Blog Post: Cloud Fundamentals Video Series: Data Center Security

    Tim Rains , Director, Trustworthy Computing writes on the Microsoft Trustworthy Computing Blog : It goes without saying that the physical security of the data centers where cloud services are hosted is a very important aspect of security to all of the customers I talk to. After all, if an attacker...
  • Blog Post: Trustworthy Computing Next

    I’m in San Francisco this week for the annual RSA Security Conference . This morning I’m heading off to see Microsoft’s Trustworthy Computing corporate vice President Scott Charney share his vision for the next decade in a keynote, “ TwC for our Computing–centric Society...
  • Blog Post: New White Paper Details Privacy Safeguards of Office 365

    Brendon Lynch, Chief Privacy Officer, Microsoft, writes on the Microsoft on the Issues Blog : Privacy is a top priority for many users of cloud computing, so Microsoft today is releasing a white paper that details many of the specific data protection policies, procedures and tools that have been integrated...
  • Blog Post: Cloud Computing Security and Privacy

    Doug Leland, Microsoft General Manager, Identity & Security Division shares his thoughts on cloud computing security and privacy: Hi all – Doug Leland here, general manager of the Identity and Security Business Group. Today at the Microsoft Management Summit vice president Bob Kelly spoke about...
  • Blog Post: Kim Cameron: Some are overlooking cloud computing security and privacy

    Kim Cameron,Chief Architect of Identity at Microsoft, reports on a disturbing trend at a seminar on cloud computing from his IdentityBlog: A few weeks ago I spoke at a conference of CIOs, CSOs and IT Mandarins that - of course - also featured a session on Cloud Computing. It was an industry...
  • Blog Post: Video: Cloud Trust at 10,000 Feet

    Richard Saunders, Director, Trustworthy Computing for Microsoft, writes on the Microsoft Trustworthy Computing Blog : Microsoft’s chief security strategist shares the basics of keeping data safe in the cloud For anyone who wants a primer on the security, privacy and reliability issues...
  • Blog Post: Can you spot the 6 signs of a scam?

    Marcelle Amelia writes on the Security Tips & Talk Blog : We recently received an email that provided a great example of the tools in a cyberscammer's toolbelt. Here's the email. Can you spot the signs of a scam? Scroll down to read more. Dear Account Owner We are having congestion due...
  • Blog Post: Cloud Fundamentals Video Series: Cloud Computing Privacy at Microsoft, Part 1

    Tim Rains , Director, Trustworthy Computing, writes on the Trustworthy Computing blog : Cloud computing is a top of mind issue for many customers, and privacy issues are among some of our customers biggest concerns. Protecting privacy is part of Microsoft’s long-term commitment to Trustworthy...