Microsoft Privacy & Safety

Microsoft's Approach to Helping Protect Privacy and Safety Online

Browse by Tags

Related Posts
  • Blog Post: The Week in Privacy – August 21, 2009

    Judge Orders Google to Reveals Blogger's Identity After Insulting Model Canadian model Liskula Cohen sued Google demanding to know the identity of an anonymous blogger on the Google site Blogger.com. The UK Telegraph reports that “In what may prove a far-reaching ruling, Joan Madden, a New York supreme...
  • Blog Post: Announcing Data Privacy Day 2009

    On January 28, 2009, people around the world are celebrating Data Privacy Day by learning more about what we each can do to keep our personal information safer online. The day will feature awareness and education events across generations, cultures, and geographies. Microsoft will host a free interactive...
  • Blog Post: The Week in Privacy and Online Safety, May 14, 2012

    The Week in Privacy and Online Safety, May 14, 2012 A weekly global roundup of online safety news, policy developments, research, and influence General Online Privacy News (E.U.) - Europe's more stringent view of online privacy , San Francisco Chronicle , May 5, 2012 News (E.U.) - International DPA...
  • Blog Post: The Week in Privacy and Online Safety, December 9, 2012

    The Week in Privacy and Online Safety, December 9, 2012 A weekly global roundup of online safety news, policy developments, research, and influence General Online Privacy News (U.S.) - You’d Need 76 Work Days to Read All Your Privacy Policies Each Year , Time , Dec. 4, 2012 General Online...
  • Blog Post: Privacy and a New Era of Personal Computing: A View from Brussels

    Brendon Lynch, Chief Privacy Officer, Microsoft writes on the Microsoft on the Issues Blog : I spent last week in Brussels with privacy regulators and practitioners from around the world, many of whom were there for the IAPP European Data Protection Congress . It’s an important time for privacy...
  • Blog Post: The Week in Privacy and Online Safety, February 11, 2013

    The Week in Privacy and Online Safety, February 11, 2013 A weekly global roundup of online safety news, policy developments, research, and influence General Online Privacy News (U.S.) – EU Adopts CyberSecurity Strategy and Proposes Network Security Directive , InsidePrivacy , Feb. 7, 2013 NGOs...
  • Blog Post: Microsoft HealthVault Explains Privacy Considerations with Facebook Integration

    Last week on the Family Health Blog, the Microsoft HealthVault team announced it would let users sign in with Facebook, and also explained the privacy considerations around the move : For many folks, Facebook is the Internet --- the social networking juggernaut has become the starting point for an...
  • Blog Post: Why location services have to be done right…

    49% of testers said privacy and security concerns were the top reason they don’t use check-in services more often ...read more
  • Blog Post: Leading Privacy Advocates Release New Tracking Protection Lists for IE9

    Ryan Gavin writes on the Microsoft Exploring IE Blog : Privacy is top of mind for many people this week, as we get ready to celebrate Data Privacy Day on January 28. Over the next few days, you will hear quite a bit from Microsoft on this topic since we, as a company, continue to be very committed...
  • Blog Post: Bing Announces Personalized Search, New Privacy Supplement

    Yesterday the Bing team announced new features in Bing that offer a more personalized search for customers by using location data as well as search history, on the official Bing blog : For years people have talked about personalized search as the next evolution of our amazing technology. Over the...
  • Blog Post: Non-Personal Information - like where you live?

    Kim Cameron of Microsoft writes on his Identity Blog: Non-Personal Information - like where you live? The notion that location information tied to random identifiers is not personally identifiable information is total hogwash. Posted on Tuesday 24 August 2010 Last week I gave a presentation...
  • Blog Post: The Week in Privacy and Online Safety, May 7, 2012

    The Week in Privacy & Online Safety, May 7, 2012 A weekly global roundup of news, policy developments, research, and influence General Online Privacy News (U.S.) - How to Muddy Your Tracks on the Internet , The New York Times , May 2, 2012 Advocates (U.S.) - Are pseudonyms “anonymous”...
  • Blog Post: New Backgrounder: Microsoft Security Intelligence Report and Privacy

    I’ve written a new backgrounder document for our Twc Policymakers site on the Microsoft Security Intelligence Report and Privacy . The Microsoft Security Intelligence Report (SIR) is issued twice a year, and documents evolving threats and security trends. A number of the trends we measure have...
  • Blog Post: New Backgrounder on Location Based Services and Privacy

    We just added written a new two-page backgrounder document for our Trustworthy Computing Policymakers site on Location Based Services and Privacy . Location Based Services (LBS) are becoming an increasingly popular with consumers, especially mobile users. This backgrounder discusses LBS, and provides...
  • Blog Post: Microsoft Makes Change to Geographic Location Positioning Service

    Updated 9:14 A.M. 8/2/2011 Microsoft released a change to its geographic location positioning service on July 30, 2011, which addresses an issue highlighted in Elie Bursztein's blog on July 29, 2011. This change adds improved filtering to validate each request so that the service will no longer return...
  • Blog Post: Harvesting phone and laptop fingerprints for its database

    Google says the user’s device sends a request to its location server with a list of all MAC addresses currently visible to it. Does that include yours? ...read more
  • Blog Post: Update on the issue of ‘supercookies’ used on MSN

    In response to recent attention on "supercookies" in the media, we wanted to share more detail on the immediate action we took to address this issue, as well as affirm our commitment to the privacy of our customers. According to researchers, including Jonathan Mayer at Stanford University, "supercookies...
  • Blog Post: MAC addresses will be used to reveal where you live

    Once you have snooped peoples' MAC addresses, and put them into a database linking them to a street address, you have dramatically changed the way network identifiers work. ...read more
  • Blog Post: Privacy and the Bing Integration with Facebook

    Normal 0 false false false EN-US X-NONE X-NONE ...
  • Blog Post: Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security

    Today, I’m happy to announce we are releasing Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security at the International Association of Privacy Professionals (IAPP) Global Privacy Summit in Washington, D.C. Complimentary copies are available for conference attendees...
  • Blog Post: The Week in Privacy and Online Safety, November 5, 2012

    The Week in Privacy and Online Safety, November 5, 2012 A weekly global roundup of online safety news, policy developments, research, and influence General Online Privacy News (U.S.) - Apple leads legal battle over e-commerce vs. privacy rights in CA Sup. Court , San Jose Mercury , Nov. 5, 2012 ...
  • Blog Post: SkyDrive: Everything on SkyDrive that you upload is private until you tell us otherwise.

    Microsoft recently released a number of upgrades to our file storing and sharing service, SkyDrive.com. A lengthy blog post by Omar Shahine on the Inside Windows Live blog describes the changes, which include strong privacy protections to help prevent the kind of “inadvertent sharing” which...
  • Blog Post: Do and don’ts for p@$$w0rd$

    From the Microsoft Malware Protection Center Blog : Almost a year ago , we started a project designed to monitor incoming attacks against a normal user on a day-to-day basis. We presented you with details about the geographical area from where the attacks originated and what services were targeted...
  • Blog Post: Cloud Fundamentals Video Series: Evolving Identity Requirements

    From the Trustworthy Computing Blog: Posted By: Tim Rains , Director, Trustworthy Computing A key topic when it comes to security is identity. But, the laws of identity tell us “the Internet was built without a way to know who and what you are connecting to…Since this essential...
  • Blog Post: Podcast with Peter Cullen Talking About Cyber Safe California Summit

    Hello, I’m Christopher Budd and I’m a communications program manager in the Trustworthy Computing (TwC) Group. Some of you may know me from my work with the Microsoft Security Response Center (MSRC) , but these days I’m working with Peter Cullen, Brendon Lynch and others in our Privacy Group . ...