Partager via


Microsoft Privacy & Safety

Microsoft's Approach to Helping Protect Privacy and Safety Online

Non-Personal Information - like where you live?

Kim Cameron of Microsoft writes on his Identity Blog: Non-Personal Information - like where you...

Author: David Burt Date: 08/25/2010

A Guide to Data Governance for Privacy, Confidentiality and Compliance Part 5: Moving to Cloud Computing

Javier Salido, Senior Program Manager, Trustworthy Computing Group and Doug Cavit, Principal...

Author: David Burt Date: 08/17/2010

NCSA Survey Finds Americans as Concerned about Losing Data as their Jobs

The National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG) have released...

Author: David Burt Date: 08/10/2010

Online privacy, Tracking, and IE8’s InPrivate Filtering

Dean Hachamovitch, Microsoft General Manager for Interent Explorer writes on the Interent Explorer...

Author: David Burt Date: 08/04/2010

Using Consumer Identities for Business Interactions

Microsoft's Kim Cameron writes on his Identity Blog: Using Consumer Identities for Business...

Author: David Burt Date: 07/14/2010

How the bad guys use Search Engine Optimization

Jimmy Kuo, Principal AntiVirus Researcher writes on the Microsoft Malware Protection Center blog:...

Author: David Burt Date: 07/14/2010

Doing it right: Touch2Id

Microsoft's Kim Cameron writes on his Identity blog: And now for something refreshingly different:...

Author: David Burt Date: 07/07/2010

Outsmarting social engineering threats with SmartScreen

John Scarrow, General Manager – Safety Services for Windows Live writes on the Windows Live...

Author: David Burt Date: 07/07/2010

Windows Live Messenger Connect – Making your data more portable while retaining control over its use

Angus Logan on the Windows Live Blog writes: Last week Omar Shahine blogged about our new privacy...

Author: David Burt Date: 06/29/2010

Windows Live Identity (authentication, profile & relationships)

Angus Logan writes on the Windows Live Blog: There are over 500 million Windows Live IDs that are...

Author: David Burt Date: 06/28/2010

National Strategy for Trusted Identities in Cyberspace

The report understands the spectrum of use cases and specifically calls out the need for identity...

Author: David Burt Date: 06/27/2010

Apple giving out your iPhone fingerprints and location

The company says it may now collect, use, transfer, and disclose our iPhone, iPad or computer...

Author: David Burt Date: 06/26/2010

ID used to save “waggle dance”

Tiny RFID tags used to track movements of bees

Author: Anonymous Date: 06/21/2010

Harvesting phone and laptop fingerprints for its database

Google says the user’s device sends a request to its location server with a list of all MAC...

Author: Anonymous Date: 06/20/2010

Trip down memory lane

There is a difference between understanding something theoretically and right in the gut.

Author: Anonymous Date: 06/20/2010

Windows Live is giving you more meaningful choices to control your privacy

From the Windows Live Blog: by Omar Shahine A few months ago I authored a post that sets the context...

Author: David Burt Date: 06/17/2010

A New Tool in the Fight against Fraud

Posted by Nancy Anderson Corporate Vice President and Deputy General Counsel on the Microsoft on the...

Author: David Burt Date: 06/17/2010

Does the non-content trump the content?

Google knew about the collection of MAC addresses, and has never said otherwise or stated that their...

Author: Anonymous Date: 06/16/2010

Title 18 - Part II - Chapter 206 - § 3121

§ 3121. General prohibition on pen register and trap and trace device use; exception

Author: Anonymous Date: 06/16/2010

Privacy in the Era of Social Media and Cloud Computing

Posted by Peter Cullen, Chief Privacy Strategist from the Microsoft on the Issues Blog: I have been...

Author: David Burt Date: 06/15/2010

Education and Empowerment: Making the Internet Safer For Children

Reposted from the Microsoft on the Issues blog: Posted by Caroline Curtin Policy Counsel, U.S....

Author: David Burt Date: 06/15/2010

Conor changes his mind

Conor: Google has clearly stepped into the arena of doing something that could be detrimental to the...

Author: Anonymous Date: 06/13/2010

Identityblog Information Card registration working again

Leave comments by logging in with an Information Card or by sending me an email

Author: Anonymous Date: 06/13/2010

Why location services have to be done right…

49% of testers said privacy and security concerns were the top reason they don’t use check-in...

Author: Anonymous Date: 06/12/2010

Claims based identity tops IT security concerns

Gartner: Identity management projects rank first in the top five priorities for IT's security...

Author: Anonymous Date: 06/12/2010

Latitude privacy policy doesn’t fess up to what Google stores

Simply untrue: "If you hide in Latitude, we don't store your location."

Author: Anonymous Date: 06/12/2010

Rethink things in light of Google’s Gstumbler report

The report indicates Google has been purposely collecting a lot of information its defenders...

Author: Anonymous Date: 06/11/2010

Gstumbler tells all

Google's new report on its activities states, "All available MAC addresses are... written to disk...

Author: Anonymous Date: 06/10/2010

It is all Metcalfe’s fault

But the problem of network addresses is "really hairy when dealing with a high mobility...

Author: Anonymous Date: 06/10/2010

“We could all be wrong about the way 802.11 works…”

Even many experts don't understand that with network encryption enabled, the sender's and...

Author: Anonymous Date: 06/10/2010

The core of the matter at hand

All the brooms have started dancing. I wonder if Mickey will get out of this one?

Author: Anonymous Date: 06/07/2010

More input and points of view

Some comments from readers

Author: Anonymous Date: 06/07/2010

There is a fundamental problem here

Collection of the MAC addresses of phones and laptops is especially worrisome

Author: Anonymous Date: 06/06/2010

How to prevent wirelesstapping

What the &#$#&^$ is going on with encrypting WIFI and not encrypting the MAC addresses?

Author: Anonymous Date: 06/06/2010

MAC addresses will be used to reveal where you live

Once you have snooped peoples' MAC addresses, and put them into a database linking them to a street...

Author: Anonymous Date: 06/06/2010

What harm can possibly come from a MAC address?

What are the implciations of living in a world where it is legal and socially acceptable to drive up...

Author: Anonymous Date: 06/06/2010

Are SSIDs and MAC addresses like house numbers?

Do people consciously try to advertise their SSIDs and MAC addresses to the world by running to the...

Author: Anonymous Date: 06/05/2010

Microsoft helps Kentucky Department of Education to keep student data private

From the Microsoft Security Tips Blog: The Kentucky Department of Education announced today that it...

Author: David Burt Date: 06/04/2010

Ben Adida releases me from the theatre

Stealing one part of the WiFi packet is as bad as stealing another.

Author: Anonymous Date: 06/03/2010

New Videos on How to Use Windows Parental Controls

Microsoft has created a series of videos featuring real Microsoft parents. In How to use Parental...

Author: David Burt Date: 06/02/2010

Privacy is Not Dead

Omar Shahine, Lead Program Manager on the Windows Live Social Networking team writes on the Windows...

Author: David Burt Date: 04/05/2010

Happy Birthday IAPP!

The International Association of Privacy Professionals (IAPP) turns ten years old today. In...

Author: David Burt Date: 03/16/2010

RSA 2010: The Need for Workable Cross-Border Regulatory Frameworks

Last week, Scott Charney, corporate vice president for Microsoft Trustworthy Computing, gave a...

Author: David Burt Date: 03/08/2010

Identity Metasystem and the Trusted Stack

Guest Blog Post from Dan Schutzer, CTO Financial Services Technology Group, Division of the...

Author: David Burt Date: 03/02/2010

<Previous Next>