Describe Microsoft’s privacy principles

  1. Home
  2. Describe Microsoft’s privacy principles

Go back to Tutorial

Let’s get in to the details about Microsoft privacy principles.

Microsoft’s products and services run on trust. However, Microsoft focuses on six key privacy principles when making decisions about data. We must know that privacy is about making meaningful choices for the process of data collection and its use. And, it’s about ensuring that you have the information you need to make the choices that are right for you, across all Microsoft products and services.

Six privacy principles
  • Firstly, Control. Putting you, the customer, in control of your privacy with easy-to-use tools and clear choices.
  • Secondly, Transparency. Being transparent about data collection and use so that everyone can make informed decisions.
  • Thirdly, Security. Protecting the data that’s entrusted to Microsoft by using strong security and encryption.
  • Then, Strong legal protections. Respecting local privacy laws and fighting for legal protection of privacy as a fundamental human right.
  • After that, No content-based targeting. Not using email, chat files, or other personal content to target advertising.
  • Lastly, Benefits. When Microsoft does collect data, it’s used to benefit you, the customer, and to make your experiences better.
Practice tests Microsoft's privacy principles
Securing your data at rest and in transit

With state-of-the-art encryption, Microsoft protects your data both at rest and in transit. Moreover, the encryption protocols erect barriers against unauthorized access to the data, including two or more independent encryption layers to protect against compromises of any one layer.

  • Firstly, Data at rest. The Microsoft cloud employs a wide range of encryption capabilities up to AES-256, giving you the flexibility to choose the solution that’s best for your business.
  • Secondly, Data in transit. Data moving between user devices and Microsoft datacenters or within and between the datacenters themselves. However, Microsoft uses and enables the use of industry-standard encrypted transport protocols, such as Transport Layer Security (TLS) and Internet Protocol Security (IPsec).
  • Lastly, Encryption keys. All Microsoft encryption keys are secure. Moreover, it offers the use of technologies such as Azure Key Vault for helping you to control access to passwords, encryption keys, and other secrets.
sc-900 online course Microsoft's privacy principles

Reference: Microsoft Documentation

Go back to Tutorial

Menu