The Week in Privacy and Online Safety, May 28, 2012

The Week in Privacy and Online Safety, May 28, 2012A weekly global roundup of online safety news, policy developments, research, and influence General Online Privacy Advocates (U.S.) – Disappearing Phone Booths: Privacy in the Digital Age, Erica Newland, CDT, May 2012 News (U.S.) – Troves of Personal Data, Forbidden to Researchers, The New York Times,…

1

Cloud Fundamentals Video Series: Data Center Security

Tim Rains, Director, Trustworthy Computing writes on the Microsoft Trustworthy Computing Blog: It goes without saying that the physical security of the data centers where cloud services are hosted is a very important aspect of security to all of the customers I talk to.  After all, if an attacker can gain physical access to the…

2

The Week in Privacy and Online Safety, May 21, 2012

The Week in Privacy and Online Safety, May 21, 2012A weekly global roundup of online safety news, policy developments, research, and influence General Online Privacy News (U.S.) – How the Rich and Famous Foil Identity Theft, BusinessWeek, May 15, 2012News (U.S.) – Developing Layered Privacy Notices, Government InfoSecurity, May 14, 2012  General Online SafetyResearch (Australia)…

0

Part 1: The Office 365 approach to privacy in the public cloud – Responsibility

Stephen Bury writes on the Office 365 Blog: Microsoft Office 365 is an online business service that was purposely built to optimize the flexibility, responsiveness, and efficiency of the cloud. It was also created with a strong emphasis on data protection and with Microsoft’s three tenets of privacy – responsibility, transparency, and choice – at…

1

Keeping your family safer with Windows 8

Steven Sinofsky, President, Windows and Windows Live Division writes on the Building Windows Blog: One of the intrinsic capabilities of Windows 8 is the ability to use multiple accounts on any PC. This makes it much easier for parents to use tools that can help protect their children from content on the Internet as they…

3

The Week in Privacy and Online Safety, May 14, 2012

The Week in Privacy and Online Safety, May 14, 2012A weekly global roundup of online safety news, policy developments, research, and influence General Online Privacy News (E.U.) – Europe’s more stringent view of online privacy, San Francisco Chronicle, May 5, 2012News (E.U.) – International DPA Working Group Publishes Cloud Computing Privacy, Privacy and Security, May…

1

Cloud Fundamentals Video Series: Evolving Identity Requirements

From the Trustworthy Computing Blog: Posted By: Tim Rains, Director, Trustworthy Computing A key topic when it comes to security is identity.  But, the laws of identity tell us “the Internet was built without a way to know who and what you are connecting to…Since this essential capability is missing, everyone offering an Internet service…

0

Accountability in Privacy – a Canadian Perspective

From the Microsoft on the Issues Blog: Editor’s Note: Microsoft has been a proponent of accountability, a globally recognized principle of privacy and data protection, and prioritizes the concept in our privacy program. We recently published an accountability-based analysis of Microsoft’s privacy program and shared our position that organizations need clear guidance on how to…

0

The Week in Privacy and Online Safety, May 7, 2012

The Week in Privacy & Online Safety, May 7, 2012A weekly global roundup of news, policy developments, research, and influence General Online Privacy News (U.S.) – How to Muddy Your Tracks on the Internet, The New York Times, May 2, 2012Advocates (U.S.) – Are pseudonyms “anonymous”?, Ed Felten –FTC, Apr. 30, 2012  General Online SafetyNews (U.S.)…

0

Microsoft Can Help You Manage Your Online Information

Brendon Lynch, Chief Privacy Officer, Microsoft writes on the Trustworthy Computing Blog: Yesterday morning I read an article in The New York Times that described “How to Muddy Your Tracks on the Internet.” The article gives consumers some suggestions for addressing the complicated problem of managing the information left by one’s activities online. This information…

1