150 likes | 242 Views
PETs and ID Management Privacy & Security Workshop. JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation. Put users in charge of their information Address needs of enterprises and parents Comply with corporate policies. Collect only data that is required
E N D
PETs and ID ManagementPrivacy & Security Workshop JC CannonPrivacy Strategist Corporate Privacy Group Microsoft Corporation
Put users in charge of their information Address needs of enterprises and parents Comply with corporate policies Collect only data that is required Get appropriate consent Protect the storage and transfer of data Privacy deployment guidelines for users Offer comprehensive privacy options Privacy response team for all products Analyst reviews and white papers Content on MS.com, MSN.com privacy sites Participation in privacy & tech conferences PD3+C Privacy Framework PD3 + Communications Privacy in Design Privacyby Default Privacyin Deployment Communications
Windows Security Center • Provides customers the ability to check the status of security functionalities such as; • Antivirus through your Internet Option settings • Firewalls • Automatic Update • Inform users if additional actions are necessary to make them more secure.
Government Partnerships • Strong laws • Enforcement • Industry Associations • Standards and policy • Education • www.microsoft.com/spam eMail user • Protection Filters • SmartScreen • At gateway, server and desktop • Update service • Prevention Agents • Attack detection • Sender reputation • Outbound filtering • Proof: Identity & Evidence • Sender ID • Computational postage • Certificates • Sender safelists
Privacy Technologies • Anti-spam features • Deceptive software protection • Popup ad blocker • Anti-virus software • P3P integration • Internet firewall
Data Protection Technologies • Encrypted File System • Crypto API Component (CAPICOM) • Windows Rights Management Services
RMS Workflow • Author receives a client licensor certificate the “first time” they rights-protect information. Active Directory SQL Server • Author defines a set of usage rights and rules for their file; Application creates a “publishing license” and encrypts the file. RMS Server • Author distributes file. 4 1 • Recipient clicks file to open, the application calls to the RMS server which validates the user and issues a “use license.” 2 5 3 • Application renders file and enforces rights. Information Author The Recipient
Active Directory Authentication SQL Server IRM-Enabled Office documents Unix
MIISMicrosoft Identity Integration Server JohnS John Smith MIIS Johnny JSmith John_Smith iMac Unix Mainframe
Administrator Authorization Manager LOBs have their tasks defined Administrators define roles for a company Developer Accountant Lawyer Create contracts Update payroll LOB Administrator AzMan stores this data in AD Excel Users are assigned roles, tasks and apps at login Authorization Manager Word PowerPoint Create contracts Lawyer Word Applications register during their install
Summary • Microsoft is committed to privacy • Email practices respect customer preferences • Privacy process in place for product development • Microsoft is building technology to protect an individuals privacy and data • Identity management is key to data governance.