1 / 15

PETs and ID Management Privacy & Security Workshop

PETs and ID Management Privacy & Security Workshop. JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation. Put users in charge of their information Address needs of enterprises and parents Comply with corporate policies. Collect only data that is required

amish
Télécharger la présentation

PETs and ID Management Privacy & Security Workshop

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PETs and ID ManagementPrivacy & Security Workshop JC CannonPrivacy Strategist Corporate Privacy Group Microsoft Corporation

  2. Put users in charge of their information Address needs of enterprises and parents Comply with corporate policies Collect only data that is required Get appropriate consent Protect the storage and transfer of data Privacy deployment guidelines for users Offer comprehensive privacy options Privacy response team for all products Analyst reviews and white papers Content on MS.com, MSN.com privacy sites Participation in privacy & tech conferences PD3+C Privacy Framework PD3 + Communications Privacy in Design Privacyby Default Privacyin Deployment Communications

  3. Privacy Settings

  4. Windows Security Center • Provides customers the ability to check the status of security functionalities such as; • Antivirus through your Internet Option settings • Firewalls • Automatic Update • Inform users if additional actions are necessary to make them more secure.

  5. Government Partnerships • Strong laws • Enforcement • Industry Associations • Standards and policy • Education • www.microsoft.com/spam eMail user • Protection Filters • SmartScreen • At gateway, server and desktop • Update service • Prevention Agents • Attack detection • Sender reputation • Outbound filtering • Proof: Identity & Evidence • Sender ID • Computational postage • Certificates • Sender safelists

  6. Microsoft PETs

  7. Privacy Technologies • Anti-spam features • Deceptive software protection • Popup ad blocker • Anti-virus software • P3P integration • Internet firewall

  8. Data Protection Technologies • Encrypted File System • Crypto API Component (CAPICOM) • Windows Rights Management Services

  9. RMS Workflow • Author receives a client licensor certificate the “first time” they rights-protect information. Active Directory SQL Server • Author defines a set of usage rights and rules for their file; Application creates a “publishing license” and encrypts the file. RMS Server • Author distributes file. 4 1 • Recipient clicks file to open, the application calls to the RMS server which validates the user and issues a “use license.” 2 5 3 • Application renders file and enforces rights. Information Author The Recipient

  10. Identity Management

  11. Active Directory Authentication SQL Server IRM-Enabled Office documents Unix

  12. MIISMicrosoft Identity Integration Server JohnS John Smith MIIS Johnny JSmith John_Smith iMac Unix Mainframe

  13. Administrator Authorization Manager LOBs have their tasks defined Administrators define roles for a company Developer Accountant Lawyer Create contracts Update payroll LOB Administrator AzMan stores this data in AD Excel Users are assigned roles, tasks and apps at login Authorization Manager Word PowerPoint Create contracts Lawyer Word Applications register during their install

  14. Summary • Microsoft is committed to privacy • Email practices respect customer preferences • Privacy process in place for product development • Microsoft is building technology to protect an individuals privacy and data • Identity management is key to data governance.

More Related