Presentation is loading. Please wait.

Presentation is loading. Please wait.

PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.

Similar presentations


Presentation on theme: "PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation."— Presentation transcript:

1 PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation

2 PD3+C Privacy Framework Analyst reviews and white papers Content on MS.com, MSN.com privacy sites Participation in privacy & tech conferences Put users in charge of their information Address needs of enterprises and parents Comply with corporate policies Collect only data that is required Get appropriate consent Protect the storage and transfer of data Privacy deployment guidelines for users Offer comprehensive privacy options Privacy response team for all products PD 3 + Communications Privacy in Design Privacy by Default Privacy in Deployment Communications

3 Privacy Settings

4 Provides customers the ability to check the status of security functionalities such as; Provides customers the ability to check the status of security functionalities such as; Antivirus through your Internet Option settings Antivirus through your Internet Option settings Firewalls Firewalls Automatic Update Automatic Update Inform users if additional actions are necessary to make them more secure. Inform users if additional actions are necessary to make them more secure. Windows Security Center

5 Educationwww.microsoft.com/spam Industry Associations Standards and policy Government Partnerships Strong laws Enforcement eMail user Prevention Agents Attack detection Sender reputation Outbound filtering Proof: Identity & Evidence Sender ID Computational postage Certificates Sender safelists Protection Filters SmartScreen At gateway, server and desktop Update service

6 Microsoft PETs

7 Privacy Technologies Anti-spam features Deceptive software protection Popup ad blocker Anti-virus software P3P integration Internet firewall

8 Data Protection Technologies Encrypted File System Crypto API Component (CAPICOM) Windows Rights Management Services

9 RMS Workflow Information Author The Recipient RMS Server SQL Server Active Directory 2 3 4 5 2.Author defines a set of usage rights and rules for their file; Application creates a “publishing license” and encrypts the file. 3.Author distributes file. 4.Recipient clicks file to open, the application calls to the RMS server which validates the user and issues a “use license.” 5.Application renders file and enforces rights. 1.Author receives a client licensor certificate the “first time” they rights-protect information. 1

10 Identity Management

11 Active Directory Authentication SQLServer IRM-Enabled Office documents Unix

12 MIIS Microsoft Identity Integration Server Unix iMac Mainframe JohnS Johnny JSmith John_Smith MIIS John Smith 1JohnS 2Johnny 3JSmith 4John_Smith

13 Authorization Manager Administrators define roles for a company Accountant Administrator Lawyer Developer Excel Word PowerPoint Update payroll Create contracts Lawyer AuthorizationManager LOB Administrator Applications register during their install LOBs have their tasks defined AzMan stores this data in AD Users are assigned roles, tasks and apps at login Word

14 Summary Microsoft is committed to privacy –Email practices respect customer preferences –Privacy process in place for product development Microsoft is building technology to protect an individuals privacy and data Identity management is key to data governance.

15


Download ppt "PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation."

Similar presentations


Ads by Google