Pets and id management privacy security workshop
This presentation is the property of its rightful owner.
Sponsored Links
1 / 15

PETs and ID Management Privacy & Security Workshop PowerPoint PPT Presentation


  • 52 Views
  • Uploaded on
  • Presentation posted in: General

PETs and ID Management Privacy & Security Workshop. JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation. Put users in charge of their information Address needs of enterprises and parents Comply with corporate policies. Collect only data that is required

Download Presentation

PETs and ID Management Privacy & Security Workshop

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Pets and id management privacy security workshop

PETs and ID ManagementPrivacy & Security Workshop

JC CannonPrivacy Strategist

Corporate Privacy Group

Microsoft Corporation


Pd3 c privacy framework

Put users in charge of their information

Address needs of enterprises and parents

Comply with corporate policies

Collect only data that is required

Get appropriate consent

Protect the storage and transfer of data

Privacy deployment guidelines for users

Offer comprehensive privacy options

Privacy response team for all products

Analyst reviews and white papers

Content on MS.com, MSN.com privacy sites

Participation in privacy & tech conferences

PD3+C Privacy Framework

PD3 + Communications

Privacy

in Design

Privacyby Default

Privacyin Deployment

Communications


Privacy settings

Privacy Settings


Pets and id management privacy security workshop

Windows Security Center

  • Provides customers the ability to check the status of security functionalities such as;

    • Antivirus through your Internet Option settings

    • Firewalls

    • Automatic Update

    • Inform users if additional actions are necessary to make them more secure.


Pets and id management privacy security workshop

  • Government Partnerships

    • Strong laws

  • Enforcement

  • Industry Associations

    • Standards and policy

  • Education

    • www.microsoft.com/spam

eMail user

  • Protection Filters

    • SmartScreen

    • At gateway, server and desktop

    • Update service

  • Prevention Agents

    • Attack detection

    • Sender reputation

    • Outbound filtering

  • Proof: Identity & Evidence

    • Sender ID

    • Computational postage

    • Certificates

    • Sender safelists


Microsoft pets

Microsoft PETs


Privacy technologies

Privacy Technologies

  • Anti-spam features

  • Deceptive software protection

  • Popup ad blocker

  • Anti-virus software

  • P3P integration

  • Internet firewall


Data protection technologies

Data Protection Technologies

  • Encrypted File System

  • Crypto API Component (CAPICOM)

  • Windows Rights Management Services


Rms workflow

RMS Workflow

  • Author receives a client licensor certificate the “first time” they rights-protect information.

Active Directory

SQL Server

  • Author defines a set of usage rights and rules for their file; Application creates a “publishing license” and encrypts the file.

RMS Server

  • Author distributes file.

4

1

  • Recipient clicks file to open, the application calls to the RMS server which validates the user and issues a “use license.”

2

5

3

  • Application renders file and enforces rights.

Information Author

The Recipient


Identity management

Identity Management


Active directory authentication

Active Directory Authentication

SQL

Server

IRM-Enabled

Office documents

Unix


Miis microsoft identity integration server

MIISMicrosoft Identity Integration Server

JohnS

John Smith

MIIS

Johnny

JSmith

John_Smith

iMac

Unix

Mainframe


Authorization manager

Administrator

Authorization Manager

LOBs have their tasks defined

Administrators define roles for a company

Developer

Accountant

Lawyer

Create contracts

Update payroll

LOB Administrator

AzMan stores this data in AD

Excel

Users are assigned roles, tasks and apps at login

Authorization

Manager

Word

PowerPoint

Create contracts

Lawyer

Word

Applications register during their install


Summary

Summary

  • Microsoft is committed to privacy

    • Email practices respect customer preferences

    • Privacy process in place for product development

  • Microsoft is building technology to protect an individuals privacy and data

  • Identity management is key to data governance.


  • Login