Download presentation
Presentation is loading. Please wait.
Published byRoxanne McDonald Modified over 9 years ago
1
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy
2
Consumers are more fearful than ever of corporate privacy missteps, governmental intrusions and online fraud. Privacy threats are putting pressure on the “trust level” of users, Behavior and confidence in e-commerce and online services affected. Nearly one-third of U.S. & German Internet users have reduced their overall Internet use because of concerns about identity theft Nearly half of U.S. consumers have “little or no confidence” that organizations are taking sufficient steps to protect their personal data. A 2006 survey of senior business and technology leaders in the U.S. and the UK found that nearly one-third don’t trust their own company’s ability to handle sensitive information. Consumer Trust is Declining
3
1:4,600,000 1:28,500 1:not very many Spam volume up 40% since Jun06, shifting from unsolicited to malicious 38M+ pieces of potentially unwanted software were detected by Windows Defender from Jul06-Dec06 Detections of remote control and monitoring software up 277% and 135% respectively from 1H06 to 2H06 67% of users don’t have current anti-virus protection but 80% think they do Define “privacy”: PII ? IP address ? Click stream data ? Chances are…
4
Today’s Data Privacy Challenges Botnets and rootkits Viruses and worms Phishing and fraud Pharming Spam Spyware Regulatory compliance Corporate policies Information loss/leakage Unauthorized access Unmanaged PC’s Zombies
5
Reduce unwanted communications No intrusive advertising Control of information Protected from harm Minimal intrusion Clear notice of information use Provide only what is needed Choice for additional uses Protection from online fraud and identity theft SPAM filters, SenderID SPAM filters, SenderID Pop-up blocker Pop-up blocker Ad services – Non PII based Ad services – Non PII based User-friendly, discoverable privacy notices User-friendly, discoverable privacy notices Delete Browsing History Delete Browsing History “Inspect document” “Inspect document” IRM IRM Phishing filter Phishing filter Windows Defender Windows Defender Extended validation certificates Extended validation certificates Windows Cardspace Windows Cardspace © 2007 Microsoft Corporation Privacy technology for individuals
6
Retention/ Destruction Usage StorageCollection Destruction Archive In Applications Shared with Third Parties By Employees, Marketers Electronic Devices Backup Structured Databases Unstructured Data Online From 3rd Party In Person Technology Policy People Process Framework for Data Governance © 2007 Microsoft Corporation Privacy for organisations
7
Data Governance Technologies Protecting against malware, unauthorized access and evolving threats Managing identities, protecting personal information from unauthorized access Identity and Access Control Protecting sensitive data from prying eyes Data Encryption Secure Infrastructure Monitoring systems and ensuring compliance Auditing and Reporting Ensuring document security throughout its lifecycle Document Protection There are five elements of an effective technology-based framework to responsibly protect and manage personal information, mitigate risk, achieve compliance, and promote trust and accountability:
8
Data: Fuel for the New Economy Information flow and connected services are the foundation of the New Economy Data sharing is at the center: Growth opportunities for business More responsive and accessible government services Greater convenience and access for customers/citizens Connected Devices – a “more” networked world Health Services – the next explosion Technology enabled – but often ahead of policy
9
Botnets Phishing Zombies Pharming Spam The Internet Battlefield Decentralized, Anonymous, Global
10
What’s at Stake The implications for custodians of personal information are significant: A damper on e-commerce and online services Major financial losses Damage to reputation Increased regulations and less consistency Loss of customer/citizen trust Our research tells us that IT pros consider privacy to be as critical an issue as security We are all in this together…what you do—or don’t do—affects everyone else in this room.
11
1 tonne < 1 gram
12
Privacy Technologies What People Need to Help Protect Their Personal Information NeedSolutions Freedom from intrusion Smartscreen® spam filtering SenderID Framework IE7’s Popup Blocker Freedom from being “watched” Malicious Software Removal Tool Windows Defender Control of personal information Windows CardSpace™ IE7’s “delete browsing history” feature Protection from harmWindows Firewall IE7’s Security Status Bar Microsoft Phishing Filter Windows Live OneCare Windows Vista Parental Controls
13
13 www.microsoft.com/privacybrettrob@microsoft.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.