Wednesday, October 30, 2013

Thoughts on today’s Nokia announcement

Congrats on the acquisition. Now maybe MS can expand its WP customer base via hardware. My customers, friends, and associates shy away from WP8 not because its not easier to use, better interface, uncluttered, stable, somewhat secure, and technically current but because of the availability of useful apps.  When we/they travel, shop, transact business, they find that local and national vendors (e.g., hotels, restaurants, government agencies, auto manufacturers, sporting events, golf courses, retail stores, etc.), they find lots of apps to download for iPhone and android phones but almost none for WP8. Buying Nokia will do little for this vacuum in app availability.

MS needs to immediately focus on (1) getting buy-in by m-phone carriers (Verizon, AT&T, T-Mobile Sprint, etc.) regarding WP8 phone, (2) expand apps development to include user life endeavors, and (3) incorporate phone technology in the Nokia phone that permits using a single phone on many m-hone carrier platforms.

When I walk into a Verzion or AT&T store or reseller organization, I find that I have to force them to demo a WP8 phone, Generally the first advertisements you see are for iPhone then Android phones with little if any materials about WP8. Two months ago I approached Verizon to become a reseller (I own a computer/IT/programming support company) and was told to "get rid of the WP8 phone" or "you'll never convince your potential clients to buy from you". I was told in no uncertain terms to get an iPhone or Android phone if I "wanted to make some money as a reseller".

The typical user of mobile phones is highly concerned about apps that "make their life easier".  Apple and Google are proof that to sell phones, typical user centric apps are a must.

To move from one m-phone carrier to another, users typically must buy a phone that supports their "approved spec".  Dah! Provide Nokia phones can transform form carrier to carrier without "dumping a good phone at a significant loss"  to buy "a similar if not exact phone"  with the new carrier. It should be as simple as changing a SIM card or user account/user ID/password. My friends/associates are approaching the FCC, our federal senators and reps, and state representatives to encourage them to mandate a standard for easily moving between carriers and phone manufacturers. An object oriented approach to accommodate easy movement between carriers.  e.g., I want to keep my current version of my Nokia phone when I transfer from Verizon to T-Mobile.


View the original article here

More free templates to handle bullying, other social situations faced by children with autism

AppId is over the quota
AppId is over the quota

More free templates to help children with autismIn collaboration with Autism Speaks and the University of Washington Autism Center, Microsoft has published a series of PowerPoint templates covering bullying and other social situations faced by the families of the more than one million children with autism in the United States.

Families and therapists supporting children with autism can download these templates for free from the Autism Speaks article on Office.com or by searching for "autism" from the File > New search box in PowerPoint.  After downloading these templates, families and therapists are encouraged to customize the content in these templates to best meet the needs of the individual child.

"We hope that families will find these templates useful for helping their children understand and prepare for some of the everyday activities they may experience as challenging," said Dr. Wendy Stone, PhD, Director of the UW Research in Early Autism Detection and Intervention (READI) Lab.

"Issues such as bullying, toilet training and taking turns are sometimes difficult for individuals with autism to comprehend through traditional teaching methods," said Lisa Goring, Vice President of Family Services at Autism Speaks. "These new templates are a great way to help children on the spectrum learn about more complex topics in a visual and easy to understand format."

Templates recently published include social situations such as bullying, potty training, talking with others, taking turns, going to the store, and play dates. These and PowerPoint templates covering other social situations can be found on the Autism Speaks article on Office.com.


View the original article here

Tuesday, October 29, 2013

Win the inbox war: Four utilities fight email onslaught

AppId is over the quota
AppId is over the quota

Managing your inbox can feel like a full-time job, which is problematic given that you need all your time for your actual job. Like some crazed productivity Terminator, the email just keeps coming, all day, every day. If you’re not diligent about replying, filing, and deleting your messages, it won’t be long before you’re, well, terminated. Or at least terminally depressed.

But guess what? You don’t have to let your inbox win. New tools and services can help you tame that ever-expanding beast, making it easier to weed out the junk, highlight the important, and organize the rest—all without the hassle of manually creating a complex system of filters and folders.

Is such an attack plan really necessary? In these days of thoroughly indexed inboxes and fast, easy searches, the concept (and especially execution) of “inbox zero” may seem like more trouble than it’s worth. After all, when Gmail can locate any message you’ve ever received with just a few keystrokes, who cares about organization?

You’ll have to decide that one for yourself. But once you see how easily and effectively some of these solutions can whip your inbox into shape, you may decide it’s better to be proactive about mail management.

Ever wish you could hire an intern just to sort your email, to separate the e-wheat from the e-chaff? That’s the idea behind Alto, a free browser-based service that organizes mail into virtual stacks, not unlike the way you might sort physical junk mail into piles on your desk.

Developed by AOL, Alto works with the most popular email services, including Gmail, iCloud, Yahoo, and, of course, AOL. And you can use it with multiple accounts, making this a great way to manage several inboxes under one roof.

AltoAlto’s ability to temporarily archive messages until a more convenient time makes it particularly attractive for business users.

Once you sign in, Alto sifts through your inbox and sorts your messages into a handful of existing stacks: Daily Deals, Social Notifications, Photos, Attachments, and so on. You can create additional stacks as well, and once you direct an email to it, all future messages from that source will automatically land there. Thus, you could have a “client” stack, “boss” stack, “widget project” stack, and the like.

Alto’s pretty interface features a scrolling inbox on the left side that lets you preview each message without actually clicking it. If you mouse over an individual email, you’ll see one-click icons for Delete, Snooze, and Star. The Snooze option is particularly great for business users: It lets you temporarily archive an email until a later time, thus getting it out of your inbox but returning it to the top when it’s more convenient for you to deal with it.

Alto rocks. But it’s currently a private beta, meaning you need to request an invitation to try it out. The good news is that your invitation should arrive within about 24 hours, at least based on my recent experience.

Unlike most of the inbox-relief options in this roundup, Inky relies on actual software: It’s a desktop email client stocked with tools for better email management. However, that could be its downfall for some users: If you’re already vested in, say, Outlook, switching might not be a convenient (or even desirable) option.

It is compelling, though. Inky works with both IMAP and POP mail accounts and gives you the option of a unified inbox for as many accounts as you want to connect. Even better, it automatically filters certain types of messages into a variety of handy “Smart View” sub-inboxes: Daily Deals, Personal, Social, Subscriptions, Maps, and even Packages.

InkyInky’s Smart Views identify types of messages and sort them into relevant sub-inboxes.

The Packages inbox could help business users who constantly need to track package deliveries via confirmation emails, while the Personal inbox helps you zero in on important messages that might otherwise get lost in the business shuffle. I especially like the Notes inbox, which is where the email reminders you send to yourself get stored.

Inky looks almost too elegant for business use, and its heavy reliance on icons (not all of which are intuitive) steepens the learning curve. Thankfully, there’s an excellent guided tour that walks new users through the interface, and you can mouse over just about anything to get a pop-up descriptor. I found it much easier to navigate after expanding the side dock, which displays text labels alongside the icon for each section.

To help make sure the most important emails get noticed, Inky attempts to guess which ones are most relevant to you and tags them with a blue drop. The darker the drop, the more relevant the email—though you can easily fine-tune the results by clicking the icon. This should help ensure that messages from clients, coworkers, and other key people get immediate attention.

As PCWorld’s Yaara Lancet points out in her review of Inky, the program has a few bugs, but it still “shows immense promise and has real potential in revolutionizing the way you use email.” I’m not sure I’d give up Outlook for it, but I’ll agree it’s one of the best desktop mail clients to come along in years.

Frustrated by the roiling tornado that is your inbox? Mailstrom (get it?) aims to help you regain control by analyzing its contents, sorting the results, and giving you some tools to reduce the flow of mail. Admittedly, you can accomplish much the same thing using filters and targeted searches, especially in Gmail, but Mailstrom saves you the trouble.

The service, which operates in your browser, works exclusively with IMAP accounts, though for the moment you’re limited to three of them. I added AOL and Gmail accounts, then waited a few minutes to see the results.

Those results can be confusing at first. The Mailstrom dashboard lets you sort messages by sender, subject, lists, time, size, shopping, and social. When you click any of these view options, a middle pane lists the results from most to least. In the sender view, for example, you’ll quickly identify who sends you the most mail, because they’ll appear at the top of the list. You then click any sender to see a list of the messages from that person, which appears in a pane on the right.

MailstromMailstrom analyzes and sorts your email, but its inability to distinguish between read and unread messages is a major limitation.

Mailstrom gives you four key tools. For any given selected batch of messages, you can archive, delete, or mark as spam. You can also move them to another folder (in other words, out of your inbox), at the same time optionally creating a rule so that future messages land in the same spot. And if you’re looking at the Lists view, which shows any mailing lists you might be on (Groupon, stores, message forums, and so on), there’s an Unsubscribe button.

However, Mailstrom doesn’t distinguish between read and unread mail, which I found a serious limitation, and the color-coding it assigns to each filtered list of messages seems to serve no purpose. Plus, you can’t view individual accounts; the service lumps everything together.

Although PCWorld reviewer Liane Cassavoy liked Mailstrom a lot, I found it less helpful. I felt like I spent more time trying to figure out how to use the tool effectively than I would have simply processing my inbox the usual way. That said, it’s definitely worth a try, and for now the only cost is your time: Mailstrom is currently free.

Picture a bouncer stationed at the door to your inbox. VIP messages (like those from business contacts) get past the red-velvet rope; all others must stand in line. Outside. Like the undesirables they are.

That’s SaneBox in a nutshell. The service works with webmail clients like Gmail, iCloud, and Yahoo, and also Exchange, Lotus Notes, and Outlook, making it without question the most business-savvy inbox attacker in the group. I tried it with a Gmail account.

In a matter of seconds after I signed up (with nothing to install, thankfully), SaneBox had analyzed some 1500 messages and relegated roughly a third of them—those deemed unimportant—to a newly created SaneLater folder. So in one fell swoop, the size of my inbox shrank by more than 30 percent. However, I was still looking at a mix of business and personal mail in both locations; SaneBox analyzes based on communication history, not content.

SaneBoxWith support for Gmail, iCloud, Yahoo Mail, Exchange, Lotus Notes, and Outlook, and the ability "train” the filtering system, SaneBox is a powerful inbox manager.

Over time, as you drag messages between folders to “train” the filtering system, SaneBox will indeed keep the important stuff in your inbox and consign the rest to SaneLater. You can also add SaneBlackHole (a trash bin for senders you never want to see again), SaneTomorrow (which holds emails until tomorrow), and SaneNextWeek (which holds them until the following Monday). Need a custom “defer” folder? SaneBox lets you add those, too. The service even has a reminder option similar to that offered by Followup.cc., along with loads of other customization options to help steer mail to more desirable places. (Think: attachments automatically saved to Dropbox.)

Now for the bad news: SaneBox isn’t free, and it’s not exactly cheap, either. The $6-per-month Snack plan affords you just one email account, five of the aforementioned reminders, and five attachment routings. For $15 monthly, Lunch buys you two accounts and 250 each of reminders and attachments. And the $20-per-month Dinner plan supports three accounts and unlimited everything else. At least you can get price breaks if you prepay annually or biannually.

Still, you’ll have to decide if SaneBox’s bouncer is worth the expense. Gmail users in particular might prefer to roll their own "sane" inboxes via filters and labels, which cost a grand total of zero dollars. But if money is no object, SaneBox is perhaps the single best way to control email overload.

Some people can zero-out their inbox every day, and some people just can’t keep up. And then they give up. There’s no need to suffer alone, though. Inbox-taming apps like SaneBox, Mailstrom, and others can sort, filter, and prioritize emails, so you can spend less time scanning subject lines and more time responding to the messages that really matter—or doing other important work.

For more than 20 years, Rick Broida has written about all manner of technology, from Amigas to business servers to PalmPilots. His credits include dozens of books, blogs, and magazines. He sleeps with an iPad under his pillow.
More by Rick Broida


View the original article here

Classic Shell 4.0 review: Free utility restores the full Start menu that Windows 8.1 didn't

AppId is over the quota
AppId is over the quota
Classic Shell 4.0 screenshot Classic Shell 4.0 This powerful free/donationware utility adds the features back to Windows 8 and 8.1 that Microsoft should never have taken out.

Download Now

Classic Shell isn't a me-too Windows 8 fixer. This free utility's first beta came out in November 2009, close on the heels of Windows 7. It's been helping frustrated Windows users regain lost features and add new ones ever since. New stable version 4.0 powers up Windows 7, 8, and 8.1.

Classic Shell 4.0 screenshotWith Classic Shell, I customized the Start menu to put some of my frequently used commands into the top right.

A slew of programs grew up out of Microsoft’s decision to remove the Start menu from Windows 8. Classic 8 restored the Start menu, but it alsoprovided more features, including tweaks to the Windows Explorer that put a number of common features closer to hand. Now, version 4.0 brings a wider range of features, including multiple styles of start menu and a fully customizable look and feel, plus the ability to replace the Start button with one of your own design.

Windows 8.1 brought the return of the Start button, but this didn’t go the whole way: Instead of bringing back the Start menu that allowed you to access programs easily, the Windows 8.1 Start button takes you to the Windows 8 Start page. This uses Microsoft’s Modern design approach, filled with tiles that you may find confusing (or just plain dislike).

Classic Shell brings back the proper Start menu, with three styles that straight out of Windows XP or Windows 7. This goes a long way to making those who were comfortable with earlier OSs feel more at home when upgrading to Windows 8. On Windows 8.1, it replaces the new Start button completely with the new Start menu.

Classic Shell 4.0 screenshotClassic Shell provides three styles for the Start menu, based on different versions of Windows.

In many ways, the Start menu that Classic Shell adds is superior to the Windows 7 one, as you can more easily move programs around within the menu or add them by simply dragging and dropping the program icon into the menu. If you want to pin a frequently used program to the top of the Start menu, you can easily do so by right-clicking the program icon in the all programs menu.

You can also customize the Start menu, even replacing the Start button with a button of your own design. You can also remove the items that appear on the menu. Never use the Start menu's included link to the Music library? Classic Shell allows you to delete it to save space, or replace it with other items that you may have a use for. You can also add links to other programs, batch files and specify command line options.

In short, Classic Shell is the Start menu that Microsoft should have put into Windows 8 in the first place. It provides flexibility, customizability, and a lot of power to dig deep and make using your computer easier.

Classic Shell 4.0 screenshotClassic Shell adds handy icons for cut, copy, paste, delete, properties and email to the Windows Explorer. You can also pin any program to the Start menu with a right click on its icon.

The additions to Windows Explorer are also useful, putting buttons for a number of commonly used features in a menu bar above the file listing. Classic Shell adds icons for cut, copy, paste, delete, properties, and email. These don’t do anything you can't do quickly with a key combination, but an easily recognizable icon may be preferable for those who are less familiar with Windows. Again, this list of icons can be customized to add more, with options such as refresh file list, create new folder and various views available to add easily.

One interesting change is that the program is no longer open source. Before version 3.9.0, the author Ivo Beltchev regarded the program as mainly a teaching exercise in how to write programs that interface with the Windows API properly. Now, he says, the program exists more as a stand-alone application, so he has stopped releasing the source code. Beltchev also accepts donations.

Whatever its source code model, Classic Shell is an excellent program that goes a long way towards making Windows 8 and 8.1 easier for us. Microsoft, are you paying attention?


View the original article here

Review: Nudge and tweak fate to pull off the perfect dinner in Save the Date

AppId is over the quota
AppId is over the quota
Save the Date Attempt to take a friend out for the perfect dinner in Save the Date. The unexpected and unusual crop up in every play-through.

Download Now

Let's go grab some burgers. Or maybe Thai food sounds good? If everything else is closed I'm sure we can go for some tacos. It's just important that we get some dinner and have a really good time—and you can certainly try in Save the Date.

Choose between burgers, tacos and Thai food. Burgers felt like a safe bet.

What starts as a silly dating simulator—the kind where you play as a school kid trying to score a date with the hottie in homeroom through different dialogue trees—quickly turns into a surprising, absurd, deep-thinking experience that I guarantee you weren't expecting.

The premise seems simple enough: Take your friend Felicia on a dinner date and have a good time. At first, the corny dialogue will make your head will hurt from eye-rolling. The deliberate corniness grows more comical after playing through a few times, and it actually drives home the point of the game. And the deeper you get into the game, the deeper the dialogue gets.

Expect to see this screen a lot. Seriously.

As you get more involved in the story, the dialogue evolves, too: It gains substance and real meaning. You ponder Felicia's words and wait for the next tidbit of information she has to share. It feels like your responses really will make an impact. The key is to just get through that first play-through.

Save the Date isn't a one-trick pony. There are multiple outcomes that vary greatly. Taking someone out for a simple dinner becomes a laborious task of quick thinking and making logical decisions. Fate also plays a starring role. I won't say too much more on the subject, because it would venture far into spoiler territory.

Your first game will be quick, most likely under three minutes. However, it'll leave you playing for hours as you restart again and again. As early as your second play-through you'll begin to notice subtle changes that morph the game in different directions, and it quickly becomes obvious that each play-through is not an isolated occurrence.

Be an official l33t h4x0r in four easy steps. Courtesy of the devs.

If you made a decision that ended the game prematurely, it will make a nice cameo with a new option that uses this knowledge to your advantage. Are you psychic? Some sort of meta user? Or maybe you're just thinking clearly this time.

Don't be afraid to poke around. The best strategy is to get your nose in Felicia's business, her personal life, and her history. On the next play-through you can use this to your advantage to both surprise her and change the game to go on just a little longer each time. Even the game files have some fun Easter Eggs, such as one that lets you hack the game by changing one value. If you know where to look, you'll find some pretty simple hacking instructions.

Skip the parts you've played through a million times by quicksaving right before making a decision.

Save the Date is free, bite-sized, packed with content, and manages to surprise you time and time again. It could have been a lame, run-of-the-mill dating sim but instead experiments with multiple story lines, combining the past and present, and blurs the lines between playing a character and being the character. If you're looking for a good laugh with some interesting surprises, Save the Date is worth the time it takes to install and play through a couple of times. Just don't be surprised if you find yourself still playing in a few hours.

Note: The Download button takes you to the vendor's site, where you can download the latest version of the software appropriate to your system.


View the original article here

Office 365 news round-up

AppId is over the quota
AppId is over the quota

Warren Buffett once said that, "Price is what you pay. Value is what you get." Indeed, our goal with Office 365 has always been to provide top value for the money. From building all the important capabilities businesses need directly into the suite to providing an enterprise-class experience, Office 365 is a complete cloud-based productivity solution that offers top value. Don't miss the guest blog post from Christopher Hertz, CEO of Microsoft partner New Signature.  Chris explains his perspective working with customers on  why Office 365 offers top value for the dollar.  Also if you haven't already, please read how businesses of all sizes get value from using Office 365. Also, learn why Office 365 offers an enterprise-class experience.

Below is a round-up of these and other news items from the last couple weeks. Enjoy!

Microsoft Tops Apple as America's Most Inspiring Company; Google 7th, Amazon 8th. Americans rank Microsoft as the most-inspiring company.

Microsoft Customers Can Now Buy Go Daddy Domain Names Directly Within Office 365. Microsoft "has made its Office 365 software even more convenient for enterprises" by integrating it with web hosting company Go Daddy.

Durham University Moves into the Cloud with Office 365.  Durham University migrates the email of 16,000 students and staff to the cloud by deploying the Office 365 suite. Microsoft has made its Office 365 software even more convenient for enterprises by integrating it with Web hosting company Go Daddy.

Office Garage video series demonstrates the Office Mobile capabilities. The latest episode of Microsoft's Office Garage video series takes a look at Office on mobile devices.

SharePoint 2013 Adds Better In-Memory Analytics. Microsoft's business intelligence tools "have arrived squarely on the doorstep of serious big data analytics."

Microsoft Details Updated Mail App for Windows 8.1 with Outlook.com Integration. Microsoft optimizes the Mail app in Windows 8.1 with Outlook.com integration.

Microsoft Details SkyDrive's Smart Files Feature, Prepares To Roll Out Bing-Powered OCR Search. Microsoft announces that its optical character recognition (OCR) feature for searching through SkyDrive files will be rolling out over the coming weeks.


View the original article here

Cloud Services you can trust: Security, Compliance and Privacy in Office 365

AppId is over the quota
AppId is over the quota

 When you make a decision to place your trust in a cloud services provider for productivity services, security, compliance, and privacy are top of mind. With over a billion customers on Office and decades of experience running online services, we understand what it takes to earn and continue to maintain your trust and confidence in Office 365.

Our construct for security, compliance and privacy in Office 365 has two equally important dimensions - Built-in capabilities that include service-wide, technical capabilities, operational procedures and policies that are enabled by default for customers using the service and Customer controls that include features that enable you to customize the Office 365 environment based on the specific needs of your organization.

We will look at Built-in capabilities and Customer controls for each of the key pillars of trust - Security, Privacy and Compliance - in more detail below.

Security

Security of our customers' information is a key trust principle. We implement policies and controls to safeguard customer data in the cloud and provide unique customer controls that you can use to customize your organizational environment in Office 365.  

As an Office 365 customer, you will benefit directly from in-depth security features that we have built into the service as a result of experience gained from years of building enterprise-grade software, managing a number of online services and billions of dollars in security investments. We have implemented technologies and processes that are independently verified to ensure high security of customer data.

Some key aspects of our built-in security capabilities are:

Physical security - We monitor our data centers 24/7 and we have technologies and processes to protect our data centers from unauthorized access or natural disastersSecurity best practices -We use best practices in design like Secure Development Lifecycle and operations like defense-in-depth to keep your data secure in our data centersData encryption - Every customers' email content is encrypted at rest using BitLocker Advanced Encryption Standard (AES) encryptionSecure network layer - Our networks are segmented, providing physical separation of critical back-end servers from the public-facing interfaces at the same time our Edge router security detects intrusions and signs of vulnerabilityAutomated operations like Lock Box processes - Access to the IT systems that store customer data is strictly controlled via lock box processes. This access control mechanism is similar to a system where two people have to turn the key for an action to be allowed.

As a result of Office 365 offering productivity services to a wide range of industries, we have built both features and choices that you can control to enhance the security of data based on the needs of your organization. 

Some key aspects of our customer controls for security are:

Exchange Hosted Encryption - Enables delivery of confidential business communications safely, letting users send and receive encrypted email directly from their desktops as easily as regular email.S/MIME - Enables encryption of an email messages and allows for the originator to digitally sign the message to protect the integrity and origin of the message. As part of our continued investment in security technologies that Government and Security conscious customers care about, we are adding support for S/MIME for Office 365 in the first quarter of Calendar Year 2014.Rights Management Services - Enables a user to encrypt information using 128-bit AES and use policies on email or documents so that the content is appropriately used by specified people.Role based access control - Allows administrators to enable access to authorized users based on role assignment, role authorization and permission authorization.Exchange Online Protection - Allows administrators to manage your company's Anti-virus and Anti-spam settings from within the Office 365 administration console.Identity Management - Provides organizations with various options for identity management such as cloud based identity, identities mastered on-premises with secure token based authentication or hashed passwords to integrate into the Office 365 identity management system based on the security needs of your organization.Two factor Authentication - Enhances security in a multi-device, mobile, and cloud-centric world by using a second factor, such as a PIN, in addition to the primary factor which is identity.

Another key principle of Office 365 trust is Compliance.  It is expected that commercial organizations have regulations and policies that they must comply with to operate businesses in various industries. These policies can be a mix of external regulatory requirements that vary depending on industry and geographical location of the organization and internal company-based policies.  Office 365 provides built-in capabilities and customer controls to help customers meet both various industry regulations and internal compliance requirements.

Office 365 stays up-to-date with many of today's ever-evolving standards and regulations, giving customers greater confidence.  To bolster this and to continue earning your confidence, we undergo third-party audits by internationally recognized auditors as an independent validation that we comply with our policies and procedures for security, compliance and privacy.

Some key aspects of built-in compliance capabilities are:

Independently Verified - Third party audits verify that Office 365 meets many key world-class industry standards and certificationsControl framework - We follow a strategic approach of implementing extensive standard controls that in turn satisfy various industry regulations. Office 365 supports over 600 controls that enable us to meet complex standards and offer contracts to customers in regulated industries or geographies, like ISO 27001, the EU Model Clauses, HIPAA Business Associate Agreements, FISMA/FedRAMP Comprehensive Data Processing Agreement - Our Data Processing Agreement comprehensively addresses privacy and security of customer data, helping customers comply with local regulations

We provide Compliance controls within the service to help our customers comply based on the policy needs of their organization. 

Some key customer controls for compliance are:

Data Loss Prevention - Helps customers to identify, monitor and protect sensitive data through content analysisArchiving - Allows organizations to preserve electronically stored information retaining e-mail messages, calendar items, tasks, and other mailbox itemsE-Discovery - Permits customers to retrieve content from across Exchange Online, SharePoint Online, Lync Online, and even file shares

Privacy is our third trust principle.  As more and more customers are relying on online service providers to keep their data safe from loss, theft, or misuse by third parties, other customers, or even the provider's employees, we recognize that cloud services raise unique privacy questions for businesses.   

To meet your needs, we are continually developing technologies to enhance privacy in our services. We call this privacy by design - which is our commitment to use best practices to help protect and manage customer data. 

Key built-in capabilities and principles of Privacy in Office 365 are:

No Advertising - We do not scan email, documents, build analytics or data mine to build advertising products. In fact, we do not use your information for anything other than providing you services you have subscribed for.Data Portability - As an Office 365 customer, your data belongs to you, and you can export your data at any time with no restrictions. We act only as a data processor and provider of productivity services, not as a data owner Notice and Consent - When we act upon your data, we let you know why and we ask for permission in advance or redirect any enquiries to our customers unless legally prevented to do so.Breach Response - We have strong, tested and audited processes to inform you if there is a breach and remediate issues if they occur.Data Minimization - We strive to minimize the actual amount of customer data that our internal teams have access to.

In addition to built-in capabilities, Office 365 enables you to collaborate through the use of transparent policies and strong tools while providing the distinct ability to control information sharing.

Some examples of customer controls for privacy are:

Rights Management in Office 365 - Allows individuals and administrators to specify access permissions to documents, workbooks, and presentations. This helps you prevent sensitive information from being printed, forwarded, or copied by unauthorized people by applying intelligent policiesPrivacy controls for sites, libraries and folders- SharePoint Online, a key component service of Office 365 that provides collaboration functionality has a number of privacy controls. One example is that SharePoint Online sites are set to "private" by default. A second example is that a document uploaded to a SkyDrive Pro is not shared until the user provides explicit permissions and identifies who to share with.Privacy controls for communications - In Lync Online, another key component service that provides real time communications in Office 365, there are various administrator level controls as well as user level controls to enable or block communication with external users and organizations. One example is blocking access to federation in Lync. Similarly there are controls throughout the service for the admins and users to ensure privacy of their content and communications.

At Microsoft, we have been building Enterprise software for over two decades and we run over 200 online services. We bring all of this experience to Office 365 to give you industry leading capabilities in security, compliance and privacy. In addition, we take the advantage of scale and continuous feedback from providing services to a diverse customer base across industry and geography to constantly learn and improve the Office 365 services. Security, Compliance and Privacy are the key pillars of the Office 365 Trust Center (the other two pillars being Transparency and Service Continuity). Customers can have confidence that Microsoft is a thought leader and will continue to make deep investments to protect customers in the cloud.

Learn more about security, compliance, and trust in this weeks Garage Series: Explaining data security and your control in Office 365.

Learn more about recent compliance agreements with the announcement for the state of California and Microsoft signing the CJIS security policy agreement.

-- Vijay Kumar


View the original article here