Name/Id: ACF1860 / Microsoft Managed Control 1860 Category: Transparency Title: Privacy Notice - Public Notices for Changes Affecting PII Ownership: Customer, Microsoft Description: Revises its public notices to reflect changes in practice or policy that affect PII or changes in its activities that impact privacy, before or as soon as practicable after the change. Requirements: The Microsoft Privacy Statement (MPS), Online Services Terms (OST), and Data Protection Addendum (DPA) are reviewed by the Privacy Manager at least annually or when a significant change occurs, and updated as needed. All privacy language must also go through a CELA review to ensure that Microsoft adheres to all standards, guidelines, and applicable laws.
The following 1 compliance controls are associated with this Policy definition 'Microsoft Managed Control 1860 - Privacy Notice' (2234feec-08c6-4fc9-af78-df0dcc482efd)
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
Policies and procedures regarding the use of cryptography and, where appropriate, encryption
n/a
In order to safeguard the security of public electronic communications networks and publicly available electronic communications services, the use of encryption technologies, in particular end-to-end encryption as well as data-centric security concepts, such as cartography, segmentation, tagging, access policy and access management, and automated access decisions, should be promoted. Where necessary, the use of encryption, in particular end-to-end encryption should be mandatory for providers of public electronic communications networks or of publicly available electronic communications services in accordance with the principles of security and privacy by default and by design for the purposes of this Directive. The use of end-to-end encryption should be reconciled with the Member States’ powers to ensure the protection of their essential security interests and public security, and to allow for the prevention, investigation, detection and prosecution of criminal offences in accordance with Union law. However, this should not weaken end-to-end encryption, which is a critical technology for the effective protection of data and privacy and the security of communications.
32
No results
Initiatives usage
Rows: 1-1 / 1
Records:
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more