Cloud computing is a top of mind issue for many customers, and privacy issues are among some of our customers biggest concerns. Protecting privacy is part of Microsoft’s long-term commitment to Trustworthy Computing, and we strive to build privacy protections into all of our products and services.
Cloud computing raises important considerations for organizations about how they manage information and interact with cloud service providers. In the traditional information technology model, an organization is accountable for all aspects of data protection, from how it uses personal information to how it stores and protects data stored on its own computers. Cloud computing differs because information can flow offsite to data centers owned and managed by cloud providers. Defining the allocation of responsibilities and obligations for security and privacy between cloud customers and cloud providers—and creating sufficient transparency about the allocation—is a new challenge.
In this episode of the Trustworthy Computing Cloud Fundamentals Video Series, I discuss the importance of privacy in the cloud with Brendon Lynch, Microsoft’s Chief Privacy Officer. Brendon explains the three tenets of Microsoft’s approach to cloud computing privacy: responsibility, transparency, and choice.
If you haven’t seen the other videos in this series, you can check them out below:
Cloud Fundamentals Video Series
- Introducing the Cloud Fundamentals Video Series
- Cloud Computing & Business Agility
- Cloud Computing Requires Transparency
- Cloud Transparency as an Element of Trust
- The Benefits of Industry Collaboration to Cloud Computing Security
- Benchmarks and Evaluation Standards for Cloud Computing Security
- Evaluating Different Cloud Service Offerings by Comparing Security Controls
- E-discovery in the Cloud
- Compliance in the Cloud
Please check back on this blog regularly as we continue the Cloud Fundamentals Video Series and explore topics that are important for IT professionals and business decision makers who are interested in cloud security, privacy, and reliability.