Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (2024)

We understand that when you use our cloud services, you’re entrusting us with one of your most valuable assets—your data.

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (1)

At Microsoft, we value, protect, and defend data privacy. We believe in transparency, so that people and organizations can control their data and have meaningful choices in how it's used. We empower and defend the data privacy choices of every person who uses our products and services.

Learn about Compliance with the EU transfer Requirements

You control your data

Our time-tested approach to data privacy is grounded in our commitment to give you control over thedata you put in the cloud. In other words, you control your data. Microsoft guarantees this with the contractual commitments we make to you.

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (2)

Your data belongs to you

Your data is your business, and you may access, modify, or delete it at any time. Microsoft will not use your data without your agreement, and when we have your agreement, we will use your data to provide only the services you have chosen.

Learn more

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (3)

Stay protected by privacy laws

Your control over your data is reinforced by Microsoft compliance with broadly applicable privacy laws, such as GDPR and privacy standards. These include the world’s first international code of practice for cloud privacy, ISO/IEC 27018.

Learn more about GDPR Learn more about ISO/IEC 27018

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (4)

Independent audit reports

You have access to independent audit reports of our compliance with privacy standards. These audit reports also help you meet your own privacy obligations.

Learn more about independent audit reports

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (5)

Data processing only with consent

We only process your data based on your agreement and in accordance with the strict policies and procedures that we have contractually agreed to. We don’t share your data with advertiser-supported services or mine it for any purposes, such as marketing research or advertising.

Learn about Microsoft Product Terms

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (6)

Data restrictions for subcontractors

Subcontractors or subprocessors deployed by Microsoft to perform work that requires access to your data can perform only the functions they were hired to provide. They’re bound by the same contractual privacy commitments that Microsoft makes to you. The Microsoft Online Services Subprocessor List identifies authorized subprocessors who have been audited in advance against a stringent set of security and privacy requirements.

Learn about subprocessor list notifications

Know where your data is located and how it’s used

When you use Microsoft commercial cloud services, we’ll help you choose the service and data location that’s right for your business.

Learn more

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (7)

Choose a datacenter

Use the tools and options available with Microsoft online services such as Microsoft Azure, Microsoft Dynamics 365 and Power Platform, and Microsoft 365 to determine where you want to store your data.

Learn more about Microsoft Azure Learn more about Microsoft Dynamics 365 and Power Platform

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (8)

Choose where your data resides

Microsoft offers data residency around the world, helping to ensure that resiliency and compliance requirements can be honored within geographic boundaries. We back these capabilities with contractual commitments and transparency regarding how we store and process your data.

Learn more about Microsoft 365 services

We secure your data at rest and in transit

With advanced encryption, Microsoft helps protect your data both at rest and in transit. Our encryption protocols erect barriers against unauthorized access to the data, including two or more independent encryption layers to safeguard against compromises of any one layer.

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (9)

Data at rest

The Microsoft Cloud employs a wide range of encryption capabilities up to AES-256, giving you the flexibility to choose the solution that’s best for your business.

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (10)

Data in transit

Microsoft uses and enables the use of industry-standard encrypted transport protocols, such as Transport Layer Security (TLS) and Internet Protocol Security (IPsec).

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (11)

Encryption keys

All Microsoft-managed encryption keys are properly secured and offer the use of technologies such as Azure Key Vault to help you control access to passwords, encryption keys, and other secrets.

We defend your data

Microsoft defends your data through clearly defined and well-established response policies and processes, strong contractual commitments, and if necessary, the courts. We believe all government requests for your data should be addressed to you. We don’t give any government direct or unfettered access to customer data.

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (12)

How we respond to data requests

We will not disclose data to a government or law enforcement agency, except as you direct or where required by law. Microsoft scrutinizes all government demands to ensure they are legally valid and appropriate.

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (13)

How we handle law enforcement requests

If Microsoft receives a request for your data, we will promptly notify you and provide a copy of the request unless legally prohibited from doing so. Moreover, we will direct the requesting party to seek the data directly from you.

Learn more

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (14)

Our contractual commitments

Our contractual commitments to our enterprise and public sector customers include defending your data, which builds on our existing protections. We will challenge every government request for commercial and public sector customer data where we can lawfully do so. We have a proven track record of successfully challenging government demands in the courts when those demands are inconsistent with the rule of law, and we are transparent about the number of US national security orders we receive.

Learn more about how far we’ll go Learn more about US national security orders received

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (15)

GDPR compliance

We stand behind the strength of our GDPR compliance and other data protection safeguards. To provide added reassurance against liability for our commercial and public sector customers, we will provide monetary compensation if we disclose their data in response to a government request in violation of the EU’s GDPR.

Learn more

Our promise to you

We are transparent about the specific policies, operational practices, and technologies that help ensure the privacy of your data in every Microsoft commercial cloud service.

And we don’t just state these promises—we guarantee them in our standard contracts for commercial and public sector customers.

Microsoft Product Terms Microsoft Data Protection Addendum

Follow Microsoft

Data Protection with Microsoft Privacy Principles | Microsoft Trust Center (2024)

FAQs

How to review trust center settings in Access? ›

Click File > Options. In the left pane of the Access Options dialog box, click Trust Center. In the right pane, under Microsoft Office Access Trust Center, click Trust Center Settings.

What is the Microsoft Trust Center? ›

The Trust Center is where you can find security and privacy settings for Microsoft Office programs. With the consistent appearance of the ribbon in Office programs, steps to find the Trust Center are the same for each program.

Where is the trust center dialog in Excel? ›

You can find trust center by opening an office application and going to file>options. There is a tab for trust center and then there is a button for "trust center settings". What message is it giving you when trying to save the document?

What are the six principles of Microsoft's approach to privacy? ›

Microsoft provides its customers with access to and details of its privacy principles. There are six privacy principles that Microsoft focuses on, and they are control, transparency, security, strong legal protection, no content-based targeting, and benefits to you.

How do I Access File block settings in trust center? ›

You can edit the Trust Center settings by doing the following:
  1. Open Microsoft® Word.
  2. Click File.
  3. Click Options.
  4. Click Trust Center.
  5. Click Trust Center Settings.
  6. Click File Block Settings.
  7. Select any file types that you want to block from opening. ...
  8. Click OK twice to get out of the options screen.

What is the purpose of the Trust Center? ›

A Trust Center is a powerful resource for your teams and for your buyers seeking to understand your security posture. With the information and resources provided by a Trust Center, you can protect sensitive data while simultaneously increasing information visibility, building long-term customer trust.

How does Microsoft protect your data? ›

Microsoft defends your data through clearly defined and well-established response policies and processes, strong contractual commitments, and if necessary, the courts. We believe all government requests for your data should be addressed to you.

Does Microsoft have access to my data? ›

Limiting access to your data by Microsoft personnel

Microsoft engineers don't have default access to cloud customer data. Instead, they are granted access, under management oversight, only when necessary.

What does enable trust center logging? ›

Microsoft Office products can log macro execution attempts (both successful and failures) by enabling the Trust Center logging feature. This provides valuable information for incident response and digital forensics activities.

How do I reset the Trust Center in Excel? ›

What you should know about trusted documents in Excel
  1. Click File > Options.
  2. On the left side, select Trust Center, and then click Trust Center Settings.
  3. In the Trust Center dialog box, select Trusted Documents on the left.
  4. Click Clear, and then click OK.
Mar 28, 2023

How do I share an Excel File with trust center? ›

Click "File." Click "Excel Options." Click "Trust Center Settings" and navigate to the "Privacy Options" category. If "Remove personal information from the file properties on save" is checked, uncheck it and try sharing the workbook again.

What is the privacy principle of Microsoft? ›

Microsoft believes privacy is a fundamental human right. We are committed to providing you with products, information, and controls that allow you to choose how data is collected and used.

What are the 4 pillars of Microsoft security? ›

Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks.

What are the 5 pillars of Microsoft? ›

It applies the existing Microsoft Azure Well-Architected Framework principles to Microsoft Cloud for industry solutions, which consist of the following five pillars of architecture excellence:
  • Reliability.
  • Security.
  • Cost optimization.
  • Operational excellence.
  • Performance efficiency.
Mar 5, 2024

How do I change my macro settings in trust center? ›

Change macro settings in the Trust Center
  1. Select the File tab and choose Options.
  2. Select Trust Center, and then choose Trust Center Settings.
  3. In the Trust Center, select Macro Settings. ...
  4. Make the selections that you want, then select OK.

How do I Access trusted sites? ›

Windows Control Panel> Internet Options > Security Tab > Trusted Site > Then add the Site in Trusted.

How do I allow trusted places on my network? ›

"Allow Trusted Locations on the network" policy

By default, Trusted Locations on network locations are disabled. But users can change this by going to File > Options > Trust Center > Trust Center Settings... > Trusted Locations and selecting the Allow Trusted Locations on my network (not recommended) checkbox.

What is trust based Access control? ›

Trust based access control provides security from. unauthorized access and various security threats, e.g., multi- tenancy cloud platform, DoS, insecure interfaces & API, malicious. attacker, abuse of cloud services, data loss, etc. The traditional.

Top Articles
Latest Posts
Article information

Author: Kareem Mueller DO

Last Updated:

Views: 5869

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Kareem Mueller DO

Birthday: 1997-01-04

Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

Phone: +16704982844747

Job: Corporate Administration Planner

Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.