Browse by Tags

  • Blog Post: Protecting student privacy

    “No one shall be subjected to arbitrary interference with [his or her] privacy.” - The Universal Declaration of Human Rights , United Nations, 1948 New Zealand’s schools work hard to earn the trust of their communities. As part of the important work they do, schools need to collect...
  • Blog Post: Microsoft releases NZ privacy guide for Office 365

    New Zealand organisations are quickly deploying cloud computing. Low prices and convenience are appealing, but there are also important questions to ask around privacy, security, and data integrity. Waldo Kuipers, Corporate Affairs Manager at Microsoft NZ, says “Organisations know that trust...
  • Blog Post: Cloud computing standards

    With responsible adoption of cloud computing services at front of mind for many organisations and policy makers, it is timely to consider the global context and New Zealand's work to advance trustworthy computing. This article was originally published by Standards NZ in Touchstone Issue 48 - April 2013...
  • Blog Post: Ten years of Microsoft's Trustworthy Computing initiative

    In 2002, Bill Gates wrote an email to all Microsoft employees that made trustworthy computing – including security, privacy and reliability – the top priority for the company. Ten years on, Microsoft continues its dedication to these objectives, which we refer to as the Trustworthy Computing...
  • Blog Post: The technology behind managing digital identities

    This week Microsoft was pleased to have the opportunity to participate in the Digital Identity Conference 2012 on Managing Digital Identity in a Networked World , organised by the Victoria University of Wellington. There are many facets to the dialogue on digital identity. It is woven of philosophy...
  • Blog Post: The new and the old of cloud privacy

    Yesterday I was honoured to have an opportunity to speak briefly at the Privacy Commissioner's Privacy Forum, titled "Think Big? Privacy in the age of big data" . A question was put to a panel by Vikram Kumar from InternetNZ as follows: “There are many real privacy risks in relation to cloud...
  • Blog Post: Elements of trust for Internet privacy

    Most of us disclose a lot of private information on the Internet without really thinking about it. What we search for, the links we click, and our email can be very personal. In an ideal world, we would all read and understand the privacy statement of each company whose services we use. We would check...
  • Blog Post: InternetNZ to host debate on NZ’s Digital Future

    On Tuesday, InternetNZ will host a debate about New Zealand's Digital Future . In parallel, InternetNZ has released a discussion document titled Future: Digital (PDF). Vikram Kumar explains, “Future: Digital is about the need for a shared, common vision for where New Zealand will be in 10 to...
  • Blog Post: The Great NZICT Cloud Debate

    Last night NZICT Group and EMA hosted a feisty debate about cloud computing . The moot was, “Is the cloud all hot air or the biggest game changer we’ve ever seen?” The speakers were: Andrew Crabb (Head of Business and Government, TelstraClear), Doug Wilson (CIO, Automobile...
  • Blog Post: Trustworthy Computing and Cloud Services

    Malicious attempts to infiltrate computer infrastructure have become more frequent and more sophisticated. When these attacks succeed, the consequences for the victims can be serious. Confidential information and personal information are at risk. In this environment, we hear that security is often...
  • Blog Post: With compliments from Microsoft

    Updated July 2012. A PDF version is provided at the bottom of this blog post for printing. Microsoft offers a number of services free of charge to help people live and work a little smarter. Here’s a quick overview of technology to make life a little simpler and more fun. More than a million...
  • Blog Post: Take Control of Your Privacy

    1 to 7 May 2011 is Privacy Awareness Week . It’s a great time to take a few moments to look at simple things we can all do to look out for our own personal privacy in our day to day computing. Your privacy matters, and if you want to stay in control, there may even be some new tricks to learn...
Page 1 of 1 (12 items)