Browse by Tags

  • Blog Post: Protecting student privacy

    “No one shall be subjected to arbitrary interference with [his or her] privacy.” - The Universal Declaration of Human Rights , United Nations, 1948 New Zealand’s schools work hard to earn the trust of their communities. As part of the important work they do, schools need to collect...
  • Blog Post: Microsoft releases NZ privacy guide for Office 365

    New Zealand organisations are quickly deploying cloud computing. Low prices and convenience are appealing, but there are also important questions to ask around privacy, security, and data integrity. Waldo Kuipers, Corporate Affairs Manager at Microsoft NZ, says “Organisations know that trust...
  • Blog Post: Cloud computing standards

    With responsible adoption of cloud computing services at front of mind for many organisations and policy makers, it is timely to consider the global context and New Zealand's work to advance trustworthy computing. This article was originally published by Standards NZ in Touchstone Issue 48 - April 2013...
  • Blog Post: Innovate with Cloud Computing

    Businesses use technology to improve productivity. They need it to speed up innovation, and help with the basic needs to save money and get more done. Internet-based subscriptions make cloud computing a cheaper way for businesses to get computer technology working for them. Capital expenditure and...
  • Blog Post: Keeping Safe Online

    New Zealand’s first Cyber-Security Awareness Week is on now. It's been organised by NetSafe and the Government, with support from businesses including Microsoft and MSN New Zealand Ltd. It’s a time for everyone to work together to help all Kiwis be safer online. Unfortunately, criminals...
  • Blog Post: Ten years of Microsoft's Trustworthy Computing initiative

    In 2002, Bill Gates wrote an email to all Microsoft employees that made trustworthy computing – including security, privacy and reliability – the top priority for the company. Ten years on, Microsoft continues its dedication to these objectives, which we refer to as the Trustworthy Computing...
  • Blog Post: The technology behind managing digital identities

    This week Microsoft was pleased to have the opportunity to participate in the Digital Identity Conference 2012 on Managing Digital Identity in a Networked World , organised by the Victoria University of Wellington. There are many facets to the dialogue on digital identity. It is woven of philosophy...
  • Blog Post: Elements of trust for Internet privacy

    Most of us disclose a lot of private information on the Internet without really thinking about it. What we search for, the links we click, and our email can be very personal. In an ideal world, we would all read and understand the privacy statement of each company whose services we use. We would check...
  • Blog Post: Privacy Awareness Week 2012

    It’s Privacy Awareness Week in New Zealand from Sunday 29 April. Privacy on the Internet is something that a lot of people are interested in, but there are few simple explanations of the issues. In this article I’d like to explain a bit about how your activity on the Internet is tracked...
  • Blog Post: Using the Cloud for Good

    Cloud computing is not just being adopted by the business community in New Zealand but has also made a significant impact in not-for-profit organizations (NFP) across the country. Attendees of the Connecting Communities conference in Christchurch on 29 February 2012 learnt of several NFPs who have used...
  • Blog Post: Dialogue on privacy with Brendon Lynch

    This week Microsoft’s Chief Privacy Officer Brendon Lynch was home in New Zealand to discuss privacy. Originally from Paeroa but now based at Microsoft's global headquarters in Redmond, Brendon is part of Microsoft’s Trustworthy Computing initiative that was established by Bill Gates in 2002...
  • Blog Post: InternetNZ to host debate on NZ’s Digital Future

    On Tuesday, InternetNZ will host a debate about New Zealand's Digital Future . In parallel, InternetNZ has released a discussion document titled Future: Digital (PDF). Vikram Kumar explains, “Future: Digital is about the need for a shared, common vision for where New Zealand will be in 10 to...
  • Blog Post: Trustworthy Computing and Cloud Services

    Malicious attempts to infiltrate computer infrastructure have become more frequent and more sophisticated. When these attacks succeed, the consequences for the victims can be serious. Confidential information and personal information are at risk. In this environment, we hear that security is often...
  • Blog Post: Next Generation Smartphone Services and Consumer Privacy

    The rapid uptake of the next generation of smartphone hardware is providing the platform for new and innovative services. A modern smartphone ships with a complex array of sensors that are capable of pinpointing the phone's location, tracking the rate at which it is moving, and taking high quality digital...
  • Blog Post: Take Control of Your Privacy

    1 to 7 May 2011 is Privacy Awareness Week . It’s a great time to take a few moments to look at simple things we can all do to look out for our own personal privacy in our day to day computing. Your privacy matters, and if you want to stay in control, there may even be some new tricks to learn...
  • Blog Post: Windows 7 achieves Common Criteria security certification

    Microsoft endeavours to help make the computing environment as secure as possible. Part of this commitment to security involves thorough testing against widely-recognized security certification requirements. We are pleased to advise that Windows 7, Windows Server 2008 R2 and SQL Server 2008 SP2 32...
  • Blog Post: Enhancing privacy choices on the Internet

    As we browse the internet, we read, search, and click. This online behaviour has commercial value, so it is observed, recorded and linked across multiple websites to build behavioural profiles. There are usually no obvious visible signs of this tracking on the websites we visit, although the advertising...
  • Blog Post: The Need for Global Collective Defense on the Internet

    (Cross posted from Microsoft on the Issues ) For more than two decades, people have struggled to understand the cyber threat, evaluate the risks to individuals, organizations (including nation-states), and society at large, and craft appropriate responses. Although many organizations have invested significantly...
  • Blog Post: Microsoft's chief privacy officer on the challenge of e-identity

    New Zealander Brendon Lynch, Microsoft’s chief privacy officer was interviewed by V3.co.uk on the challenge of e-identity and online privacy issues. Lynch says privacy, as past failed startups have learned, is a tough sell to consumers, mostly because the required technology is often complicated...
Page 1 of 1 (19 items)