Risk
1/24/2013
12:53 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Microsoft Finds People Want More Privacy Control

Almost half of U.S. adults feel they can't control how online companies collect personal information.

The purpose of Data Privacy Day, to be observed on Monday, January 28, is to empower individuals to protect their privacy and to control their digital footprint. Five years into this particular observance, there's still much work to be done.

About 45% of 1,000 U.S. adults surveyed on behalf of Microsoft by Ipsos Public Affairs believe they have little or no control over the personal information companies gather about them while using online services.

Yet almost as many, about 40%, believe they totally or mostly understand how to protect their privacy online. Approximately the same percentage says they rely on friends, family and privacy statements as their primary sources of privacy information. About a third of respondents say they pay close attention to companies' privacy reputations when choosing online services.

[ Google is getting more requests for information from the government. Read more at Google Sees Growing Government Demand For User Data. ]

Brendon Lynch, chief privacy officer at Microsoft, said in an interview that while most of those concerned about privacy probably aren't reading privacy policies line by line, they are paying attention and companies can't afford to ignore such concerns. "It's incumbent for organizations to be good stewards of the data and to really be more transparent and to provide people with more information about how they can protect themselves," said Lynch.

Privacy has been a part of Microsoft's Trustworthy Computing initiative for over a decade. But it has become particularly important in the age of mobile social computing. As Google's services have begun to destabilize the foundations of Microsoft's desktop empire and businesses have begun to be seduced by the promise of "big data," Microsoft has been looking to privacy as a key point of differentiation.

"The way that we've been thinking about privacy increasingly is it's a feature, when you're producing software and services and devices," Lynch said. "We're viewing privacy as a way to better understand what our customers want and what they think and then deliver against that need."

To give customers more control over their online data, Microsoft has developed services like its Personal Data Dashboard and has implemented Web browsing features like Do Not Track, despite lack of industry consensus.

Some people see privacy as an all-or-nothing proposition. Lynch argues that privacy is better defined as a set of choices. He believes that privacy can coexist with services that encourage people to share information.

"There's this potential definition of privacy which is binary, which is more akin to secrecy," he said. "But it's really evolved. ...It's not so much about secrecy anymore as it is about control. So yes, people want to share information, but they want to share information [selectively]. What our research showed us is there's still a significant portion of the population that doesn't feel in control ... and they're looking to learn more about how they can be in more control about their privacy."

Privacy has never worked very well as a business. Like security, it tends to something people become interested in after it's too late. Rewind a decade and you'll find the ruins of several dot-com boom startups that failed to sell privacy as a service.

Control, on the other hand, might just sell. But it will be hard to convince people they have control when terms of service documents enforce one-sided contracts, governments can get online data on demand, and cyber criminals can bypass many security measures.

Offensive cybersecurity is a tempting prospect. It's also way too early to go there. Here's what to do instead. Also in the new, all-digital Nuclear Option issue of InformationWeek: Military agencies worldwide are figuring out the tactics and capabilities that will be critical in any future cyber war. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Tom Claburn
50%
50%
Tom Claburn,
User Rank: Apprentice
1/25/2013 | 1:51:26 PM
re: Microsoft Finds People Want More Privacy Control
Agreed. I suspect that many of those who believe they have control over their personal information are fooling themselves.
John doe
50%
50%
John doe,
User Rank: Apprentice
1/25/2013 | 3:10:42 AM
re: Microsoft Finds People Want More Privacy Control
Im surprised Microsoft found anyone with that garbage OS that is Windows 8
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
1/24/2013 | 7:32:40 PM
re: Microsoft Finds People Want More Privacy Control
I'm surprised this stat on perceived lack of control isn't more like 85% rather than 45%. How many times do you find yourself unsubscribing from email sources that you never solicited. How many times do you see banners and other ads for the types of products you've recently searched?

Ten years ago your purchase habits would steer direct mail offers a few weeks or months after you made a significant purchase. Today even casual browsing can mold your Web experience within hours. That doesn't really scare me, but I certainly don't feel as if I have any control over the use of data about my online behavior.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.