Risk
1/24/2013
12:53 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Finds People Want More Privacy Control

Almost half of U.S. adults feel they can't control how online companies collect personal information.

The purpose of Data Privacy Day, to be observed on Monday, January 28, is to empower individuals to protect their privacy and to control their digital footprint. Five years into this particular observance, there's still much work to be done.

About 45% of 1,000 U.S. adults surveyed on behalf of Microsoft by Ipsos Public Affairs believe they have little or no control over the personal information companies gather about them while using online services.

Yet almost as many, about 40%, believe they totally or mostly understand how to protect their privacy online. Approximately the same percentage says they rely on friends, family and privacy statements as their primary sources of privacy information. About a third of respondents say they pay close attention to companies' privacy reputations when choosing online services.

[ Google is getting more requests for information from the government. Read more at Google Sees Growing Government Demand For User Data. ]

Brendon Lynch, chief privacy officer at Microsoft, said in an interview that while most of those concerned about privacy probably aren't reading privacy policies line by line, they are paying attention and companies can't afford to ignore such concerns. "It's incumbent for organizations to be good stewards of the data and to really be more transparent and to provide people with more information about how they can protect themselves," said Lynch.

Privacy has been a part of Microsoft's Trustworthy Computing initiative for over a decade. But it has become particularly important in the age of mobile social computing. As Google's services have begun to destabilize the foundations of Microsoft's desktop empire and businesses have begun to be seduced by the promise of "big data," Microsoft has been looking to privacy as a key point of differentiation.

"The way that we've been thinking about privacy increasingly is it's a feature, when you're producing software and services and devices," Lynch said. "We're viewing privacy as a way to better understand what our customers want and what they think and then deliver against that need."

To give customers more control over their online data, Microsoft has developed services like its Personal Data Dashboard and has implemented Web browsing features like Do Not Track, despite lack of industry consensus.

Some people see privacy as an all-or-nothing proposition. Lynch argues that privacy is better defined as a set of choices. He believes that privacy can coexist with services that encourage people to share information.

"There's this potential definition of privacy which is binary, which is more akin to secrecy," he said. "But it's really evolved. ...It's not so much about secrecy anymore as it is about control. So yes, people want to share information, but they want to share information [selectively]. What our research showed us is there's still a significant portion of the population that doesn't feel in control ... and they're looking to learn more about how they can be in more control about their privacy."

Privacy has never worked very well as a business. Like security, it tends to something people become interested in after it's too late. Rewind a decade and you'll find the ruins of several dot-com boom startups that failed to sell privacy as a service.

Control, on the other hand, might just sell. But it will be hard to convince people they have control when terms of service documents enforce one-sided contracts, governments can get online data on demand, and cyber criminals can bypass many security measures.

Offensive cybersecurity is a tempting prospect. It's also way too early to go there. Here's what to do instead. Also in the new, all-digital Nuclear Option issue of InformationWeek: Military agencies worldwide are figuring out the tactics and capabilities that will be critical in any future cyber war. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
1/24/2013 | 7:32:40 PM
re: Microsoft Finds People Want More Privacy Control
I'm surprised this stat on perceived lack of control isn't more like 85% rather than 45%. How many times do you find yourself unsubscribing from email sources that you never solicited. How many times do you see banners and other ads for the types of products you've recently searched?

Ten years ago your purchase habits would steer direct mail offers a few weeks or months after you made a significant purchase. Today even casual browsing can mold your Web experience within hours. That doesn't really scare me, but I certainly don't feel as if I have any control over the use of data about my online behavior.
Tom Claburn
50%
50%
Tom Claburn,
User Rank: Apprentice
1/25/2013 | 1:51:26 PM
re: Microsoft Finds People Want More Privacy Control
Agreed. I suspect that many of those who believe they have control over their personal information are fooling themselves.
John doe
50%
50%
John doe,
User Rank: Apprentice
1/25/2013 | 3:10:42 AM
re: Microsoft Finds People Want More Privacy Control
Im surprised Microsoft found anyone with that garbage OS that is Windows 8
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5619
Published: 2014-09-29
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.

CVE-2012-5621
Published: 2014-09-29
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.

CVE-2012-6107
Published: 2014-09-29
Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-6110
Published: 2014-09-29
bcron-exec in bcron before 0.10 does not close file descriptors associated with temporary files when running a cron job, which allows local users to modify job files and send spam messages by accessing an open file descriptor.

CVE-2013-1874
Published: 2014-09-29
Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, weíll take a close look at some of the latest research and practices in application security.