12:53 PM
Connect Directly

Microsoft Finds People Want More Privacy Control

Almost half of U.S. adults feel they can't control how online companies collect personal information.

The purpose of Data Privacy Day, to be observed on Monday, January 28, is to empower individuals to protect their privacy and to control their digital footprint. Five years into this particular observance, there's still much work to be done.

About 45% of 1,000 U.S. adults surveyed on behalf of Microsoft by Ipsos Public Affairs believe they have little or no control over the personal information companies gather about them while using online services.

Yet almost as many, about 40%, believe they totally or mostly understand how to protect their privacy online. Approximately the same percentage says they rely on friends, family and privacy statements as their primary sources of privacy information. About a third of respondents say they pay close attention to companies' privacy reputations when choosing online services.

[ Google is getting more requests for information from the government. Read more at Google Sees Growing Government Demand For User Data. ]

Brendon Lynch, chief privacy officer at Microsoft, said in an interview that while most of those concerned about privacy probably aren't reading privacy policies line by line, they are paying attention and companies can't afford to ignore such concerns. "It's incumbent for organizations to be good stewards of the data and to really be more transparent and to provide people with more information about how they can protect themselves," said Lynch.

Privacy has been a part of Microsoft's Trustworthy Computing initiative for over a decade. But it has become particularly important in the age of mobile social computing. As Google's services have begun to destabilize the foundations of Microsoft's desktop empire and businesses have begun to be seduced by the promise of "big data," Microsoft has been looking to privacy as a key point of differentiation.

"The way that we've been thinking about privacy increasingly is it's a feature, when you're producing software and services and devices," Lynch said. "We're viewing privacy as a way to better understand what our customers want and what they think and then deliver against that need."

To give customers more control over their online data, Microsoft has developed services like its Personal Data Dashboard and has implemented Web browsing features like Do Not Track, despite lack of industry consensus.

Some people see privacy as an all-or-nothing proposition. Lynch argues that privacy is better defined as a set of choices. He believes that privacy can coexist with services that encourage people to share information.

"There's this potential definition of privacy which is binary, which is more akin to secrecy," he said. "But it's really evolved. ...It's not so much about secrecy anymore as it is about control. So yes, people want to share information, but they want to share information [selectively]. What our research showed us is there's still a significant portion of the population that doesn't feel in control ... and they're looking to learn more about how they can be in more control about their privacy."

Privacy has never worked very well as a business. Like security, it tends to something people become interested in after it's too late. Rewind a decade and you'll find the ruins of several dot-com boom startups that failed to sell privacy as a service.

Control, on the other hand, might just sell. But it will be hard to convince people they have control when terms of service documents enforce one-sided contracts, governments can get online data on demand, and cyber criminals can bypass many security measures.

Offensive cybersecurity is a tempting prospect. It's also way too early to go there. Here's what to do instead. Also in the new, all-digital Nuclear Option issue of InformationWeek: Military agencies worldwide are figuring out the tactics and capabilities that will be critical in any future cyber war. (Free registration required.)

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
D. Henschen
D. Henschen,
User Rank: Apprentice
1/24/2013 | 7:32:40 PM
re: Microsoft Finds People Want More Privacy Control
I'm surprised this stat on perceived lack of control isn't more like 85% rather than 45%. How many times do you find yourself unsubscribing from email sources that you never solicited. How many times do you see banners and other ads for the types of products you've recently searched?

Ten years ago your purchase habits would steer direct mail offers a few weeks or months after you made a significant purchase. Today even casual browsing can mold your Web experience within hours. That doesn't really scare me, but I certainly don't feel as if I have any control over the use of data about my online behavior.
Tom Claburn
Tom Claburn,
User Rank: Apprentice
1/25/2013 | 1:51:26 PM
re: Microsoft Finds People Want More Privacy Control
Agreed. I suspect that many of those who believe they have control over their personal information are fooling themselves.
John doe
John doe,
User Rank: Apprentice
1/25/2013 | 3:10:42 AM
re: Microsoft Finds People Want More Privacy Control
Im surprised Microsoft found anyone with that garbage OS that is Windows 8
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio