SlideShare une entreprise Scribd logo
1  sur  48
M365 GURGAON
@M365Gurgaon
ManagePersonaland
confidentialdatainM365
Sébastien Paulet, Microsoft MVP, Aerow CTO
@SP_twit sebpaulet
Brought to you by
#M365Gurgaon
Powered by Microsoft 365 and Power Platform India User Group
M365 GURGAON
Disclaimer
- Check all information relatated to regulation with your local legal
council
- Microsoft license information are my understanding and may evolve.
Always check with your Microsoft licensing contact.
Powered by Microsoft 365 and Power Platform India User Group
Source IBM and Ponemon Institute's annual
"Cost of a Data Breach" report
“Companies that had security automation
technologies deployed experienced around half
the cost of a breach”
Data breach cost
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Increasing security attacks
Ransomware attacks in India increased 200%
quarter-on-quarter in April-June with 4 lakh
new cases detected during the period
Between the hammer and the anvil
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Increasing data regulation (ex : GDPR)
British Airways –$242 million
Over 330 fines for GDPR between January and August 2020
The total amount of fines issued in 2020 exceeds $181 million
SENSITIVE AND PERSONAL DATA
2018; 2019 – PDPB Personal Data Protection Bill
Applies to all Indian citizen / companies
Gov can access data
Fine: Failing to notify breach : Rs 5 crore / 2% global turnover
Unlawful data transfers : Rs 15 crore / 4% global turnover
+ criminal penalties
2018 – GDPR General Data Protection Regulation
Applies to all european citizen personal data
Restriction on data location
Fine: 20M€/4% consolidated worldwide revenue
2020 - CCPA California Consumer Privacy Act
Personnal data of californian residents
750$ / californian resident impacted + 7,5K$/violation
Sensitive data breach cost
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
“means data about or relating to a natural person who is directly or indirectly identifiable, having
regard to any characteristic, trait, attribute or any other feature of the identity of such natural person,
whether online or offline, or any combination of such features with any other information, and shall
include any inference drawn from such data for the purpose of profiling […]“ - PDPB
Samples (according GDPR) :
Name
ID / UID
Email
Location
Banking/financial data
IP address
Political, religious, caste, ethnical data, sexual orientation
Physical, medical, genetical data
Personnal data
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
CLOUD - MICROSOFT AS DATA SUBCONTRACTOR
Responsability
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Content sources in O365
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
SHAREPOINT
Teams
OneDrive
Yammer
Office 365 Groups
Planner
EXCHANGE
COMPANIES OBLIGATIONS
a) Prohibition of processing of personal data.
b) Limitation on purpose of processing of personal data.
c) Limitation on collection of personal data.
d) Requirement of notice for collection or processing of personal
data.
e) Quality of personal data processed.
f) Restriction on retention of personal data.
g) Accountability of data fiduciary.
h) Consent necessary for processing of personal data
Obligations (according to PDPB)
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING
OF PERSONAL DATA.
CONSENT NECESSARY FOR PROCESSING OF PERSONAL DATA
(1) The personal data shall not be processed, except on the consent given by the data
principal at the commencement of its processing.
(2) The consent of the data principal shall not be valid, unless such consent is—
(a) free, having regard to whether it complies with the standard specified
undersection 14 of the Indian Contract Act, 1872;
(b) informed, having regard to whether the data principal has been
provided with the information required under section 7;
(c) specific, having regard to whether the data principal can determine the scope
of consent in respect of the purpose of processing;
(d) clear, having regard to whether it is indicated through an affirmative action
that is meaningful in a given context; and
(e) capable of being withdrawn, having regard to whether the ease of such
withdrawal is comparable to the ease with which consent may be given
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Disclaimer on first login
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Azure AD P1 required
Disclaimer on first login (how to)
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Azure AD P1 required
QUALITY OF PERSONAL DATA PROCESSED.
(1) The data fiduciary shall take necessary steps to ensure that the personal data
processed is complete, accurate, not misleading and updated, having regard to the
purpose for which it is processed.
(2) While taking any steps under sub-section (1), the data fiduciary shall have regard to
whether the personal data—
(a) is likely to be used to make a decision about the data principal;
(b) is likely to be disclosed to other individuals or entities including other data
fiduciaries or processors; or
(c) is kept in a form that distinguishes personal data based on facts from personal data
based on opinions or personal assessments.
(3) Where personal data is disclosed to any other individual or entity, including other data
fiduciary or processor, and the data fiduciary finds that such data does not comply with
the requirement of sub-section (1), the data fiduciary shall take reasonable steps to
notify such individual or entity of this fact.
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Define global sensitivity levels at tenant scale
End user can manually tag content as sensitive
Available in Outlook, SharePoint, Teams, OWA and M365 Apps for Business
Sensitivity Labels
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Information Protection
O365 (O365 E3) required
Encrypt files
-> no way to read it for unallowed / non
authenticated users
Restricted permissions
-> can block copy/paste, print, screenshot, email
forward, and so on
Watermarking
-> beware limitations
Disable USB key copy / attached file in non O365
services
-> WIP (Windows Information Protection) and
Intune required
Sensitivity Labels - Actions
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Information Protection
O365 (O365 E3) required
WIP and Intune required
(EMS E3) required
Permissions are bound to the file
• Public/private key system
Files encrypted by RSA 2048 bits, and
signed with SHA-256
• Read https://docs.microsoft.com/en-
us/information-protection/understand-
explore/how-does-it-work
Based on RMS – Right Management System
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go to « Compliance » section
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center, go to « Solutions »
> « Information Protection »
In labels page, go to « Labels » > « Create a label »
Sensitivity Labels – How to create
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go to « Compliance » section
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center, go to « Solutions »
> « Information Protection »
In labels page, go to « Labels Policies» > « Publish label »
Sensitivity Labels – How to publish
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
1- Can be done while end user types (set up at label
creation)
2- Or when uploading content (based on keyword or
RegEx):
As tenant global admin, go to « Compliance » section
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center, go to « Solutions »
> « Information Protection »
In labels page, go to « Automatically apply »
> « Create application policy »
Sensitivity Labels – Automatically apply
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Rules based classification
O365 (O365 E5) required
Or based on Machine Learning (preview)
Use existing trained criterias or create your own
(50 to 500 contents to learn, up to 10,000 to test).
As tenant global admin, go to « Compliance » portal
(https://compliance.microsoft.com/ )
> « Data classification»
Sensitivity Labels – Automatically apply
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
ML based classification O365
(M365 E5 Compliance) required
ACCOUNTABILITY OF DATA FIDUCIARY.
(1) The data fiduciary shall be responsible for complying with the provisions of this Act in
respect of any processing undertaken by it or on its behalf
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
If you don’t have have EMS / AAD Premium, at least, enable MFA on admin and users
accounts
(1) Something you know (typically a password)
(2) Something you have (a trusted device that is not easily duplicated, like a phone)
(3) Something you are (biometrics)
MFA
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Enable audit logs in Office 365 (in Compliance center) and Azure AD
Audit logs are kept 90 days max (up to 365 days for “O365 E5” users)
As tenant global admin, go to « Compliance » portal
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center,
go to « Solutions »
> « Audit »
Audit logs
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Enterprise Mobility + Security
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Enterprise Mobility + Security
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
• Azure Active Directory Premium
• Azure MFA
• Azure Advanced Protection
• Microsoft Cloud App Security
• Azure Information Protection Premium
• Azure Right Management Premium
• Intune
RESTRICTION ON RETENTION OF PERSONAL DATA.
(1) The data fiduciary shall not retain any personal data beyond the period necessary to
satisfy the purpose for which it is processed and shall delete the personal data at the
end of the processing.
(2) Notwithstanding anything contained in sub-section (1), the personal data may be
retained for a longer period if explicitly consented to by the data principal, or
necessary to comply with any obligation under any law for the time being in force.
(3) The data fiduciary shall undertake periodic review to determine whether it is
necessary to retain the personal data in its possession.
(4) Where it is not necessary for personal data to be retained by the data fiduciary under
sub-section (1) or sub-section (2), then, such personal data shall be deleted in such
manner as may be specified by regulations
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Retention labels
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
End user can manually apply one retention label per
file or email
A retention formula is attached to the retention label
ex : Last modification + 7Y
Retention labels can also be
set up by default per:
- Exchange folder
- SharePoint document library
Retention Policy (O365 E3)
required
Retention labels – How to create
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go « Compliance » portal
In compliance center, go to « Classification » > « Solutions » > Records Management
On RM page, go to « File Plan » > « Create a label »
Retention labels – How to publish
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go « Compliance » portal
In compliance center, go to « Classification » > « Solutions » > Records Management
On RM page, go to « Label policies» > « Publish label »
REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING
OF PERSONAL DATA
(1) Every data fiduciary shall give to the data principal a notice, at the time of
collection of the personal data, or if the data is not collected from the data principal, as
soonas reasonably practicable, containing the following information, namely:—
(a) the purposes for which the personal data is to be processed;
(b) the nature and categories of personal data being collected;
(c) the identity and contact details of the data fiduciary and the contact details of
the data protection officer, if applicable;
(d) the right of the data principal to withdraw his consent, and the procedure for
such withdrawal, if the personal data is intended to be processed on the
basis of consent;
[…]
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Search across all
Mailboxes
SharePoint
Teams
OneDrive
Based on
Content
Metadata
Labels
Export results as a .zip
DSR – Data Subject Request
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
DATA LOCATION
By default, all in a single region
ANNOUNCED : Yammer
and search indexs
also geo located.
ANNOUNCED : Availability zone
in Central India in 2021
Location
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Multi geo capability
(500 users min. 2$/users/month)
Tenant administration > Settings > Organization profile
Where is my data?
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
PS> Connect-MsolService
PS> (Get-MsolCompanyInformation).AuthorizedServiceInstances
https://docs.microsoft.com/en-us/microsoft-365/enterprise/o365-data-
locations?view=o365-worldwide#india
Where is my data?
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
https://www.microsoft.com/en-us/trust-center/compliance/
Various norms including Indian ones
• RBI (Banking)
• IRDAI (Insurance)
• MeitY (gov guidelines)
External audits
Can get audit documents
Norms compliance leader
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Patriot Act -> FBI, CIA, NSA, Army
SCA -> Justice
Can apply out of US territory
Microsoft challenged DoJ on extra SCA territoriality SCA
(Stored Communication Act) until USA Supreme Court
(cf. Cloud Act later)
Patriot Act / SCA
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
On US attorney request (ex: corruption,
business with country under US embargo)
Apply out of US territory
In case of executive agreement, opposition can
done under 14 days if :
Non USA citizen
AND goes against local law
Cloud Act
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
See O365 general conditions
“If compelled to disclose Customer Data or Personal
Data to law enforcement, Microsoft will promptly notify
Customer and provide a copy of the demand unless
legally prohibited from doing so.”
Law enforcement requests
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Questions?
Microsoft 365 and Power
Platform India User Group

Contenu connexe

Tendances

Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 

Tendances (20)

Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
Protéger ses données, identités & appareils avec Windows 10
Protéger ses données, identités & appareils avec Windows 10Protéger ses données, identités & appareils avec Windows 10
Protéger ses données, identités & appareils avec Windows 10
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonHistory of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
 
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
 
TechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile ComputingTechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile Computing
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
January 2020 Microsoft 365 Need to Know Webinar
January 2020 Microsoft 365 Need to Know WebinarJanuary 2020 Microsoft 365 Need to Know Webinar
January 2020 Microsoft 365 Need to Know Webinar
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
AzureThursday Mirabeau - Azure Information Protection
AzureThursday Mirabeau - Azure Information ProtectionAzureThursday Mirabeau - Azure Information Protection
AzureThursday Mirabeau - Azure Information Protection
 
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıWebinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
 

Similaire à M365 Gurgaon 2020 - How to manage sensitive and personal data in M365

Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 

Similaire à M365 Gurgaon 2020 - How to manage sensitive and personal data in M365 (20)

SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Support your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suiteSupport your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suite
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
How to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your applicationHow to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your application
 
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft TeamsScottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
GDPR Compliance
GDPR ComplianceGDPR Compliance
GDPR Compliance
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Cosmos IoT – Scaleup Frugally - Techwave.pdf
Cosmos IoT – Scaleup Frugally - Techwave.pdfCosmos IoT – Scaleup Frugally - Techwave.pdf
Cosmos IoT – Scaleup Frugally - Techwave.pdf
 

Plus de Sébastien Paulet

Plus de Sébastien Paulet (20)

aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
 
aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021
 
Teams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsTeams Nation - Syntex dans Teams
Teams Nation - Syntex dans Teams
 
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
 
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
 
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesaOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
 
aOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsaOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teams
 
aOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsaOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teams
 
aOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushaOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rush
 
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesaOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
 
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
 
Cyber security and microsoft 365 in action
Cyber security and microsoft 365 in actionCyber security and microsoft 365 in action
Cyber security and microsoft 365 in action
 
All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020
 
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
 
Back from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexBack from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortex
 
MWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionMWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en action
 
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
 

Dernier

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Dernier (20)

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

M365 Gurgaon 2020 - How to manage sensitive and personal data in M365

  • 1. M365 GURGAON @M365Gurgaon ManagePersonaland confidentialdatainM365 Sébastien Paulet, Microsoft MVP, Aerow CTO @SP_twit sebpaulet Brought to you by #M365Gurgaon Powered by Microsoft 365 and Power Platform India User Group
  • 2. M365 GURGAON Disclaimer - Check all information relatated to regulation with your local legal council - Microsoft license information are my understanding and may evolve. Always check with your Microsoft licensing contact. Powered by Microsoft 365 and Power Platform India User Group
  • 3. Source IBM and Ponemon Institute's annual "Cost of a Data Breach" report “Companies that had security automation technologies deployed experienced around half the cost of a breach” Data breach cost @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 4. Increasing security attacks Ransomware attacks in India increased 200% quarter-on-quarter in April-June with 4 lakh new cases detected during the period Between the hammer and the anvil @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Increasing data regulation (ex : GDPR) British Airways –$242 million Over 330 fines for GDPR between January and August 2020 The total amount of fines issued in 2020 exceeds $181 million
  • 6. 2018; 2019 – PDPB Personal Data Protection Bill Applies to all Indian citizen / companies Gov can access data Fine: Failing to notify breach : Rs 5 crore / 2% global turnover Unlawful data transfers : Rs 15 crore / 4% global turnover + criminal penalties 2018 – GDPR General Data Protection Regulation Applies to all european citizen personal data Restriction on data location Fine: 20M€/4% consolidated worldwide revenue 2020 - CCPA California Consumer Privacy Act Personnal data of californian residents 750$ / californian resident impacted + 7,5K$/violation Sensitive data breach cost @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 7. “means data about or relating to a natural person who is directly or indirectly identifiable, having regard to any characteristic, trait, attribute or any other feature of the identity of such natural person, whether online or offline, or any combination of such features with any other information, and shall include any inference drawn from such data for the purpose of profiling […]“ - PDPB Samples (according GDPR) : Name ID / UID Email Location Banking/financial data IP address Political, religious, caste, ethnical data, sexual orientation Physical, medical, genetical data Personnal data @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 8. CLOUD - MICROSOFT AS DATA SUBCONTRACTOR
  • 10. Content sources in O365 @SP_twit #M365Gurgaon M365 Gurgaon | 2020 SHAREPOINT Teams OneDrive Yammer Office 365 Groups Planner EXCHANGE
  • 12. a) Prohibition of processing of personal data. b) Limitation on purpose of processing of personal data. c) Limitation on collection of personal data. d) Requirement of notice for collection or processing of personal data. e) Quality of personal data processed. f) Restriction on retention of personal data. g) Accountability of data fiduciary. h) Consent necessary for processing of personal data Obligations (according to PDPB) @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 13. REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING OF PERSONAL DATA. CONSENT NECESSARY FOR PROCESSING OF PERSONAL DATA
  • 14. (1) The personal data shall not be processed, except on the consent given by the data principal at the commencement of its processing. (2) The consent of the data principal shall not be valid, unless such consent is— (a) free, having regard to whether it complies with the standard specified undersection 14 of the Indian Contract Act, 1872; (b) informed, having regard to whether the data principal has been provided with the information required under section 7; (c) specific, having regard to whether the data principal can determine the scope of consent in respect of the purpose of processing; (d) clear, having regard to whether it is indicated through an affirmative action that is meaningful in a given context; and (e) capable of being withdrawn, having regard to whether the ease of such withdrawal is comparable to the ease with which consent may be given What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 15. Disclaimer on first login @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Azure AD P1 required
  • 16. Disclaimer on first login (how to) @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Azure AD P1 required
  • 17. QUALITY OF PERSONAL DATA PROCESSED.
  • 18. (1) The data fiduciary shall take necessary steps to ensure that the personal data processed is complete, accurate, not misleading and updated, having regard to the purpose for which it is processed. (2) While taking any steps under sub-section (1), the data fiduciary shall have regard to whether the personal data— (a) is likely to be used to make a decision about the data principal; (b) is likely to be disclosed to other individuals or entities including other data fiduciaries or processors; or (c) is kept in a form that distinguishes personal data based on facts from personal data based on opinions or personal assessments. (3) Where personal data is disclosed to any other individual or entity, including other data fiduciary or processor, and the data fiduciary finds that such data does not comply with the requirement of sub-section (1), the data fiduciary shall take reasonable steps to notify such individual or entity of this fact. What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 19. Define global sensitivity levels at tenant scale End user can manually tag content as sensitive Available in Outlook, SharePoint, Teams, OWA and M365 Apps for Business Sensitivity Labels @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Information Protection O365 (O365 E3) required
  • 20. Encrypt files -> no way to read it for unallowed / non authenticated users Restricted permissions -> can block copy/paste, print, screenshot, email forward, and so on Watermarking -> beware limitations Disable USB key copy / attached file in non O365 services -> WIP (Windows Information Protection) and Intune required Sensitivity Labels - Actions @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Information Protection O365 (O365 E3) required WIP and Intune required (EMS E3) required
  • 21. Permissions are bound to the file • Public/private key system Files encrypted by RSA 2048 bits, and signed with SHA-256 • Read https://docs.microsoft.com/en- us/information-protection/understand- explore/how-does-it-work Based on RMS – Right Management System @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 22. As tenant global admin, go to « Compliance » section (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Information Protection » In labels page, go to « Labels » > « Create a label » Sensitivity Labels – How to create @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 23. As tenant global admin, go to « Compliance » section (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Information Protection » In labels page, go to « Labels Policies» > « Publish label » Sensitivity Labels – How to publish @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 24. 1- Can be done while end user types (set up at label creation) 2- Or when uploading content (based on keyword or RegEx): As tenant global admin, go to « Compliance » section (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Information Protection » In labels page, go to « Automatically apply » > « Create application policy » Sensitivity Labels – Automatically apply @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Rules based classification O365 (O365 E5) required
  • 25. Or based on Machine Learning (preview) Use existing trained criterias or create your own (50 to 500 contents to learn, up to 10,000 to test). As tenant global admin, go to « Compliance » portal (https://compliance.microsoft.com/ ) > « Data classification» Sensitivity Labels – Automatically apply @SP_twit #M365Gurgaon M365 Gurgaon | 2020 ML based classification O365 (M365 E5 Compliance) required
  • 27. (1) The data fiduciary shall be responsible for complying with the provisions of this Act in respect of any processing undertaken by it or on its behalf What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 28. If you don’t have have EMS / AAD Premium, at least, enable MFA on admin and users accounts (1) Something you know (typically a password) (2) Something you have (a trusted device that is not easily duplicated, like a phone) (3) Something you are (biometrics) MFA @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 29. Enable audit logs in Office 365 (in Compliance center) and Azure AD Audit logs are kept 90 days max (up to 365 days for “O365 E5” users) As tenant global admin, go to « Compliance » portal (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Audit » Audit logs @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 30. Enterprise Mobility + Security @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 31. Enterprise Mobility + Security @SP_twit #M365Gurgaon M365 Gurgaon | 2020 • Azure Active Directory Premium • Azure MFA • Azure Advanced Protection • Microsoft Cloud App Security • Azure Information Protection Premium • Azure Right Management Premium • Intune
  • 32. RESTRICTION ON RETENTION OF PERSONAL DATA.
  • 33. (1) The data fiduciary shall not retain any personal data beyond the period necessary to satisfy the purpose for which it is processed and shall delete the personal data at the end of the processing. (2) Notwithstanding anything contained in sub-section (1), the personal data may be retained for a longer period if explicitly consented to by the data principal, or necessary to comply with any obligation under any law for the time being in force. (3) The data fiduciary shall undertake periodic review to determine whether it is necessary to retain the personal data in its possession. (4) Where it is not necessary for personal data to be retained by the data fiduciary under sub-section (1) or sub-section (2), then, such personal data shall be deleted in such manner as may be specified by regulations What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 34. Retention labels @SP_twit #M365Gurgaon M365 Gurgaon | 2020 End user can manually apply one retention label per file or email A retention formula is attached to the retention label ex : Last modification + 7Y Retention labels can also be set up by default per: - Exchange folder - SharePoint document library Retention Policy (O365 E3) required
  • 35. Retention labels – How to create @SP_twit #M365Gurgaon M365 Gurgaon | 2020 As tenant global admin, go « Compliance » portal In compliance center, go to « Classification » > « Solutions » > Records Management On RM page, go to « File Plan » > « Create a label »
  • 36. Retention labels – How to publish @SP_twit #M365Gurgaon M365 Gurgaon | 2020 As tenant global admin, go « Compliance » portal In compliance center, go to « Classification » > « Solutions » > Records Management On RM page, go to « Label policies» > « Publish label »
  • 37. REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING OF PERSONAL DATA
  • 38. (1) Every data fiduciary shall give to the data principal a notice, at the time of collection of the personal data, or if the data is not collected from the data principal, as soonas reasonably practicable, containing the following information, namely:— (a) the purposes for which the personal data is to be processed; (b) the nature and categories of personal data being collected; (c) the identity and contact details of the data fiduciary and the contact details of the data protection officer, if applicable; (d) the right of the data principal to withdraw his consent, and the procedure for such withdrawal, if the personal data is intended to be processed on the basis of consent; […] What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 39. Search across all Mailboxes SharePoint Teams OneDrive Based on Content Metadata Labels Export results as a .zip DSR – Data Subject Request @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 41. By default, all in a single region ANNOUNCED : Yammer and search indexs also geo located. ANNOUNCED : Availability zone in Central India in 2021 Location @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Multi geo capability (500 users min. 2$/users/month)
  • 42. Tenant administration > Settings > Organization profile Where is my data? @SP_twit #M365Gurgaon M365 Gurgaon | 2020 PS> Connect-MsolService PS> (Get-MsolCompanyInformation).AuthorizedServiceInstances
  • 44. https://www.microsoft.com/en-us/trust-center/compliance/ Various norms including Indian ones • RBI (Banking) • IRDAI (Insurance) • MeitY (gov guidelines) External audits Can get audit documents Norms compliance leader @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 45. Patriot Act -> FBI, CIA, NSA, Army SCA -> Justice Can apply out of US territory Microsoft challenged DoJ on extra SCA territoriality SCA (Stored Communication Act) until USA Supreme Court (cf. Cloud Act later) Patriot Act / SCA @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 46. On US attorney request (ex: corruption, business with country under US embargo) Apply out of US territory In case of executive agreement, opposition can done under 14 days if : Non USA citizen AND goes against local law Cloud Act @SP_twit #M365Gurgaon M365 Gurgaon | 2020 See O365 general conditions “If compelled to disclose Customer Data or Personal Data to law enforcement, Microsoft will promptly notify Customer and provide a copy of the demand unless legally prohibited from doing so.”
  • 47. Law enforcement requests @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 48. Questions? Microsoft 365 and Power Platform India User Group

Notes de l'éditeur

  1. https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91