Despite the uproar over the Edward Snowden leaks, government data collection and use is nothing new, said Corporate Vice President of Microsoft’s Trustworthy Computing Group Scott Charney to a sold-out crowd at the IAPP’s Global Privacy Summit last week in his keynote address. After all, governments are essentially just big service providers; they want to exploit the Internet and they want access to data.

Knowing this, it’s essential to set yourself up for success with iron-clad and transparent policies that effectively communicate to users what you’ll do with their data now and, in future cases, who may gain access to it. Equally as important? Tell them in ways that are fair.

The Snowden revelations changed things because, when people’s suspicions of those with access to their data become verified as true, it affects the way they react, Charney said, presenting society with the conundrum we find ourselves in now—in which the government and Internet users both are conflicted over their desires. Sure the government wants to protect security, public safety and privacy, but there is often an inherent conflict there. And users want to be protected, but they don’t want to be spied upon.

That’s why Microsoft has built in protections to its systems that aim to be completely transparent to users—and without caveats. It’s a policy that has served the company well, he said. When the Snowden disclosures broke and firms around the globe panicked, Microsoft remained calm, Charney said. There was no reason to panic. Microsoft bases its conduct on three principles: security, privacy and transparency. That means employing a “defense-not-offense” model for security.

Microsoft's Scott Charney presents his four-step method for evaluating new services and products.

“There are no back doors in our products,” Charney said. Period.  And Microsoft has never received a request for bulk data.

“We’ve had these principles in place for 10 years,” Charney said. “If you act in such a way, you know your conduct will be okay with your customers. So we haven’t worried about the Snowden disclosures.  If we got a request for bulk data, we would fight it in the courts. We turn over data in countries with jurisdiction over us with a warrant. We have rules in place about when we’ll turn over data and when we won’t. We would fight bulk requests because we don’t feel that’s the right place to go.”

To communicate with customers, Microsoft publishes transparency reports on law enforcement requests twice a year and manages a Government Security Program—in which it allows government customers from many countries to see its source code

“Transparency is critically important,” Charney said. “You have to be able to tell customers what you can commit to them and what you can’t.”

Being transparent also means using modes of communicating to users that make sense, he said. That means, in this age of Big Data, re-examining how we apply the Fair Information Practice Principles—particularly those that apply to collection, notice and choice. Sure, it’s essential—now, especially—to notify users that you’re collecting their data and informing them of how you’ll use it. But current models for doing so aren’t helping the user in meaningful ways. In fact, they are kind of screwing them.

“Folks who are still using notice-and-choice models have their head in the sand,” he said. “By going with notice and choice, you put this huge burden on the individual.”

And that’s not fair because it assumes there’s a relationship between the data subject and the data collector.

“But that’s not true at all, especially with the Internet of Things,” he said. While it’s a better idea to move toward a data-use model, it’s important to remember that the notice that’s given at the time of collection may not necessarily be what the data is used for in the end. Now, it’s more like the company is saying to the data subject, ‘Here’s what we’re going to do with the data … that we can think of.’ But what about the greater technology of tomorrow?” Charney said. That new technology may create myriad ways for the data to be repurposed.

It’s time to start thinking about different models, Charney said, and he presented a simple process that Microsoft has adopted that focuses on the actors, objectives, actions and impacts associated with an product or service.

Take airport security for example. The actors are the U.S. government. The objective is to keep people safe. The action is to deploy metal detectors. Unfortunately the impact is that liquid explosives aren’t detected. So the government deploys x-ray machines. But it turns out those are too radioactive. So, they settle on backscatter machines, which accomplish the objective and have the most satisfactory impact.

Similarly, he argued, companies should use the same methodology in deploying new products. “It’s a workable model that allows us to assess risk,” he said, and it gives him confidence moving into the great unknown of new technologies and their associated privacy questions.

“We always have challenges,” he said. “I’m optimistic. We’ve had hard problems before. We’ve always been able to solve them.

Read More by Angelique Carson:
European Regulators, FTC Unveil Cross-Border Data Transfer Tool
With America Politically Divided, Multi-Stakeholder Processes Are the Future
How Do We Stop Big Brother? We Look Back
Podesta: Big Data Means Big Gains … and Risks

Written By

Angelique Carson, CIPP/US


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

IAPP-OneTrust PIA Platform

New U.S. Government Agency privacy impact assessments - free to IAPP members!

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

Europe Data Protection Intensive 2017

The Intensive is sold out! But cancellations do happen—so hurry and get on the wait list in case more seats become available.

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities.

Canada Privacy Symposium 2017

The Symposium returns to Toronto this spring and registration has opened! Take advantage of Early Bird rates and join your fellow privacy pros for another stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum returns to Washington, DC April 21, delivering renowned keynote speakers and a distinguished panel of legal and privacy experts.

Asia Privacy Forum 2017

The Forum returns to Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region. Call for Speakers open!

Privacy. Security. Risk. 2017

This year, we're bringing P.S.R. to San Diego. The Call for Speakers is now open. Submit today and be a part of something big! Submission deadline: February 26.

Europe Data Protection Congress 2017

European policy debate, multi-level strategic thinking and thought-provoking discussion. The Call for Speakers is open until March 19.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»