Feeds

Microsoft: Worried about web privacy? Tell us everything...

Redmond wants to look at your privates

Beginner's guide to SSL certificates

Microsoft has launched a drive to stop people splurging their personal information all over the internet - by asking them to splurge their personal information all over the internet.

As well as series of telly commercials, Microsoft have designed a special questionnaire designed to discover whether visitors are “carefree surfers, digital veterans or somewhere in-between”.

Visitors to the new privacy microsite are asked to share details of which social networks they use, what sort of information they share publicly and how much care they take to cover their tracks online. This data is then harvested by Edelman, the company commissioned to carry out the survey, along with details of the IP address of whoever fills in the survey.

Although the website expressly states that it “does not request or collect any personal information”, this claim appears to be contradicted by the later statement:

This survey collects information about your response such as the Internet Protocol (IP) address through which you access the Internet and the date and time you access the survey. This information is used to help improve the survey, analyze trends, and administer the survey.

Microsoft's research indicates that 85% of Americans are concerned about their privacy online, indicating a clear need for privacy-invading questionnaires to help clear the problem up.

In a blog post, Ryan Gavin, Windows general manager, wrote: “Very few of us believe that sharing some personal data online is a bad thing. It’s part of our everyday routines to fill out profiles, login to sites, and oftentimes provide personal information like our credit card or phone numbers in order to take advantage of all the web has to offer. In fact, the more personal and relevant the web gets, the better it can get.

“Yet, at some point, we all draw a line where we are uncomfortable sharing more. And when we think we’re being tracked, particularly by those we may not have a direct relationship with, our tolerance drops," Gavin said, apparently with a straight face.

And while tracking isn’t bad per se, we typically reach our information-sharing breaking point with very personal data, like items related to our kids or our health.” ®

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.