CIS Benchmarks
CIS Benchmarks
How to implement
CIS Benchmark for Azure: Get prescriptive guidance for establishing a secure baseline configuration for
Azure.
Microsoft 365 security roadmap: Minimize the potential of a data breach or compromised account by
following this roadmap.
Windows security baselines: Follow these guidelines for effective use of security baselines in your
organization.
CIS Controls Cloud Companion Guide: Get guidance on applying security best practices in CIS Controls
Version 7 to cloud environments.
Resources
CIS best practices for securely using Microsoft 365
Windows 10 security policy settings
Windows 10 enterprise security
Compliance on the Microsoft Trust Center
Cloud Security Alliance (CSA) STAR attestation
2/17/2021 • 3 minutes to read • Edit Online
Resources
Azure standard response for request for information
Azure Cloud Security Alliance CAIQ
Office 365 Mapping of CSA Cloud Control Matrix
Cloud Security Alliance
CSA Security, Trust & Assurance Registry (STAR)
SOC 1, 2, and 3 Reports
Cloud Controls Matrix (CCM)
Microsoft Common Controls Hub Compliance Framework
Compliance on the Microsoft Trust Center
Cloud Security Alliance (CSA) STAR certification
2/17/2021 • 3 minutes to read • Edit Online
Resources
Azure standard response for request for information
Azure Cloud Security Alliance CAIQ
Office 365 Mapping of CSA Cloud Control Matrix
Cloud Security Alliance
CSA Security, Trust & Assurance Registry (STAR)
About CSA STAR certification
Cloud Controls Matrix (CCM)
ISO/IEC 27001
Microsoft Common Controls Hub Compliance Framework
Compliance on the Microsoft Trust Center
Cloud Security Alliance (CSA) STAR self-assessment
11/30/2020 • 3 minutes to read • Edit Online
Resources
Cloud Security Alliance
Cloud Controls Matrix (CCM)
Consensus Assessments Initiative Questionnaire (CAIQ)
CSA Security, Trust & Assurance Registry (STAR)
Compliance on the Microsoft Trust Center
P H A SE O UTC O M ES
P H A SE O UTC O M ES
Understand your ISO 27001 governance and compliance • Assess and manage your compliance risks by using the
requirements. Compliance Manager to conduct an ISO 27001:2013
assessment of your organization. Establish standard
operating procedures (SOPs) for each of the 14 ISO 27001
groups.
Start planning a roll out of an information classification and • Help users easily identify and classify sensitive data,
retention policies and tools to the organization to help users according to your information protection policies and
identify, classify, and protect sensitive data and assets. standard operating procedures (SOPs), by rolling out
classification policies and the Azure Information Protection
application. Develop your organization's information
classification schema (policies), along with an education and
roll out plan.
• Help users easily apply record retention and protection
policies to content by rolling out Microsoft 365 Labels to the
organization. Plan your organization’s labels in accordance
with your legal requirements for information record
retention, along with an education and roll out plan.
Ensure that records related to information security are • Enable audit logging and mailbox auditing (for all Exchange
protected from loss, deletion, modification, or unauthorized mailboxes) to monitor Microsoft 365 for potentially
access by creating Audit and Accountability policies as part malicious activity and to enable forensic analysis of data
of your Standard Operating Procedures (SOPs). breaches.
• On a regular cadence, search your company’s audit logs to
review changes that have been made to the tenant’s
configuration settings.
• Enable Microsoft 365 Alert Policies in the Microsoft 365
security or compliance center for sensitive activities, such as
when an elevation of privileges occurs on a user account.
• For long-term storage of audit log data, use the Office 365
Management Activity API reference to integrate with a
security information and event management (SIEM) tool.
Define administrative and security roles for the organization, • Utilize the Microsoft 365 administrative roles to enable
along with appropriate policies related to segregation of separation of administration duties. Note: many
duties. administrator roles have a corresponding role in Exchange
Online, SharePoint Online, and Skype for Business Online.
• Segment permissions to ensure that a single administrator
does not have greater access than necessary.
A REA TA SK S
A REA TA SK S
Use Microsoft 365 security capabilities to control access to • Protect administrator and end-user accounts by
the environment, and protect organizational information and implementing identity and device access policies, including
assets according to your defined standard operating enabling multi-factor authentication (MFA) for all user
procedures (SOPs). accounts and modern authentication for all apps.
• Establish strong password policies to manage and protect
user account credentials.
• Set up Office 365 Message Encryption (OME) to help end
users comply with your organization’s SOPs when sending
sensitive data via email.
• Deploy Windows Defender Advanced Threat Protection
(ATP) to all desktops for protection against malicious code,
as well as data breach prevention and response.
• Configure, test, and deploy Data Loss Prevention (DLP)
policies to identify, monitor and automatically protect over
80 common sensitive data types within documents and
emails, including financial, medical, and personally identifiable
information.
• Automatically inform email senders that they may be
about to violate one of your policies — even before they
send an offending message by configuring Policy Tips. Policy
Tips can be configured to present a brief note in Outlook,
Outlook on the web, and OWA for devices, that provides
information about possible policy violations during message
creation.
• Implement Office 365 Advanced Threat Protection (ATP) to
help prevent the most common attack vectors including
phishing emails and Office documents containing malicious
links and attachments.
A REA TA SK S
Use Microsoft 365 advanced data governance tools and • Use Office 365 Advanced Data Governance to identify
information protection to implement ongoing governance personal information in documents and emails by
programs for personal data. automatically applying Microsoft 365 Labels.
• Use Microsoft Intune to protect sensitive data stored and
accessed on mobile devices across the organization, and
ensure that compliant corporate devices are used to data.
A REA TA SK S
Monitor ongoing compliance across Microsoft 365 and • To evaluate performance against standard operating
other Cloud applications. procedures (SOPs), use Compliance Manager on an ongoing
basis to perform regular ISO 27001:2013 assessments of the
organization’s information security policies and their
implementation.
• Review and monitor the information security management
system on an on-going basis.
• Use Azure AD Privileged Identity Management to control
and perform regular reviews of all users and groups with
high levels of permissions (i.e. privileged or administrative
users).
• Deploy and configure Privileged Access Management in
Office 365 to provide granular access control over privileged
admin tasks in Office 365. Once enabled, users need to
request just-in-time access to complete elevated and
privileged tasks through an approval workflow that is highly
scoped and time-bound.
• As part of your standard operating procedures (SOPs),
search the audit logs to review changes that have been
made to the tenant’s configuration settings, elevation of
end-user privileges and risky user activities.
• Audit non-owner mailbox access to identify potential leaks
of information and to proactively review non-owner access
on all Exchange Online mailboxes.
• Use Microsoft 365 Alert Policies, data loss prevention
reports and Microsoft Cloud App Security to monitor your
organization’s usage of cloud applications and implement
advanced alerting policies based on heuristics and user
activity.
• Use Microsoft Cloud App Security to automatically track
risky activities, to identify potentially malicious
administrators, to investigate data breaches, or to verify that
compliance requirements are being met.
Learn more
Microsoft Trust Center: ISO/IEC 27001:2013 Information Security Management Standards
ISO/IEC 20000-1:2011 Information Technology
Service Management
2/17/2021 • 2 minutes to read • Edit Online
Resources
ISO 20000-1:2011—Service management (requirements for purchase)
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
ISO 22301:2012 Business Continuity Management
Standard
2/17/2021 • 3 minutes to read • Edit Online
Resources
ISO 22301:2012 standard (for purchase)
Azure resiliency technical guidance (Explains the Azure shared responsibility model for business continuity.)
Microsoft Common Controls Hub Compliance Framework
Microsoft Online Services Terms
Microsoft Enterprise Business Continuity Management Program Description
Compliance Score
Compliance on the Microsoft Trust Center
ISO/IEC 27001:2013 Information Security
Management Standards
2/18/2021 • 4 minutes to read • Edit Online
Resources
Mapping Microsoft Cyber Offerings to: NIST Cybersecurity (CSF),CIS Controls, and ISO27001:2013
Frameworks
The ISO/IEC 27000 Directory
ISO/IEC 27001: 2013 standard (for purchase)
Microsoft sets a high bar for information security (BSI case study)
Microsoft Common Controls Hub Compliance Framework
Microsoft Online Services Terms
Microsoft Cloud for Government
Compliance on the Microsoft Trust Center
White papers
Azure DevOps Services data protection overview
13 effective Azure security controls for ISO 27001 compliance
ISO/IEC 27017:2015 Code of Practice for Information
Security Controls
2/17/2021 • 3 minutes to read • Edit Online
Resources
ISO/IEC 27017:2015 code of practice
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
ISO/IEC 27018 Code of Practice for Protecting
Personal Data in the Cloud
2/17/2021 • 5 minutes to read • Edit Online
Resources
ISO/IEC 27018:2014 code of practice
Microsoft Common Controls Hub Compliance Framework
Data access policies for Microsoft enterprise cloud and technical services
Microsoft Online Services Terms
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
ISO/IEC 27701 Privacy Information Management
System (PIMS)
2/17/2021 • 5 minutes to read • Edit Online
Compliance challenges
Expecting vendors to certify against PIMS will be effective for establishing responsible privacy practices by
suppliers and partners no matter the size of your organization. ISO/IEC 27701 addresses three key compliance
challenges:
Too many regulator y requirements to juggle : Reconciling multiple regulatory requirements through
the use a universal set of operational controls enables consistent and efficient implementation.
Too costly to audit regulation-by regulation : Auditors, both internal and third party, can assess
regulatory compliance using a universal operational control set within a single audit cycle.
Promise of compliance without proof is potentially risky : Commercial agreements involving
movement of personal information may warrant certification of compliance.
Resources
ISO/IEC 27701 (PIMS) for purchase
BSI whitepaper and content about PIMS
PIMS introductory video
Compliance on the Microsoft Trust Center
ISO 9001:2015 Quality Management Systems
Standards
2/17/2021 • 2 minutes to read • Edit Online
Resources
ISO 9001:2015—Quality management
ISO 9001: 2015 standard (requirements for purchase)
ISO 9000: 2015 (fundamentals and vocabulary for purchase)
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
Service Organization Controls (SOC)
2/17/2021 • 5 minutes to read • Edit Online
Resources
Better protect your data by using Microsoft cloud services
Service Organization Control (SOC) Reports
SSAE 16 Overview
ISAE 3402 Overview
Microsoft Online Services Terms
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
Web Content Accessibility Guidelines
11/30/2020 • 2 minutes to read • Edit Online
About WCAG
The Web Content Accessibility Guidelines (WCAG) provide a framework for making web content more
accessible for people with disabilities. WCAG version 2.0 was published in 2008 by the World Wide Web
Consortium (W3C), an international organization dedicated to creating web standards, and updated to WCAG
2.1 in June 2018. In 2012, WCAG 2.0 was also published by the International Organization for Standardization
(ISO) as ISO/IEC 40500:2012.
Content that conforms to WCAG 2.1 also conforms to WCAG 2.0. For policies requiring conformance to WCAG
2.0, WCAG 2.1 can provide an alternate means of conformance.
Microsoft is a major software and cloud-services provider to consumers, businesses, and governments around
the world. To assist customers in making purchasing decisions, Microsoft publishes Accessibility Conformance
Reports describing the extent to which our products and services support the WCAG criteria. This information
can help Microsoft customers determine whether a particular product or service will meet their specific needs.
Resources
Microsoft accessibility site: Get information on using accessibility features and explore the ways Microsoft
innovates to help everyone achieve more.
Office 365 Accessibility Center: Office 365 resources for people with disabilities.
Enterprise Disability Answer Desk: Dedicated support for enterprise customers with accessibility questions
about our products and services or compliance.
Compliance on the Microsoft Trust Center
Criminal Justice Information Services (CJIS) Security
Policy
2/17/2021 • 4 minutes to read • Edit Online
CJIS overview
The Criminal Justice Information Services (CJIS) Division of the US Federal Bureau of Investigation (FBI) gives
state, local, and federal law enforcement and criminal justice agencies access to criminal justice information (CJI)
— for example, fingerprint records and criminal histories. Law enforcement and other government agencies in
the United States must ensure that their use of cloud services for the transmission, storage, or processing of CJI
complies with the CJIS Security Policy, which establishes minimum security requirements and controls to
safeguard CJI.
The CJIS Security Policy integrates presidential and FBI directives, federal laws, and the criminal justice
community's Advisory Policy Board decisions, along with guidance from the National Institute of Standards and
Technology (NIST). The Policy is periodically updated to reflect evolving security requirements.
The CJIS Security Policy defines 13 areas that private contractors such as cloud service providers must evaluate
to determine if their use of cloud services can be consistent with CJIS requirements. These areas correspond
closely to NIST 800-53, which is also the basis for the Federal Risk and Authorization Management Program
(FedRAMP), a program under which Microsoft has been certified for its Government Cloud offerings.
In addition, all private contractors who process CJI must sign the CJIS Security Addendum, a uniform agreement
approved by the US Attorney General that helps ensure the security and confidentiality of CJI required by the
Security Policy. It also commits the contractor to maintaining a security program consistent with federal and
state laws, regulations, and standards, and limits the use of CJI to the purposes for which a government agency
provided it.
Resources
Criminal Justice Information Services
CJIS Security Policy
CJIS implementation guidelines for Azure Government
Microsoft Common Controls Hub Compliance Framework
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
Committee on National Security Systems Instruction
No. 1253 (CNSSI 1253)
2/5/2021 • 2 minutes to read • Edit Online
Resources
What is Azure Government?
Azure Government
Microsoft and FedRAMP
Microsoft and DoD Provisional Authorization
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
Defense Federal Acquisition Regulation Supplement
(DFARS)
2/5/2021 • 4 minutes to read • Edit Online
DFARS overview
On October 21, 2016, the Department of Defense (DoD) issued its Final Rule amending the Defense Federal
Acquisition Regulation Supplement (DFARS) and imposing safeguarding and cyber incident reporting
obligations on defense contractors whose information systems process, store, or transmit covered defense
information (CDI).
The final DFARS clause 252.204-7012 (Safeguarding Covered Defense Information and Cyber Incident
Reporting) specifies safeguards to include cyber incident reporting requirements and additional considerations
for cloud service providers. Per DFARS 252.204-7012, all DoD contractors and the defense industrial base are
required to comply with DFARS requirements for adequate security 'as soon as practical, but not later than
December 31, 2017.'
Resources
Defense Federal Acquisition Regulation Supplement (DFARS)
Microsoft Cloud for Government
Online Services Terms
Controlled Unclassified Information (CUI)
Compliance on the Microsoft Trust Center
US Department of Defense (DoD) Provisional
Authorization at Impact Levels 2, 4, and 5
2/5/2021 • 5 minutes to read • Edit Online
Resources
DoD Cloud Computing Security Requirements Guide (SRG) and other documents
DISA Cloud Service Support
Protecting Controlled Unclassified Information in nonfederal information systems and organizations
NIST Cybersecurity Framework
Microsoft Common Controls Hub Compliance Framework
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
US DoE 10 CFR Part 810
11/30/2020 • 2 minutes to read • Edit Online
How to implement
NERC CIP Standards & Cloud Computing: Guidance for electric utilities and Registered Entities deploying
workloads on Azure or Azure Government.
Resources
Azure Cloud Services and US Export Controls
Microsoft and FedRAMP
Microsoft and DoD
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
US Export Administration Regulations (EAR)
2/5/2021 • 5 minutes to read • Edit Online
How to implement
Overview of US export controls and guidance for customers assessing their obligations under the EAR.
Azure
Office 365
FedRAMP overview
The US Federal Risk and Authorization Management Program (FedRAMP) was established to provide a
standardized approach for assessing, monitoring, and authorizing cloud computing products and services under
the Federal Information Security Management Act (FISMA), and to accelerate the adoption of secure cloud
solutions by federal agencies.
The Office of Management and Budget now requires all executive federal agencies to use FedRAMP to validate
the security of cloud services. (Other agencies have also adopted it, so it is useful in other areas of the public
sector as well.) The National Institute of Standards and Technology (NIST) SP 800-53 sets the mandatory
standards, establish security categories of information systems—confidentiality, integrity, and availability—to
assess the potential impact on an organization should its information and information systems be
compromised. FedRAMP is the program that certifies that a cloud service provider (CSP) meets those standards.
CSPs desiring to sell services to a federal agency can take three paths to demonstrate FedRAMP compliance:
Earn a Provisional Authority to Operate (P-ATO) from the Joint Authorization Board (JAB). The JAB is the
primary governance and decision-making body for FedRAMP. Representatives from the Department of
Defense, the Department of Homeland Security, and the General Services Administration serve on the board.
The board grants a P-ATO to CSPs that have demonstrated FedRAMP compliance.
Receive an Authority to Operate (ATO) from a federal agency.
Or, work independently to develop a CSP Supplied Package that meets program requirements.
Each of these paths requires a stringent technical review by the FedRAMP Program Management Office (PMO)
and an assessment by an independent third-party organization that is accredited by the program.
FedRAMP authorizations are granted at three impact levels based on NIST guidelines—low, medium, and high.
These levels rank the impact that the loss of confidentiality, integrity, or availability could have on an
organization—low (limited effect), medium (serious adverse effect), and high (severe or catastrophic effect).
NOTE
The use of Azure Active Directory within Azure Government requires the use of components that are deployed outside of
Azure Government on the Azure public cloud.
Resources
Federal Risk and Authorization Management Program
FedRAMP Security Assessment Framework
Managing compliance in the cloud at Microsoft
Microsoft Government Cloud
Azure Compliance Offerings
Federal Information Processing Standard (FIPS)
Publication 140-2
2/5/2021 • 4 minutes to read • Edit Online
Resources
FIPS Pub 140-2 Security Requirements for Cryptographic Modules
NIST Cryptographic Module Validation Program
Windows, Windows Server, and FIPS 140-2
Compliance on the Microsoft Trust Center
US Internal Revenue Service Publication 1075
2/5/2021 • 4 minutes to read • Edit Online
Resources
IRS Publication 1075
IRS Safeguards Program
Microsoft Common Controls Hub Compliance Framework
Microsoft Cloud for Government
Compliance on the Microsoft Trust Center
International Traffic in Arms Regulations (ITAR)
11/30/2020 • 2 minutes to read • Edit Online
ITAR overview
The US Department of State is responsible for managing the export and temporary import of defense articles
(meaning any item or technical data designated under the US Munitions List, as described in Title 22 CFR 121.1)
that are governed by the Arms Export Control Act (Title 22 USC 2778) and the International Traffic in Arms
Regulations (ITAR) (Title 22 CFR 120–130). The Directorate for Defense Trade Controls (DDTC) is responsible for
managing entities governed under these programs.
Resources
DDTC ITAR
ITAR Title 22 CFR 120–130
Using Azure Government with ITAR controlled data
Azure Government
Office 365 U.S. Government
Compliance on the Microsoft Trust Center
Microsoft 365 NIST 800-53 action plan — Top
priorities for your first 30 days, 90 days, and beyond
2/5/2021 • 8 minutes to read • Edit Online
Microsoft 365 allows you to operate your enterprise with a cloud control framework, which aligns controls with
multiple regulatory standards. Microsoft 365 includes Office 365, Windows 10, and Enterprise Mobility +
Security. Microsoft's internal control system is based on the National Institute of Standards and Technology
(NIST) special publication 800-53, and Office 365 has been accredited to latest NIST 800-53 standard.
Microsoft is recognized as an industry leader in cloud security. Using years of experience building enterprise
software and running online services, our team is constantly learning and continuously updating our services
and applications to deliver a secure cloud productivity service that meets rigorous industry standards for
compliance. Microsoft's government cloud services, including Office 365 U.S. Government, meet the demanding
requirements of the US Federal Risk and Authorization Management Program (FedRAMP), enabling U.S. federal
agencies to benefit from the cost savings and rigorous security of the Microsoft Cloud.
This article includes a prioritized action plan you can follow as you work to meet the requirements of NIST 800-
53. This action plan was developed in partnership with Protiviti, a Microsoft partner specializing in regulatory
compliance.
P H A SE O UTC O M ES
A REA TA SK S
Understand your NIST 800-53 requirements and consider • Work with your Microsoft Partner to perform a gap
engaging with a Microsoft Advisory Partner. analysis of your NIST 800-53 compliance for the
organization and to develop a roadmap that charts your
journey to compliance.
• Use guidance in Microsoft Compliance Manager to define
and document policies and procedures for both access
control and information sharing which addresses purpose,
scope, roles, responsibilities, coordination among
organizational entities, and compliance.
Learn and understand the Microsoft 365 built-in defense-in- • Assess and manage your compliance risks by using
depth strategy. Compliance Manager to conduct an NIST 800-53
assessment of your organization. Align Microsoft 365
security controls for managing and mitigating risks to the
assessment’s outcomes.
• Utilize Microsoft Secure Score to track the organization’s
usage of Microsoft 365 security capabilities over time within
both Office 365 and on Windows 10 desktops.
• Learn about Microsoft’s technologies and strategies used
to provide Office 365 data encryption, as well as strategies
for protection against denial-of-service attacks in the
Microsoft Cloud.
Protect user and administrator access to Office 365. • Establish strong credential management to protect user
account credentials.
• Learn about recommended identity and device access
policies for Office 365 services.
• Utilize the Office 365 administrative roles to implement
role-based access to administration capabilities and to
enable separation of administration duties. Note: many
administrator roles in Office 365 have a corresponding role
in Exchange Online, SharePoint Online, and Skype for
Business Online. Segment permissions to ensure that a
single administrator does not have greater access than
necessary.
Ensure all access to the system is audited according to your Enable audit logging and mailbox auditing (for all Exchange
organization’s audit and accountability policies. mailboxes) to monitor Office 365 for potentially malicious
activity and to enable forensic analysis of data breaches.
90 days — Enhanced Protections
These tasks take a bit more time to plan and implement.
A REA TA SK S
Enhance your Anti-malware, patching, and configuration • Protect corporate assets and desktops by deploying and
management program. enabling Windows Defender Antivirus to your organization
and leveraging its tight integration with Windows 10.
• Keep track of quarantined infected systems and prevent
further damage until remediation steps are taken.
• Confidently rely on Microsoft 365 rigorous standard
change management process for trusted updates, hotfixes,
and patches.
Use Microsoft 365 security capabilities to control access to • Implement recommended identity and device access
the environment and to protect organizational information policies to protect user and administrative accounts.
and assets. • Implement Office 365 Message Encryption (OME)
capabilities to help users comply with your organization’s
policies when sending sensitive data via email.
• Deploy Windows Defender Advanced Threat Protection
(ATP) to all desktops for protection against malicious code,
as well as data breach prevention and response.
• Configure, test and deploy policies to identify, monitor and
automatically protect over 80 common sensitive data types
within documents and emails, including financial, medical,
and personally identifiable information.
• Automatically inform email senders that they may be
about to violate one of your policies — even before they
send an offending message by configuring Policy Tips. Policy
Tips can be configured to display a brief note (in Outlook,
Outlook on the web, and OWA for devices) that provides
information about possible policy violations during message
creation.
• Protect sensitive corporate data and meet your
organization’s information sharing policies by implementing
controls for external sharing in SharePoint Online and
OneDrive for Business. Ensure only authenticated external
users can access corporate data.
Utilize built in auditing capabilities to monitor sensitive or • Enable Alert Policies in the Microsoft 365 security or
risky activities within Office 365. compliance center to raise automatic notifications when
sensitive activities occur, such as when a user's account
privileges are elevated or when sensitive data is accessed. All
privileged functions should be audited and monitored.
• On a regular cadence, search your audit logs in the security
or compliance center to review changes that have been
made to the tenant’s configuration settings.
• For long-term storage of audit log data, use the Office 365
Management Activity API reference to integrate with a
security information and event management (SIEM) tool.
Deploy Advanced Threat Protection for both links and Implement Office 365 Advanced Threat Protection (ATP) to
attachments in email and Office documents. help prevent the most common attack vectors including
phishing emails and Office documents containing malicious
links and attachments.
Use Microsoft 365 advanced tools and information * Use Microsoft Intune to protect sensitive data stored and
protection to implement ongoing controls for devices and accessed on mobile devices and to ensure compliant
protection for corporate data. corporate devices are used to access cloud services.
Monitor ongoing compliance across Microsoft 365 and * To evaluate performance against the organization's defined
other Cloud applications. policies and procedures, use Compliance Manager on an
ongoing basis to perform regular assessments of the
organization's enforcement of information security policies.
* Use Azure AD Privileged Identity Management to control
and perform regular reviews of all users and groups with
high levels of permissions (i.e. privileged or administrative
users).
* Deploy and configure Privileged Access Management to
provide granular access control over privileged admin tasks
in Office 365. Once enabled, users will need to request just-
in-time access to complete elevated and privileged tasks
through an approval workflow that is highly scoped and
time-bound.
* Audit non-owner mailbox access to identify potential leaks
of information and to proactively review non-owner access
on all Exchange Online mailboxes.
* Use Office 365 Alert Policies, data loss prevention reports,
and Microsoft Cloud App Security to monitor your
organization's usage of cloud applications and to implement
advanced alerting policies based on heuristics and user
activity.
* Use Microsoft Cloud App Security to automatically track
risky activities, to identify potentially malicious
administrators, to investigate data breaches, or to verify that
compliance requirements are being met.
Leverage enhanced threat detection and protection * Deploy and configure Windows Advanced Threat Analytics
capabilities with advanced threat analytics to provide a to leverage rich analytics and reporting to gain critical
robust and layered security strategy for the organization. insights into which users are being targeted in your
Develop an incident response plan to mitigate the effects of organization and the cyber-attack methodologies being
compromised systems in your organization. exploited.
* Leverage Office 365 Advanced Threat Protection reports
and analytics to analyze threats through insights into
malicious content and malicious emails automatically
detected within your organization. Utilize built-in reports
and message trace capabilities to investigate email messages
that have been blocked due to an unknown virus or
malware.
* Use Office 365 Threat Intelligence to aggregate insights
and information from various sources to get a holistic view
of your cloud security landscape.
* Integrate Office 365 Threat Intelligence and Windows
Defender Advanced Threat Protection to quickly understand
if users' devices are at risk when investigating threats in
Office 365.
* Simulate common attack methods within your Office 365
environment using the Office 365 Attack Simulator. Review
results from attack simulations to identify training
opportunities for users and to validate your organization's
incident response procedures.
* Configure permissions within the security or compliance
center to ensure access to monitoring and audit data is
restricted to approved users and integrated with the
organization's incident response measures.
A REA TA SK S
Learn more
Learn more about Microsoft and the NIST Cyber Security Framework (CSF), including NIST 800-53.
NIST SP 800-171
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Azure Blueprint samples: Get support for implementing workloads that comply with NIST-based controls.
Resources
Microsoft DoD Certification Meets NIST 800-171 Requirements
NIST 800-171 Compliance Starts with Cybersecurity Documentation
Microsoft Cloud Services FedRAMP Authorizations
NIST 800-171 3.3 Audit and Accountability with Office 365 GCC High
Microsoft and the NIST Cybersecurity Framework
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
National Institute of Standards and Technology
(NIST) Cybersecurity Framework (CSF)
2/5/2021 • 5 minutes to read • Edit Online
NOTE
Microsoft 365 Apps for enterprise enables access to various cloud services, such as Roaming Settings, Licensing, and
OneDrive consumer cloud storage, and may enable access to additional cloud services in the future. Roaming Settings and
Licensing support the standards for HITRUST. OneDrive consumer cloud storage does not, and other cloud services that
are accessible through Microsoft 365 Apps for enterprise and that Microsoft may offer in the future also may not,
support these standards.*
Why are some Office 365 ser vices not in the scope of this cer tification?
Microsoft provides the most comprehensive offerings compared to other cloud service providers. To keep up
with our broad compliance offerings across regions and industries, we include services in the scope of our
assurance efforts based on the market demand, customer feedback, and product lifecycle. If a service is not
included in the current scope of a specific compliance offering, your organization has the responsibility to assess
the risks based on your compliance obligations and determine the way you process data in that service. We
continuously collect feedback from customers and work with regulators and auditors to expand our compliance
coverage to meet your security and compliance needs.
Resources
Microsoft Cloud Services Authorizations
Mapping Microsoft Cyber Offerings to: NIST Cybersecurity Framework (CSF), CIS Controls, ISO27001:2013
and HITRUST CSF
Framework for Improving Critical Infrastructure Cybersecurity
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical
Infrastructure
Microsoft Government Cloud
Online Services Terms
Compliance on the Microsoft Trust Center
U.S. Section 508
11/30/2020 • 2 minutes to read • Edit Online
Resources
Microsoft accessibility page: Explore the ways in which Microsoft innovates so everyone has the ability to
achieve more.
Office 365 Accessibility Center: Office 365 resources for people with disabilities.
Enterprise Disability Answer Desk: Dedicated support for enterprise customers with accessibility questions
about our products and services or compliance.
DHS Trusted Tester Program: Get information about the U.S. Department of Homeland Security (DHS) Trusted
Tester Program, in which Microsoft participates.
Compliance on the Microsoft Trust Center
Family Educational Rights and Privacy Act (FERPA)
2/5/2021 • 3 minutes to read • Edit Online
FERPA overview
The Family Educational Rights and Privacy Act (FERPA) is a US federal law that protects the privacy of students’
education records, including personally identifiable and directory information. FERPA was enacted to ensure that
parents and students age 18 and older can access those records, request changes to them, and control the
disclosure of information, except in specific and limited cases where FERPA allows for disclosure without
consent.
The law applies to schools, school districts, and any other institution that receives funding from the US
Department of Education — that is, virtually all public K–12 schools and school districts, as well as most post-
secondary institutions, both public and private.
Security is central to compliance with FERPA, which requires the protection of student information from
unauthorized disclosures. Educational institutions that use cloud computing need contractual reassurances that
a technology vendor manages sensitive student data appropriately.
Resources
Family Educational Rights and Privacy Act
Electronic Code of Federal Regulations: FERPA
Federal Register: FERPA Final Rule
FERPA implementation guide for Microsoft Azure
Azure FERPA compliance framework mapping
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
North American Electric Reliability Corporation
(NERC)
2/5/2021 • 6 minutes to read • Edit Online
How to implement
NERC CIP Standards and Cloud Computing
Addresses compliance for Registered Entities considering cloud adoption for workloads subject to NERC CIP
standards.
Learn more
Cloud Implementation Guide for NERC Audits
Technical guidance helps Registered Entities with NERC audits of assets deployed in Azure or Azure Government.
Learn more
Resources
NERC Compliance Guidance
NERC Cyber Security - Supply Chain Risk Management
NERC Compliance and Enforcement
NERC Organization and Certification
Microsoft and FedRAMP
Microsoft and CSA STAR Attestation and Certification
Microsoft and SOC 2 Reports
Compliance on the Microsoft Trust Center
Title 23 NYCRR Part 500
2/5/2021 • 4 minutes to read • Edit Online
Resources
Featured resources
New York State Department of Financial Services 23 NYCRR 500: Cybersecurity Requirements For Financial
Services Companies
FAQs: 23 NYCRR Part 500–Cybersecurity
Microsoft Cloud Services: Supporting Compliance with NYDFS Cybersecurity Requirements
Compliance on the Microsoft Trust Center
Other Microsoft resources for financial services
Microsoft business cloud services and financial services
Microsoft Cloud Financial Services Compliance Program
Financial services compliance in Azure
Shared responsibilities for cloud computing-
Dutch Authority for the Financial Markets and the
Central Bank of the Netherlands
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist: Netherlands: Financial firms can get help when conducting risk assessments of
Microsoft business cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Compliance on the Microsoft Trust Center
Australian Prudential Regulation Authority (APRA)
2/5/2021 • 5 minutes to read • Edit Online
APRA overview
The Australian Prudential Regulation Authority (APRA) oversees banks, credit unions, insurance companies, and
other financial services institutions in Australia. Recognizing the momentum towards cloud computing, APRA
has called on regulated entities to implement a thoughtful cloud-adoption strategy with effective governance,
thorough risk assessment, and regular assurance processes. Regulated institutions must comply with the APRA
Prudential Standard CPS 231 Outsourcing when outsourcing a material business activity — any activity that has
the potential, if disrupted, to have a significant impact on the financial institution’s business operations or ability
to manage its risks effectively. Based on its review of outsourcing arrangements involving cloud computing
services submitted to APRA, APRA published specific, detailed guidance in its information paper, Outsourcing
involving cloud computing services to help regulated entities assess cloud providers and services more
effectively and guide them through the regulatory issues of outsourcing to the cloud. When outsourcing,
including to a cloud service, regulated institutions must also review and consider their ongoing compliance with
APRA Prudential Standard CPS 234 Information Security.
Resources
Australian Prudential Regulation Authority
APRA Information Paper Outsourcing involving cloud computing services
Prudential Standard CPS 231 Outsourcing
Prudential Standard CPS 234 Information Security
Microsoft response to the APRA Information Paper on the Cloud
Microsoft cloud services: a compliance checklist for financial institutions in Australia
Microsoft cloud services: compliance with APRA Prudential Standard CPS 234
Microsoft Australia: Cloud in Financial Services
Microsoft Financial Services Compliance Program
Financial services compliance in Azure
Microsoft business cloud services and financial services
Compliance on the Microsoft Trust Center
Financial Authority (AMF) and Prudential Authority
(ACPR) France
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist: France: Financial firms can get help conducting risk assessments of Microsoft business
cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use-case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
Commodity Futures Trading Commission (CFTC)
Rule 1.31(c-d) United States
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Financial services regulation: Compliance map of key US regulatory principles for cloud computing and
Microsoft online services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Microsoft Office 365 Retention Policies
Microsoft Financial Services Blog
Compliance on the Microsoft Trust Center
European Banking Authority (EBA)
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Response to EBA guidance: Microsoft guidance helps EU financial institutions follow EBA recommendations
for cloud adoption.
Financial use cases: Use-case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Financial Compliance Program: Financial institutions can get help with assessing the risks of using Microsoft
cloud services.
Resources
Microsoft Service Trust Portal
Microsoft Cloud Checklist for Financial Institutions in Europe
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Microsoft Financial Services Blog
Compliance on the Microsoft Trust Center
United Kingdom Financial Conduct Authority (FCA)
12/14/2020 • 3 minutes to read • Edit Online
Resources
Microsoft Cloud Checklist for Financial Institutions in the UK
FG 16/5 — Guidance for firms outsourcing to the cloud and other third-party IT services
Enabling compliance: The Microsoft approach to FCA finalized cloud guidance
Microsoft Financial Services Compliance Program
Financial services compliance in Azure
Microsoft business cloud services and financial services
Compliance on the Microsoft Trust Center
Federal Financial Institutions Examination Council
(FFIEC)
2/5/2021 • 3 minutes to read • Edit Online
FFIEC overview
The Federal Financial Institutions Examination Council (FFIEC) is a formal interagency body comprising five
banking regulators that are responsible for US federal government examinations of financial institutions in the
United States. The FFIEC Examiner Education Office publishes IT Examination Handbooks intended for field
examiners from FFIEC member agencies.
The FFIEC Audit IT Examination Handbook contains guidance for these examiners to assess the quality and
effectiveness of IT audit programs of both financial institutions and TSPs. Specifically, it includes mention of SOC
1, SOC 2, and SOC 3 attestation reports of the American Institute of Certified Public Accountants (AICPA) as
examples of independent audit reports. However, the FFIEC recommends that financial institutions not rely
solely on the information contained in these reports, but also use verification and monitoring procedures
discussed in detail in the FFIEC Outsourcing Technology Services IT Examination Handbook.
Resources
Federal Financial Institutions Examination Council (FFIEC)
Compliance Map of Cloud Computing and Regulatory Principles in the US
FFIEC Audit IT Examination Handbook
FFIEC Outsourcing Technology Services IT Examination Handbook
Azure Security and Compliance FFIEC Financial Services Blueprint
About FINMA
The Financial Market Supervisory Authority (Eidgenössische Finanzmarktaufsicht, FINMA) is the regulator of
independent financial markets in Switzerland and is responsible for ensuring that Swiss financial markets
function effectively. It has prudential supervision over banks, insurance companies, exchanges, securities dealers,
and other financial institutions.
The FINMA published Circular 2018/3 Outsourcing–banks and insurers to define the requirements that banks,
securities dealers, and insurance companies must abide by when they outsource to a service provider any
functions that are significant to the company’s business activities. Any company that outsources its business
activities is accountable to the FINMA just as it would be if it carried out the outsourced functions itself.
How to implement
Compliance checklist: Switzerland: Financial firms can get help in conducting risk assessments of Microsoft
business cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Frequently asked questions
Is regulator y approval required?
No. The use of public cloud computing is permitted without an approval by the FINMA, subject always to
compliance with the requirements set out in the regulations and guidelines listed above.
Are there any mandator y terms that must be included in the contract with the cloud ser vices
provider?
Yes. In Part 2 of the Compliance Checklist, we have mapped these terms against the sections in the Microsoft
contractual documents where you find them addressed. In addition, the Swiss Federal Data Protection and
Information Commissioner (FDPIC) supplies a sample contract for transborder outsourcing of data processing.
This is the same as the Standard Contractual Clauses (also known as EU Model Clauses) under the Microsoft
Online Services Terms.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Compliance on the Microsoft Trust Center
Financial Industry Regulatory Authority (FINRA)
Rule 4511(c) United States
2/5/2021 • 3 minutes to read • Edit Online
Microsoft Azure
To evaluate Azure compliance with FINRA Rule 4511(c), Microsoft retained an independent assessment firm that
specializes in records management and information governance, Cohasset Associates. The resulting report, SEC
17a-4(f) & CFTC 1.31 (c-d) Compliance Assessment: Microsoft Azure Storage, encompasses Azure compliance
with FINRA Rule 4511(c), which defers to the format and media requirements of SEC Rule 17a-4(f).
Cohasset validated that Azure Immutable Blob Storage with the Policy Lock option, when used to retain time-
based Blobs in a non-erasable and non-rewritable (WORM) format, meets relevant FINRA storage requirements.
Each Blob (record) is protected from being modified, overwritten, or deleted until the required retention period
has expired and any associated legal holds have been released.
Software providers and partners with sensitive workloads can now rely on Azure Immutable Blob Storage as a
one-stop shop cloud solution for records retention and immutable storage. Financial institutions can now build
their own applications taking advantage of these features while remaining compliant.
Microsoft 365
For FINRA Rule 4511(c) requirements, Cohasset validated that Microsoft 365 includes archiving features that
enable regulated customers, including broker-dealers, to store data in a manner that helps them comply with
SEC requirements for records retention. Retention features in Microsoft 365 help preserve a wide range of data,
including email, voicemail, shared documents, instant messages, and third-party data. In particular, archiving in
Microsoft 365 enables customers to set global or granular messaging retention policies to store data for a
defined period and beyond in a non-rewriteable, non-erasable format.
How to implement
Financial ser vices regulation : Compliance map of key US regulatory principles for cloud computing and
Microsoft online services. Learn more
Risk Assessment & Compliance Guide : Create a governance model for risk assessment of Microsoft
cloud services, and regulator notification. Learn more
Financial use cases : Use case overviews, tutorials, and other resources to build Azure solutions for
financial services. Learn more
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Microsoft Office 365 Retention Policies
Microsoft Financial Services Blog
Compliance on the Microsoft Trust Center
Center for Financial Industry Information Systems
(FISC)
11/30/2020 • 2 minutes to read • Edit Online
FISC overview
The Center for Financial Industry Information Systems (FISC) is a not-for-profit organization established by the
Japanese Ministry of Finance in 1984 to promote security in banking computer systems in Japan. Some 700
corporations in Japan are supporting members, including major financial institutions, insurance and credit
companies, securities firms, computer manufacturers, and telecommunications enterprises.
In collaboration with its member institutions, the Bank of Japan, and the Financial Services Agency (a
government organization responsible for overseeing banking, securities and exchange, and insurance in Japan),
the FISC created guidelines for the security of banking information systems. These include basic auditing
standards for computer system controls, contingency planning in the event of a disaster, and the development of
security policies and standards encompassed in more than 300 controls.
Although the application of these guidelines in a cloud computing environment is not required by regulation,
most financial institutions in Japan that implement cloud services have built information systems that satisfy
these security standards, and it can be difficult to justify diverging from them. (The latest guidelines, Version 8
Supplemental Revised, issued in 2015, added two revisions relating to the use of cloud services by financial
institutions and countermeasures against cyberattack.)
Conformance with this framework is not required by regulation, and not audited or otherwise validated by the
FISC.
Resources
Microsoft Online Services Terms
FISC Security Guidelines/Safety Standards
FISC Report on Usage of Cloud Computing
Compliance on the Microsoft Trust Center
Resources in Japanese
FISC
Financial Supervisory Authority (FSA) Denmark
2/5/2021 • 3 minutes to read • Edit Online
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
Gramm-Leach-Bliley Act (GLBA)
2/5/2021 • 2 minutes to read • Edit Online
GLBA overview
The Gramm-Leach-Bliley Act (GLBA) is a US law that reformed the financial services industry, allowing
commercial and investment banks, securities firms, and insurance companies to consolidate, and addressed
concerns about protecting consumer privacy. It required the Federal Trade Commission (FTC) and other financial
services regulators to implement regulations to address such privacy provisions as the Financial Privacy Rule
and the Safeguards Rule. GLBA requirements to safeguard sensitive consumer data apply to financial
institutions that offer financial products and services to consumers, such as loans, investment advice, and
insurance. The FTC is charged with enforcing compliance.
Resources
Gramm-Leach-Bliley Act
Azure Financial Services Cloud Risk Assessment Tool
Office 365 Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
How to implement
Compliance checklist: Poland: Financial firms can get help in conducting risk assessments of Microsoft
business cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Privacy in Microsoft Cloud: Get details on Microsoft privacy principles and standards and on privacy laws
specific to Poland.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
Monetary Authority of Singapore (MAS) and
Association of Banks in Singapore (ABS)
11/30/2020 • 5 minutes to read • Edit Online
Resources
MAS Guidelines on Outsourcing Risk Management
Frequently Asked Questions on MAS Guidelines on Outsourcing
ABS Cloud Computing Implementation Guide 1.1
Navigating your way to the cloud: the Microsoft response to MAS Outsourcing Guidelines and the ABS Cloud
Implementation Guide**
Microsoft compliance checklist
How to implement
Compliance checklist: Belgium: Financial institutions can get help in conducting risk assessments of Microsoft
cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
Office of the Superintendent of Financial Institutions
(OSFI) Canada
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist: Canada: Financial firms can get help in conducting risk assessments of Microsoft
business cloud services.
Privacy in Microsoft Cloud: Get details on Microsoft privacy principles and standards and on privacy laws
specific to Canada.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Industry use cases for Azure: Use case overviews, tutorials, and other resources to build Azure solutions for
financial services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Compliance on the Microsoft Trust Center
Payment Card Industry (PCI) Data Security
Standard (DSS)
2/5/2021 • 5 minutes to read • Edit Online
Resources
PCI Security Standards Council
PCI Data Security Standard
Azure PCI DSS 3.2.1 Blueprint
PCI DSS Quick Reference Guide
Compliance on the Microsoft Trust Center
Reserve Bank of India (RBI) and Insurance
Regulatory and Development Authority of India
(IRDAI)
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist for India: Financial firms can get help conducting risk assessments of Microsoft
business cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases for Azure: Use case overviews, tutorials, and other resources to build Azure solutions for
financial services.
Resources
Microsoft and MeitY
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
Securities and Exchange Commission (SEC) Rule
17a-4(f ) United States
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Financial services regulation
Compliance map of key US regulatory principles for cloud computing and Microsoft online services. Learn more
Risk Assessment & Compliance Guide
Create a governance model for risk assessment of Microsoft cloud services, and regulator notification. Learn
more
Financial use cases
Use case overviews, tutorials, and other resources to build Azure solutions for financial services. Learn more
Resources
Archiving in Microsoft Office 365, Data Retention, and Rule 17a-4
Compliance Microsoft Financial Services
Compliance Program Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Microsoft Office 365 Retention Policies
Microsoft Financial Services Community
Compliance on the Microsoft Trust Center
Securities and Exchange Commission: Regulation
Systems Compliance and Integrity (SCI)
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Regulation SCI Implementation Guide: Maps Azure capabilities against the regulation and details the shared
responsibility for compliance.
Designing reliable Azure applications: A brief overview of how to build reliability into each step of Azure
application design.
Designing highly available applications: How developers can help ensure that their Azure Storage
applications are highly available.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Resources
SEC Responses to Frequently Asked Questions Concerning Regulation SCI
Business continuity and disaster recovery (BCDR): Azure Paired Regions
Compliance Map of Cloud Computing Regulatory Principles and Microsoft Online Services
Microsoft Cloud Financial Services Compliance Program
Financial services compliance in Azure
Microsoft Financial Services
Microsoft and SEC Rule 17a-4
Compliance on the Microsoft Trust Center
Service Organization Controls (SOC)
2/17/2021 • 5 minutes to read • Edit Online
Resources
Better protect your data by using Microsoft cloud services
Service Organization Control (SOC) Reports
SSAE 16 Overview
ISAE 3402 Overview
Microsoft Online Services Terms
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
Sarbanes-Oxley Act of 2002 (SOX)
11/30/2020 • 3 minutes to read • Edit Online
SOX overview
The Sarbanes-Oxley Act of 2002 is a US federal law administered by the Securities and Exchange Commission
(SEC). Among other directives, SOX requires publicly traded companies to have proper internal control
structures in place to validate that their financial statements accurately reflect their financial results.
The SEC does not define or impose a SOX certification process. Instead, it provides broad guidelines for the
companies it regulates to determine how to comply with SOX reporting requirements.
Resources
Azure Guidance for Sarbanes-Oxley
Microsoft Financial Services Compliance Program
Financial services compliance in Azure
Microsoft business cloud services and financial services
Shared responsibilities for cloud computing
Compliance on the Microsoft Trust Center
TruSight
2/5/2021 • 2 minutes to read • Edit Online
About TruSight
TruSight was founded by a consortium of leading financial services companies, including American Express,
Bank of America, Bank of New York Mellon, JPMorgan Chase, and Wells Fargo. Their goal was to harness their
collective financial expertise and combine their best practices into a consistent assessment methodology that
elevates standards and simplifies the process of managing third-party relationships and the associated risk.
How to implement
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
US financial services regulation: How Microsoft online services align with key regulatory expectations for US
financial institutions.
Resources
Microsoft Cloud Financial Services Compliance Program
Financial services compliance in Azure
Microsoft business cloud services and financial services
Shared responsibilities for cloud computing
Compliance on the Microsoft Trust Center
Health Data Hosting (HDS) France
11/30/2020 • 3 minutes to read • Edit Online
About HDS
The Hébergeurs de Données de Santé (HDS) certification is required for entities such as cloud service providers
that host the personal health data governed by French laws and collected for delivering preventive, diagnostic,
and other health services. The HDS regulation was issued by ASIP SANTÉ which, under the French Ministry of
Health, is responsible for promoting electronically based healthcare solutions in France.
Hosting of health data is regulated under French law by the French Public Health Code (Article L.1111-8), which
stipulates that any healthcare organization—hospitals, pharmaceutical companies, laboratories—that handles
personal medical data must use a service provider that is HDS-certified. In April 2018, new Articles R1111-8-8
to R1111-11 of the Public Health Code took effect, changing the accreditation procedure from an authorization
by the French Ministry of Health to certification by an authorized body such as BSI.
HDS certification requires that service providers implement measures that keep personal health data secure,
confidential, and accessible by patients. These measures include strong authentication and authorization
procedures, robust backup systems, and powerful encryption methods. HDS also specifies mandatory
provisions that must be included in contracts with the cloud service provider. These requirements apply no
matter where the data is stored.
How to implement
Contractual terms : French Public Health code requires the execution of specific contractual terms between
the health data hosting service or cloud service provider and its customers. Eligible customers must reach
out to their Microsoft licensing point of contact to enter into these specific contractual terms before hosting
health personal data on Microsoft online services.
Health and life sciences : Case overviews, solution guides, tutorials, and other resources to help build
Azure solutions.
Resources
Microsoft Online Services Terms
Microsoft HDS certification blog
Azure France
Azure for health
Security at Microsoft
Compliance on the Microsoft Trust Center
Health Insurance Portability and Accountability
(HIPAA) & HITECH Acts
2/17/2021 • 6 minutes to read • Edit Online
Resources
HIPAA Omnibus Rule (The final regulations-modifying HIPAA rules)
Microsoft Common Controls Hub Compliance Framework
Microsoft Online Services Terms
Microsoft Government Cloud
Understanding HIPAA Compliance with Azure(May 19, 2016)
Azure HIPAA HITRUST blueprint sample
Compliance on the Microsoft Trust Center
Health Information Trust Alliance (HITRUST)
Common Security Framework (CSF)
2/17/2021 • 6 minutes to read • Edit Online
NOTE
Microsoft 365 Apps for enterprise enables access to various cloud services, such as Roaming Settings, Licensing, and
OneDrive consumer cloud storage, and may enable access to additional cloud services in the future. Roaming Settings and
Licensing support the standards for HITRUST. OneDrive consumer cloud storage does not, and other cloud services that
are accessible through Microsoft 365 Apps for enterprise and that Microsoft may offer in the future also may not,
support these standards.*
Why are some Office 365 ser vices not in the scope of this cer tification?
Microsoft provides the most comprehensive offerings compared to other cloud service providers. To keep up
with our broad compliance offerings across regions and industries, we include services in the scope of our
assurance efforts based on the market demand, customer feedback, and product lifecycle. If a service is not
included in the current scope of a specific compliance offering, your organization has the responsibility to assess
the risks based on your compliance obligations and determine the way you process the data in that service. We
continuously collect feedback from customers and work with regulators and auditors to expand our compliance
coverage to meet your security and compliance needs.
Does Microsoft cer tification mean that if my organization uses Azure or Office 365, it is compliant
with HITRUST CSF?
When you store your data in a SaaS like Office 365, it’s a shared responsibility between Microsoft and your
organization to achieve compliance. Microsoft manages majority of the infrastructure controls including
physical security, network controls, application level controls, etc., and your organization has the responsibility to
manage access controls and protect your sensitive data. The Office 365 HITRUST certification demonstrates the
compliance of Microsoft’s control framework. Building on that, your organization needs to implement and
maintain your own data protection controls to meet HITRUST CSF requirements.
Does Microsoft provide guidance for my organization to implement appropriate controls when
using Office 365?
Yes, you can find recommended customer actions in Compliance Score, cross-Microsoft Cloud solutions that
help your organization meet complex compliance obligations when using cloud services. Specifically, for
HITRUST CSF, we recommend that you perform risk assessments using the NIST 800-53 and NIST CSF
assessments in Compliance Score. In the assessments, we provide you with step-by-step guidance and the
Microsoft solutions you can use to implement your data protection controls. You can learn more about
Compliance Score in Microsoft Compliance Score.
How do I engage with Microsoft?
Log in to the HITRUST MyCSF® tool and pre-populate your assessment for your solution hosted on Microsoft
Azure with either fully inherited or shared responsibility controls for Azure. A Microsoft HITRUST Administrator
will then complete their part of the assessment using their account on the MyCSF® tool.
Resources
HITRUST Alliance
HITRUST CSF 9.3
Understanding and Leveraging the CSF
Find out more about the HITRUST Shared Responsibility Program
Compliance on the Microsoft Trust Center
Minimum Acceptable Risk Standards for Exchanges
(MARS-E) 2.0 Framework
11/30/2020 • 3 minutes to read • Edit Online
Resources
MARS-E regulatory guidance, MARS-E Document Suite, Version 2.0
Volume II: Minimum acceptable risk standards for exchanges
Volume III: Catalog of minimum acceptable risk security and privacy controls for exchanges
Microsoft compliance framework for online services white paper
Microsoft cloud services terms
Compliance on the Microsoft Trust Center
NEN 7510
1/26/2021 • 3 minutes to read • Edit Online
NOTE
Implementing the full list of controls is not the primary purpose of NEN 7510 (although the large coverage of Microsoft
Online Services does help). NEN 7510 mandates the implementation of a risk-based information security system that can
be used by an organization to determine which controls are applicable to them.
Resources
About NEN
NEN 7510:2011 standard
Compliance on the Microsoft Trust Center
Food and Drug Administration CFR Title 21 Part 11
2/5/2021 • 5 minutes to read • Edit Online
Resources
Azure GxP Qualification Guidelines
Code of Federal Regulations Title 21
FDA guidance for industry Part 11: Electronic records and signatures
Qualification guidelines for Azure
Qualification guidelines for Office 365
Microsoft Common Controls Hub Compliance Framework
Microsoft Online Services Terms
Microsoft Cloud for Government
Compliance on the Microsoft Trust Center
Good Clinical, Laboratory, and Manufacturing
Practices (GxP)
11/30/2020 • 3 minutes to read • Edit Online
About GxP
The term GxP is a general abbreviation for 'good practice' guidelines and regulations. The 'x' represents a
particular field—clinical (GCP), manufacturing (GMP), distribution (GDP), laboratory (GLP), agriculture (GAP),
and so on. There is no single regulatory entity or administration; each country has its own guidelines and
regulators, although requirements are similar from country to country. GxP regulations include those
requirements outlined in the US Food and Drug Administration (FDA) CFR Title 21 Part 11 and EudraLex Volume
4—GMP Guidelines, Annex 11 in the European Union (EU).
Regulatory goals aim to make sure that businesses in regulated industries manufacture products that are safe to
use and meet stringent quality standards during the production process. Computerized systems that use GxP
processes require validation of adherence to GxP requirements and are considered qualified when the system
can demonstrate its ability to fulfill them.
How to implement
Microsoft 365 GxP Guidelines: A whitepaper for using Microsoft 365 while adhering to GxP best practices
and regulations.
Microsoft Dynamics 365 GxP Guidelines: A whitepaper for using Microsoft Dynamics 365 while adhering to
GxP best practices and regulations.
Azure GxP Guidelines: A comprehensive tool set for using Azure while adhering to GxP best practices and
regulations.
Using Azure with GxP Systems: Help for life science organizations in establishing a strategy for building GxP
applications.
FDA CFR Title 21 Part 11 Guides: Get help establishing an Azure and Office 365 qualification strategy that
complies with FDA guidelines for electronic records.
Resources
Microsoft and FDA CFR Title 21 Part 11
Microsoft and ISO/IEC 27001
Microsoft and ISO 9001
Compliance on the Microsoft Trust Center
Trusted Information Security Assessment Exchange
(TISAX) Germany
2/5/2021 • 3 minutes to read • Edit Online
About TISAX
To help secure the ever-increasing connectivity in the automotive industry, the German Association of the
Automotive Industry (Verband der Automobilindustrie, VDA) developed a catalogue of criteria for assessing
information security. The VDA Information Security Assessment (German and English) is based on the
fundamentals of the international ISO/IEC 27001 and 27002 standards adapted to the automotive industry. In
2017, it was updated to cover controls for the use of cloud services.
VDA member companies used this instrument both for internal security assessments and for assessments of
suppliers, service providers, and other partners that process sensitive information on their behalf. However,
because these evaluations were handled individually by each company, it created a burden on partners and
duplicated effort on the part of VDA members.
To help streamline evaluations, the VDA set up a common assessment and exchange mechanism, the Trusted
Information Security Assessment Exchange (TISAX). The catalogue of underlying TISAX requirements,
Questionnaire for Checking Information Security Assessment and Information Security Management, Vers. 4
(German and English), provides common standards for IT security measures, and enables companies registered
in TISAX to share assessment results. The VDA entrusted a neutral third party, the ENX Association, with TISAX
implementation. In that capacity, it accredits audit providers (auditors), maintains the accreditation criteria and
assessment requirements, and monitors the quality of implementation and assessment results.
How to implement
Manufacturing use cases
Use case overviews, solution guides, tutorials, and other resources to help build Azure solutions.
Resources
TISAX Frequently Asked Questions
Volkswagen and Microsoft announce strategic partnership
Office in your Car: BMW offers Skype for Business (German)
Connecting vehicles for the long haul: Daimler
Continental is adopting Microsoft Office 365 to boost productivity
Microsoft and ISO/IEC 27001:2013
Compliance on the Microsoft Trust Center
Content Delivery & Security Association (CDSA)
Content Protection & Security (CPS) Standard
2/5/2021 • 3 minutes to read • Edit Online
CDSA overview
The Content Delivery & Security Association (CDSA) is a worldwide forum advocating for the innovative and
responsible delivery and storage of entertainment, software, and information content.
The CDSA Content Protection & Security (CPS) Standard provides guidance and requirements for securing
media assets within a Content Security Management System (CSMS). The standard specifies a set of controls
designed to ensure the integrity of intellectual property and the confidentiality and security of media assets at
every stage of the digital media supply chain.
The CPS certification audit is administered directly by the CDSA and consists of over 300 distinct controls that
help secure and manage physical datacenters, harden services, and protect storage facilities. All controls are
optimized to handle sensitive and valuable media assets. Once a system is validated by the CDSA assessor, the
CDSA issues a certificate of compliance. To maintain compliance, the certified entity must submit the results of
annual audits to the CDSA.
Resources
CDSA
CPS Standard
Azure Media Services Certificate of Compliance
How Azure Media Services earned CDSA security certification
Compliance on the Microsoft Trust Center
Understanding CDSA and Azure compliance
Digital Production Partnership (DPP) United
Kingdom
2/5/2021 • 2 minutes to read • Edit Online
How to implement
Asset Management Hardening Guide: Best practices in Azure protect pre-release content from unauthorized
disclosure, change, or deletion.
Azure Media Services: Build solutions that achieve high-definition video encoding and broadcast-quality
video streaming.
Resources
DPP Committed to Security Program Broadcast Checklist User Guide
NABA and DPP Broadcasters Unite to Promote Cyber Security Requirements for Suppliers
Compliance on the Microsoft Trust Center
Federation Against Copyright Theft (FACT)
11/30/2020 • 2 minutes to read • Edit Online
FACT overview
Copyrighted content comes in many forms, pictures, videos, music, contracts, scripts, workflows, art,
architecture, and more, and represents the core assets of many businesses. Piracy threatens to undermine the
very existence of these businesses through the unlawful distribution of intellectual property for illicit gain or
market disruption. As production and post-production workflows increasingly move to the cloud, the black
market for intellectual property is similarly moving away from physical media toward online mechanisms.
Resources
Federation Against Copyright Theft
Fact Security Certification Program
CDSA certification of Azure Media Services
Azure ISO 27001 certification
MPAA Assessment
Azure Responses to CSA CAIQ v3.0.1
Compliance on the Microsoft Trust Center
Motion Picture Association of America (MPAA)
2/5/2021 • 3 minutes to read • Edit Online
MPAA overview
The Motion Picture Association of America (MPAA) provides best-practices guidance and control frameworks to
help major studio partners and vendors design infrastructure and solutions to ensure the security of digital film
assets. The MPAA also performs content security assessments on behalf of its member companies: Walt Disney
Studios Motion Pictures, Paramount Pictures Corporation, Sony Pictures Entertainment Inc., Twentieth Century
Fox Film Corporation, Universal City Studios LLC, and Warner Bros. Entertainment Inc.
Resources
Motion Picture Association of America
MPAA Common Guidelines
MPAA Application and Cloud Guidelines
CSA STAR Azure Self-Assessment
Azure Responses to CSA CAIQ v3.0.1
Compliance on the Microsoft Trust Center
Title 23 NYCRR Part 500
2/5/2021 • 4 minutes to read • Edit Online
Resources
Featured resources
New York State Department of Financial Services 23 NYCRR 500: Cybersecurity Requirements For Financial
Services Companies
FAQs: 23 NYCRR Part 500–Cybersecurity
Microsoft Cloud Services: Supporting Compliance with NYDFS Cybersecurity Requirements
Compliance on the Microsoft Trust Center
Other Microsoft resources for financial services
Microsoft business cloud services and financial services
Microsoft Cloud Financial Services Compliance Program
Financial services compliance in Azure
Shared responsibilities for cloud computing-
Dutch Authority for the Financial Markets and the
Central Bank of the Netherlands
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist: Netherlands: Financial firms can get help when conducting risk assessments of
Microsoft business cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Compliance on the Microsoft Trust Center
Financial Authority (AMF) and Prudential Authority
(ACPR) France
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist: France: Financial firms can get help conducting risk assessments of Microsoft business
cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use-case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
Content Delivery & Security Association (CDSA)
Content Protection & Security (CPS) Standard
2/5/2021 • 3 minutes to read • Edit Online
CDSA overview
The Content Delivery & Security Association (CDSA) is a worldwide forum advocating for the innovative and
responsible delivery and storage of entertainment, software, and information content.
The CDSA Content Protection & Security (CPS) Standard provides guidance and requirements for securing
media assets within a Content Security Management System (CSMS). The standard specifies a set of controls
designed to ensure the integrity of intellectual property and the confidentiality and security of media assets at
every stage of the digital media supply chain.
The CPS certification audit is administered directly by the CDSA and consists of over 300 distinct controls that
help secure and manage physical datacenters, harden services, and protect storage facilities. All controls are
optimized to handle sensitive and valuable media assets. Once a system is validated by the CDSA assessor, the
CDSA issues a certificate of compliance. To maintain compliance, the certified entity must submit the results of
annual audits to the CDSA.
Resources
CDSA
CPS Standard
Azure Media Services Certificate of Compliance
How Azure Media Services earned CDSA security certification
Compliance on the Microsoft Trust Center
Understanding CDSA and Azure compliance
Center for Internet Security (CIS) Benchmarks
2/5/2021 • 4 minutes to read • Edit Online
How to implement
CIS Benchmark for Azure: Get prescriptive guidance for establishing a secure baseline configuration for
Azure.
Microsoft 365 security roadmap: Minimize the potential of a data breach or compromised account by
following this roadmap.
Windows security baselines: Follow these guidelines for effective use of security baselines in your
organization.
CIS Controls Cloud Companion Guide: Get guidance on applying security best practices in CIS Controls
Version 7 to cloud environments.
Resources
CIS best practices for securely using Microsoft 365
Windows 10 security policy settings
Windows 10 enterprise security
Compliance on the Microsoft Trust Center
Cloud Security Alliance (CSA) STAR attestation
2/17/2021 • 3 minutes to read • Edit Online
Resources
Azure standard response for request for information
Azure Cloud Security Alliance CAIQ
Office 365 Mapping of CSA Cloud Control Matrix
Cloud Security Alliance
CSA Security, Trust & Assurance Registry (STAR)
SOC 1, 2, and 3 Reports
Cloud Controls Matrix (CCM)
Microsoft Common Controls Hub Compliance Framework
Compliance on the Microsoft Trust Center
US DoE 10 CFR Part 810
11/30/2020 • 2 minutes to read • Edit Online
How to implement
NERC CIP Standards & Cloud Computing: Guidance for electric utilities and Registered Entities deploying
workloads on Azure or Azure Government.
Resources
Azure Cloud Services and US Export Controls
Microsoft and FedRAMP
Microsoft and DoD
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
Digital Production Partnership (DPP) United
Kingdom
2/5/2021 • 2 minutes to read • Edit Online
How to implement
Asset Management Hardening Guide: Best practices in Azure protect pre-release content from unauthorized
disclosure, change, or deletion.
Azure Media Services: Build solutions that achieve high-definition video encoding and broadcast-quality
video streaming.
Resources
DPP Committed to Security Program Broadcast Checklist User Guide
NABA and DPP Broadcasters Unite to Promote Cyber Security Requirements for Suppliers
Compliance on the Microsoft Trust Center
US Export Administration Regulations (EAR)
2/5/2021 • 5 minutes to read • Edit Online
How to implement
Overview of US export controls and guidance for customers assessing their obligations under the EAR.
Azure
Office 365
Resources
Azure standard response for request for information
Microsoft and the CSA STAR Self-Assessment
Microsoft and ISO/IEC 27001
European Union Model Clauses
11/30/2020 • 4 minutes to read • Edit Online
Resources
EU Standards Organization
EU Model Clauses
EU Data Protection Directive
European Data Protection Board
EU Model Clauses FAQ for Dynamics 365 and Office 365
Microsoft and the EU-U.S. Privacy Shield
Microsoft Common Controls Hub Compliance Framework
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
European Banking Authority (EBA)
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Response to EBA guidance: Microsoft guidance helps EU financial institutions follow EBA recommendations
for cloud adoption.
Financial use cases: Use-case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Financial Compliance Program: Financial institutions can get help with assessing the risks of using Microsoft
cloud services.
Resources
Microsoft Service Trust Portal
Microsoft Cloud Checklist for Financial Institutions in Europe
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Microsoft Financial Services Blog
Compliance on the Microsoft Trust Center
EU-US and Swiss-US Privacy Shield Frameworks
2/5/2021 • 4 minutes to read • Edit Online
How to implement
Privacy in the Microsoft Cloud — Get details on Microsoft privacy principles and standards and our approach to
regulatory compliance.
- Learn more
Data protection in Azure — Azure provides customers with strong data security, both by default and as
customer options.
- Learn more
FACT overview
Copyrighted content comes in many forms, pictures, videos, music, contracts, scripts, workflows, art,
architecture, and more, and represents the core assets of many businesses. Piracy threatens to undermine the
very existence of these businesses through the unlawful distribution of intellectual property for illicit gain or
market disruption. As production and post-production workflows increasingly move to the cloud, the black
market for intellectual property is similarly moving away from physical media toward online mechanisms.
Resources
Federation Against Copyright Theft
Fact Security Certification Program
CDSA certification of Azure Media Services
Azure ISO 27001 certification
MPAA Assessment
Azure Responses to CSA CAIQ v3.0.1
Compliance on the Microsoft Trust Center
United Kingdom Financial Conduct Authority (FCA)
12/14/2020 • 3 minutes to read • Edit Online
Resources
Microsoft Cloud Checklist for Financial Institutions in the UK
FG 16/5 — Guidance for firms outsourcing to the cloud and other third-party IT services
Enabling compliance: The Microsoft approach to FCA finalized cloud guidance
Microsoft Financial Services Compliance Program
Financial services compliance in Azure
Microsoft business cloud services and financial services
Compliance on the Microsoft Trust Center
Federal Financial Institutions Examination Council
(FFIEC)
2/5/2021 • 3 minutes to read • Edit Online
FFIEC overview
The Federal Financial Institutions Examination Council (FFIEC) is a formal interagency body comprising five
banking regulators that are responsible for US federal government examinations of financial institutions in the
United States. The FFIEC Examiner Education Office publishes IT Examination Handbooks intended for field
examiners from FFIEC member agencies.
The FFIEC Audit IT Examination Handbook contains guidance for these examiners to assess the quality and
effectiveness of IT audit programs of both financial institutions and TSPs. Specifically, it includes mention of SOC
1, SOC 2, and SOC 3 attestation reports of the American Institute of Certified Public Accountants (AICPA) as
examples of independent audit reports. However, the FFIEC recommends that financial institutions not rely
solely on the information contained in these reports, but also use verification and monitoring procedures
discussed in detail in the FFIEC Outsourcing Technology Services IT Examination Handbook.
Resources
Federal Financial Institutions Examination Council (FFIEC)
Compliance Map of Cloud Computing and Regulatory Principles in the US
FFIEC Audit IT Examination Handbook
FFIEC Outsourcing Technology Services IT Examination Handbook
Azure Security and Compliance FFIEC Financial Services Blueprint
About FINMA
The Financial Market Supervisory Authority (Eidgenössische Finanzmarktaufsicht, FINMA) is the regulator of
independent financial markets in Switzerland and is responsible for ensuring that Swiss financial markets
function effectively. It has prudential supervision over banks, insurance companies, exchanges, securities dealers,
and other financial institutions.
The FINMA published Circular 2018/3 Outsourcing–banks and insurers to define the requirements that banks,
securities dealers, and insurance companies must abide by when they outsource to a service provider any
functions that are significant to the company’s business activities. Any company that outsources its business
activities is accountable to the FINMA just as it would be if it carried out the outsourced functions itself.
How to implement
Compliance checklist: Switzerland: Financial firms can get help in conducting risk assessments of Microsoft
business cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Frequently asked questions
Is regulator y approval required?
No. The use of public cloud computing is permitted without an approval by the FINMA, subject always to
compliance with the requirements set out in the regulations and guidelines listed above.
Are there any mandator y terms that must be included in the contract with the cloud ser vices
provider?
Yes. In Part 2 of the Compliance Checklist, we have mapped these terms against the sections in the Microsoft
contractual documents where you find them addressed. In addition, the Swiss Federal Data Protection and
Information Commissioner (FDPIC) supplies a sample contract for transborder outsourcing of data processing.
This is the same as the Standard Contractual Clauses (also known as EU Model Clauses) under the Microsoft
Online Services Terms.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Compliance on the Microsoft Trust Center
Gramm-Leach-Bliley Act (GLBA)
2/5/2021 • 2 minutes to read • Edit Online
GLBA overview
The Gramm-Leach-Bliley Act (GLBA) is a US law that reformed the financial services industry, allowing
commercial and investment banks, securities firms, and insurance companies to consolidate, and addressed
concerns about protecting consumer privacy. It required the Federal Trade Commission (FTC) and other financial
services regulators to implement regulations to address such privacy provisions as the Financial Privacy Rule
and the Safeguards Rule. GLBA requirements to safeguard sensitive consumer data apply to financial
institutions that offer financial products and services to consumers, such as loans, investment advice, and
insurance. The FTC is charged with enforcing compliance.
Resources
Gramm-Leach-Bliley Act
Azure Financial Services Cloud Risk Assessment Tool
Office 365 Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
NOTE
Microsoft 365 Apps for enterprise enables access to various cloud services, such as Roaming Settings, Licensing, and
OneDrive consumer cloud storage, and may enable access to additional cloud services in the future. Roaming Settings and
Licensing support the standards for HITRUST. OneDrive consumer cloud storage does not, and other cloud services that
are accessible through Microsoft 365 Apps for enterprise and that Microsoft may offer in the future also may not,
support these standards.*
Why are some Office 365 ser vices not in the scope of this cer tification?
Microsoft provides the most comprehensive offerings compared to other cloud service providers. To keep up
with our broad compliance offerings across regions and industries, we include services in the scope of our
assurance efforts based on the market demand, customer feedback, and product lifecycle. If a service is not
included in the current scope of a specific compliance offering, your organization has the responsibility to assess
the risks based on your compliance obligations and determine the way you process the data in that service. We
continuously collect feedback from customers and work with regulators and auditors to expand our compliance
coverage to meet your security and compliance needs.
Does Microsoft cer tification mean that if my organization uses Azure or Office 365, it is compliant
with HITRUST CSF?
When you store your data in a SaaS like Office 365, it’s a shared responsibility between Microsoft and your
organization to achieve compliance. Microsoft manages majority of the infrastructure controls including
physical security, network controls, application level controls, etc., and your organization has the responsibility to
manage access controls and protect your sensitive data. The Office 365 HITRUST certification demonstrates the
compliance of Microsoft’s control framework. Building on that, your organization needs to implement and
maintain your own data protection controls to meet HITRUST CSF requirements.
Does Microsoft provide guidance for my organization to implement appropriate controls when
using Office 365?
Yes, you can find recommended customer actions in Compliance Score, cross-Microsoft Cloud solutions that
help your organization meet complex compliance obligations when using cloud services. Specifically, for
HITRUST CSF, we recommend that you perform risk assessments using the NIST 800-53 and NIST CSF
assessments in Compliance Score. In the assessments, we provide you with step-by-step guidance and the
Microsoft solutions you can use to implement your data protection controls. You can learn more about
Compliance Score in Microsoft Compliance Score.
How do I engage with Microsoft?
Log in to the HITRUST MyCSF® tool and pre-populate your assessment for your solution hosted on Microsoft
Azure with either fully inherited or shared responsibility controls for Azure. A Microsoft HITRUST Administrator
will then complete their part of the assessment using their account on the MyCSF® tool.
Resources
HITRUST Alliance
HITRUST CSF 9.3
Understanding and Leveraging the CSF
Find out more about the HITRUST Shared Responsibility Program
Compliance on the Microsoft Trust Center
US Internal Revenue Service Publication 1075
2/5/2021 • 4 minutes to read • Edit Online
Resources
IRS Publication 1075
IRS Safeguards Program
Microsoft Common Controls Hub Compliance Framework
Microsoft Cloud for Government
Compliance on the Microsoft Trust Center
ISO/IEC 27018 Code of Practice for Protecting
Personal Data in the Cloud
2/17/2021 • 5 minutes to read • Edit Online
Resources
ISO/IEC 27018:2014 code of practice
Microsoft Common Controls Hub Compliance Framework
Data access policies for Microsoft enterprise cloud and technical services
Microsoft Online Services Terms
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
ISO 9001:2015 Quality Management Systems
Standards
2/17/2021 • 2 minutes to read • Edit Online
Resources
ISO 9001:2015—Quality management
ISO 9001: 2015 standard (requirements for purchase)
ISO 9000: 2015 (fundamentals and vocabulary for purchase)
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
International Traffic in Arms Regulations (ITAR)
11/30/2020 • 2 minutes to read • Edit Online
ITAR overview
The US Department of State is responsible for managing the export and temporary import of defense articles
(meaning any item or technical data designated under the US Munitions List, as described in Title 22 CFR 121.1)
that are governed by the Arms Export Control Act (Title 22 USC 2778) and the International Traffic in Arms
Regulations (ITAR) (Title 22 CFR 120–130). The Directorate for Defense Trade Controls (DDTC) is responsible for
managing entities governed under these programs.
Resources
DDTC ITAR
ITAR Title 22 CFR 120–130
Using Azure Government with ITAR controlled data
Azure Government
Office 365 U.S. Government
Compliance on the Microsoft Trust Center
Financial Supervision Authority (KNF) Poland
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist: Poland: Financial firms can get help in conducting risk assessments of Microsoft
business cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Privacy in Microsoft Cloud: Get details on Microsoft privacy principles and standards and on privacy laws
specific to Poland.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
Minimum Acceptable Risk Standards for Exchanges
(MARS-E) 2.0 Framework
11/30/2020 • 3 minutes to read • Edit Online
Resources
MARS-E regulatory guidance, MARS-E Document Suite, Version 2.0
Volume II: Minimum acceptable risk standards for exchanges
Volume III: Catalog of minimum acceptable risk security and privacy controls for exchanges
Microsoft compliance framework for online services white paper
Microsoft cloud services terms
Compliance on the Microsoft Trust Center
Motion Picture Association of America (MPAA)
2/5/2021 • 3 minutes to read • Edit Online
MPAA overview
The Motion Picture Association of America (MPAA) provides best-practices guidance and control frameworks to
help major studio partners and vendors design infrastructure and solutions to ensure the security of digital film
assets. The MPAA also performs content security assessments on behalf of its member companies: Walt Disney
Studios Motion Pictures, Paramount Pictures Corporation, Sony Pictures Entertainment Inc., Twentieth Century
Fox Film Corporation, Universal City Studios LLC, and Warner Bros. Entertainment Inc.
Resources
Motion Picture Association of America
MPAA Common Guidelines
MPAA Application and Cloud Guidelines
CSA STAR Azure Self-Assessment
Azure Responses to CSA CAIQ v3.0.1
Compliance on the Microsoft Trust Center
National Bank of Belgium (NBB) and the Financial
Services and Markets Authority (FSMA)
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Compliance checklist: Belgium: Financial institutions can get help in conducting risk assessments of Microsoft
cloud services.
Risk Assessment & Compliance Guide: Create a governance model for risk assessment of Microsoft cloud
services, and regulator notification.
Financial use cases: Use case overviews, tutorials, and other resources to build Azure solutions for financial
services.
Resources
Microsoft Financial Services Compliance Program
Microsoft business cloud services and financial services
Financial services compliance in Azure
Azure Financial Services Cloud Risk Assessment Tool
Compliance on the Microsoft Trust Center
National Institute of Standards and Technology
(NIST) Cybersecurity Framework (CSF)
2/5/2021 • 5 minutes to read • Edit Online
NOTE
Microsoft 365 Apps for enterprise enables access to various cloud services, such as Roaming Settings, Licensing, and
OneDrive consumer cloud storage, and may enable access to additional cloud services in the future. Roaming Settings and
Licensing support the standards for HITRUST. OneDrive consumer cloud storage does not, and other cloud services that
are accessible through Microsoft 365 Apps for enterprise and that Microsoft may offer in the future also may not,
support these standards.*
Why are some Office 365 ser vices not in the scope of this cer tification?
Microsoft provides the most comprehensive offerings compared to other cloud service providers. To keep up
with our broad compliance offerings across regions and industries, we include services in the scope of our
assurance efforts based on the market demand, customer feedback, and product lifecycle. If a service is not
included in the current scope of a specific compliance offering, your organization has the responsibility to assess
the risks based on your compliance obligations and determine the way you process data in that service. We
continuously collect feedback from customers and work with regulators and auditors to expand our compliance
coverage to meet your security and compliance needs.
Resources
Microsoft Cloud Services Authorizations
Mapping Microsoft Cyber Offerings to: NIST Cybersecurity Framework (CSF), CIS Controls, ISO27001:2013
and HITRUST CSF
Framework for Improving Critical Infrastructure Cybersecurity
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical
Infrastructure
Microsoft Government Cloud
Online Services Terms
Compliance on the Microsoft Trust Center
Payment Card Industry (PCI) Data Security
Standard (DSS)
2/5/2021 • 5 minutes to read • Edit Online
Resources
PCI Security Standards Council
PCI Data Security Standard
Azure PCI DSS 3.2.1 Blueprint
PCI DSS Quick Reference Guide
Compliance on the Microsoft Trust Center
U.S. Section 508
11/30/2020 • 2 minutes to read • Edit Online
Resources
Microsoft accessibility page: Explore the ways in which Microsoft innovates so everyone has the ability to
achieve more.
Office 365 Accessibility Center: Office 365 resources for people with disabilities.
Enterprise Disability Answer Desk: Dedicated support for enterprise customers with accessibility questions
about our products and services or compliance.
DHS Trusted Tester Program: Get information about the U.S. Department of Homeland Security (DHS) Trusted
Tester Program, in which Microsoft participates.
Compliance on the Microsoft Trust Center
Shared Assessments Program
11/30/2020 • 2 minutes to read • Edit Online
Resources
Azure standard response for request for information
Microsoft and the CSA STAR Self-Assessment
Compliance on the Microsoft Trust Center
Service Organization Controls (SOC)
2/17/2021 • 5 minutes to read • Edit Online
Resources
Better protect your data by using Microsoft cloud services
Service Organization Control (SOC) Reports
SSAE 16 Overview
ISAE 3402 Overview
Microsoft Online Services Terms
Microsoft Government Cloud
Compliance on the Microsoft Trust Center
Spanish Royal Decree 1720/2007, Spanish Organic
Law 15/1999
11/30/2020 • 2 minutes to read • Edit Online
Resources
Spanish Data Protection Agency (Spanish)
Organic Law 15/1999 of December 13 for the Protection of Personal Data - Spanish
Microsoft Online Services terms
Compliance on the Microsoft Trust Center
United Kingdom Cyber Essentials PLUS
2/5/2021 • 2 minutes to read • Edit Online
Resources
Cyber Essentials Scheme: Assurance framework
Compliance on the Microsoft Trust Center
United Kingdom Government-Cloud (G-Cloud)
2/5/2021 • 4 minutes to read • Edit Online
UK G-Cloud overview
Government Cloud (G-Cloud) is a UK government initiative to ease procurement of cloud services by
government departments and promote government-wide adoption of cloud computing. G-Cloud comprises a
series of framework agreements with cloud services suppliers (such as Microsoft), and a listing of their services
in an online store, the Digital Marketplace. These enable public-sector organizations to compare and procure
those services without having to do their own full review process. Inclusion in the Digital Marketplace requires a
self-attestation of compliance, followed by a verification performed by the Government Digital Service (GDS)
branch at its discretion.
The G-Cloud appointment process was streamlined in 2014 to reduce the time and cost to the UK government,
and the government’s security classification scheme was simplified from six to three levels: OFFICIAL, SECRET,
and TOP SECRET. (G-Cloud certification levels are no longer expressed as an Impact Level, or IL; Microsoft
formerly held an IL2 accreditation for Microsoft Azure, Microsoft Dynamics 365, and Microsoft Office 365.)
Instead of the central assessment of cloud services previously provided, the new process requires cloud service
providers to self-certify and supply evidence in support of the 14 Cloud Security Principles of G-Cloud. This has
not changed either the evidence Microsoft produces or the standards that the company adheres to.
Resources
Effective Compliance Controls to Address the UK Governments Common 14 Cloud Security Principles Using
Microsoft Azure
UK Government Cloud Strategy
G-Cloud Security Principles
Digital Marketplace
Microsoft Online Services
Compliance on the Microsoft Trust Center
Association of Banks in Singapore (ABS) Outsourced
Service Provider's Audit Report (OSPAR)
2/17/2021 • 2 minutes to read • Edit Online
Resources
ABS OSPAR resources
ABS Guidelines for Outsourced Service Providers
Compliance Checklist for Financial Institutions in Singapore
Microsoft and the Monetary Authority of Singapore (MAS) and Association of Banks in Singapore (ABS)
Other Microsoft resources for financial services
Microsoft Financial Services Compliance Program
Financial services compliance in Azure
Microsoft business cloud services and financial services
Cloud Security Mark Gold (CS Gold Mark)
11/30/2020 • 2 minutes to read • Edit Online
Resources
CS Mark Accreditation Scheme (Japanese)
CS Mark Standard accreditation rules (Japanese)
CS Mark accreditation forms and templates (Japanese)
ISO/IEC 27017: 2015
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
Korea-Information Security Management System
(K-ISMS)
11/30/2020 • 4 minutes to read • Edit Online
About K-ISMS
Under Article 47 in the “Act on Promotion of Information and Communications Network Utilization and
Information Protection” (Korean and English), the Korean government introduced the Korea-Information
Security Management System (K-ISMS). A country-specific ISMS framework, it defines a stringent set of control
requirements designed to help ensure that organizations in Korea consistently and securely protect their
information assets.
To obtain the certification, a company must undergo an assessment by an independent auditor that covers both
information security management and security countermeasures. It covers 104 criteria including 12 control
items in 5 sectors for information security management, and 92 control items in 13 sectors for information
security countermeasures. Some of these include examination of the organization’s security management
responsibilities, security policies, security training, incident response, risk management, and more. A special
committee examines the results of the audit and grants the certification.
The K-ISMS framework is built on successful information security strategies and policies, as well as security
counter measures and threat response procedures to minimize the impact of any security breaches. These have
a significant overlap with ISO/IEC 27001 control objectives but are not identical. K-ISMS is more a detailed
investigation against requirements than it is a general ISO/IEC 27001 assessment.
Under the supervision of the Korean Ministry of Science and Information Technology (MSIT) (Korean and
English), the Korea Internet & Security Agency (KISA) (Korean and English) is the certifying authority of the K-
ISMS. Certification is valid for three years, and certified entities must pass an annual audit to maintain it.
Additional resources
K-ISMS-certified organizations (Korean)
K-ISMS documents and guidelines (Korean)
Azure Regions
Compliance on the Microsoft Trust Center
Ministry of Electronics and Information Technology
(MeitY)
11/30/2020 • 2 minutes to read • Edit Online
MeitY overview
The Ministry of Electronics and Information Technology (MeitY), an agency of the government of India, provides
policy guidelines to all government and state public sector organizations. Its guidelines are also frequently
adopted by private sector organizations in regulated industries, like financial services and telecommunications.
MeitY provides accreditation (referred to by MeitY as 'empanelment') of cloud service providers, which requires
that cloud services be certified as compliant against a predefined set of standards and guidelines on security,
interoperability, data portability, service level agreement, and contractual terms and conditions. Auditors
accredited by MeitY verify compliance by conducting audits of cloud service providers.
Once accredited, cloud service providers are listed in a government cloud services directory where public sector
organizations can compare and procure accredited cloud services. The directory is a service of the MeghRaj
Cloud Initiative (or GI [Government of India] Cloud), which promotes the use of cloud computing in government,
and governs the implementation of public sector IT services.
Resources
Ministry of Electronics and Information Technology
MeghRaj Cloud Initiative
Accredited cloud service providers
Compliance on the Microsoft Trust Center
Multi-Tier Cloud Security (MTCS) Standard for
Singapore
2/5/2021 • 3 minutes to read • Edit Online
MTCS overview
The Multi-Tier Cloud Security (MTCS) Standard for Singapore was prepared under the direction of the
Information Technology Standards Committee (ITSC) of the Infocomm Development Authority of Singapore
(IDA). The ITSC promotes and facilitates national programs to standardize IT and communications, and
Singapore's participation in international standardization activities.
The purpose of the MTCS is to provide:
A common standard that cloud service providers (CSPs) can apply to address customer concerns about the
security and confidentiality of data in the cloud, and the impact on businesses of using cloud services.
Verifiable operational transparency and visibility into risks to the customer when they use cloud services.
The MTCS builds upon recognized international standards such as ISO/IEC 27001, and covers such areas as data
retention, data sovereignty, data portability, liability, availability, business continuity, disaster recovery, and
incident management. It also includes a mechanism for customers to benchmark and rank the capabilities of
CSPs against a set of minimum baseline security requirements.
MTCS is the first cloud security standard with different levels of security, so certified CSPs can specify which
levels they offer. MTCS includes a total of 535 controls, covering basic security in Level 1, more stringent
governance and tenancy controls in Level 2, and reliability and resiliency for high-impact information systems in
Level 3.
Resources
MTCS Certification Scheme
Azure compliance in the context of Singapore security and privacy requirements
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
My Number Act (Japan)
2/5/2021 • 3 minutes to read • Edit Online
How to implement
Microsoft Security Policy: How Microsoft handles the security of personal and organizational information
in its cloud services.
Privacy in Office 365: How Microsoft builds strong privacy protections into Office 365.
Admin Access in Office 365: How Microsoft manages administrative access to customer data.
Audits & Reports in Office 365: Explore the features customers can use to track user and administrative
activity within their tenant.
Data Retention in Office 365: Understand the data handling policy for how long customer data is retained
after being deleted.
Resources
Azure Compliance and the Japan Security and Privacy Requirements
Privacy at Microsoft
Microsoft Privacy Statement
Privacy considerations in the cloud
Compliance on the Microsoft Trust Center
Australian Prudential Regulation Authority (APRA)
2/5/2021 • 5 minutes to read • Edit Online
APRA overview
The Australian Prudential Regulation Authority (APRA) oversees banks, credit unions, insurance companies, and
other financial services institutions in Australia. Recognizing the momentum towards cloud computing, APRA
has called on regulated entities to implement a thoughtful cloud-adoption strategy with effective governance,
thorough risk assessment, and regular assurance processes. Regulated institutions must comply with the APRA
Prudential Standard CPS 231 Outsourcing when outsourcing a material business activity — any activity that has
the potential, if disrupted, to have a significant impact on the financial institution’s business operations or ability
to manage its risks effectively. Based on its review of outsourcing arrangements involving cloud computing
services submitted to APRA, APRA published specific, detailed guidance in its information paper, Outsourcing
involving cloud computing services to help regulated entities assess cloud providers and services more
effectively and guide them through the regulatory issues of outsourcing to the cloud. When outsourcing,
including to a cloud service, regulated institutions must also review and consider their ongoing compliance with
APRA Prudential Standard CPS 234 Information Security.
Resources
Australian Prudential Regulation Authority
APRA Information Paper Outsourcing involving cloud computing services
Prudential Standard CPS 231 Outsourcing
Prudential Standard CPS 234 Information Security
Microsoft response to the APRA Information Paper on the Cloud
Microsoft cloud services: a compliance checklist for financial institutions in Australia
Microsoft cloud services: compliance with APRA Prudential Standard CPS 234
Microsoft Australia: Cloud in Financial Services
Microsoft Financial Services Compliance Program
Financial services compliance in Azure
Microsoft business cloud services and financial services
Compliance on the Microsoft Trust Center
Australian Government Information Security
Registered Assessor Program (IRAP)
2/17/2021 • 4 minutes to read • Edit Online
The Information Security Registered Assessor Program (IRAP) provides a comprehensive process for the
independent assessment of a system's security against Australian government policies and guidelines. The IRAP
goal is to maximize the security of Australian federal, state, and local government data by focusing on the
information and communications technology infrastructure that stores, processes, and communicates it.
IRAP overview
The Information Security Registered Assessors Program (IRAP) is governed and administered by the Australian
Cyber Security Centre (ACSC). IRAP provides the framework to endorse individuals from the private and public
sectors to provide cyber security assessment services to the Australian government. Endorsed IRAP assessors
can provide an independent assessment of ICT security, suggest mitigations and highlight residual risks. IRAP
provides a comprehensive process for the independent assessment of a system's security against Australian
government policies and guidelines. The IRAP goal is to maximize the security of Australian federal, state, and
local government data by focusing on the information and communications technology infrastructure that
stores, processes, and communicates it.
In 2014, Azure was launched as the first IRAP-assessed cloud service in Australia, hosted from datacenters in
Melbourne and Sydney. These two datacenters give Australian customers control over where their customer
data is stored, while also providing enhanced data durability in there are disasters through backups at both
locations.
In early 2015, Office 365 became the first cloud productivity service to complete this assessment.
In April 2015, the ASD announced the CCSL certification of both Azure and Office 365, and in November
2015, of Dynamics 365.
In June 2017, ASD announced the recertification of Microsoft Azure and Office 365 for a greatly expanded
set of services.
In April 2018, the ACSC announced the certification of Azure and Office 365 at the PROTECTED classification.
Microsoft is the first and only public cloud provider to achieve this level of certification.
In September 2019, Microsoft's updated IRAP assessment scope expanded to include 113 services at the
PROTECTED classification.
In December 2020, Microsoft released two incremental IRAP assessments for Azure and Office 365. These
reports utilized the new guidance post the cessation of the Certified Cloud Services List (CCSL). The reports
contain both an assessment of Microsoft as a Cloud Service Provider (CSP) and other services that are
incremental to the 2019 reports across Azure, Dynamics, and Office 365.
Resources
Australian Government ISM
Australia page of the Microsoft Service Trust Portal (STP)
Australian Cyber Security Centre (ACSC)
New Zealand Government Cloud Computing
Security and Privacy Considerations
12/1/2020 • 2 minutes to read • Edit Online
Resources
Security requirements for offshore hosted Office productivity services: conformance guide for Office 365
Microsoft Azure compliance in the context of New Zealand security and privacy requirements
NZ Government ICT Strategy 2015
NZ Government requirements for cloud computing
Cloud Computing: Information Security and Privacy Considerations (ISPC)
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
Resources
ISO-IEC 27001
Security prescription national 2013 (BVR)
Prescription information security national 2007 (VIR)
Baseline Information Security (BIR)
Compliance on the Microsoft Trust Center
Cloud Computing Compliance Controls Catalog
(C5)
2/5/2021 • 3 minutes to read • Edit Online
C5 overview
In 2016, the German Federal Office for Information Security (Bundesamt für Sicherheit in der
Informationstechnik, or BSI) created the Cloud Computing Compliance Controls Catalog (C5). C5 is an audited
standard that establishes a mandatory minimum baseline for cloud security and the adoption of public cloud
solutions by German government agencies and organizations that work with government. C5 is also being
increasingly adopted by the private sector.
The purpose of the C5 catalog of requirements is to provide a consistent security framework for certifying cloud
service providers and to give customers assurance that their data will be managed securely.
C5 is based on internationally recognized IT security standards like ISO/IEC 27001:2013, the Cloud Security
Alliance Cloud Controls Matrix 3.0.1, and BSI's own IT-Grundschutz Catalogues. The catalog consists of 114
requirements across 17 domains, for example, the organization of information security and physical security,
with security requirements basic to all cloud service providers, and other requirements for processing highly
confidential data and situations requiring high availability.
The BSI also puts emphasis on transparency. As part of an audit, the cloud provider must include a detailed
system description and disclose environmental parameters like jurisdiction and data processing location,
provision of services, and other certifications issued to the cloud services, and information about the cloud
provider's disclosure obligations to public authorities. This helps potential cloud customers decide whether the
cloud services meet their essential requirements such as compliance with legal requirements like data
protection, company policies, or the ability to address the threat of industrial espionage.
Microsoft and C5
Microsoft cloud services are audited at least annually against SOC 2 (AT Section 101) standards. According to
BSI, a C5 audit can be combined with a SOC 2 audit to reuse parts of the system description and audit results for
overlapping controls. Microsoft Azure, Azure Government, and Azure Germany maintain a combined report (C5,
SOC 2 Type 2, CSA STAR Attestation) based on the audit assessment performed by an independent auditor,
which demonstrates proof of compliance with C5.
Resources
Cloud Computing Compliance Controls Catalogue (C5) (English) (German)
Security Recommendations for Cloud Computing Providers (English) (German)
Compliance Reports: C5- und SOC-Testate Azure Deutschland
IT-Grundschutz Compliance Workbook for Microsoft Azure Germany
Compliance on the Microsoft Trust Center
United Kingdom Cyber Essentials PLUS
2/5/2021 • 2 minutes to read • Edit Online
Resources
Cyber Essentials Scheme: Assurance framework
Compliance on the Microsoft Trust Center
European Standards EN 301 549
11/30/2020 • 2 minutes to read • Edit Online
Resources
Microsoft accessibility site: Get information on using accessibility features and explore how Microsoft
innovates to help everyone achieve more.
Office 365 Accessibility Center: Office 365 resources for people with disabilities.
Enterprise Disability Answer Desk: Dedicated support for enterprise customers with accessibility questions
about our products and services or compliance.
Compliance on the Microsoft Trust Center
Spain Esquema Nacional de Seguridad (ENS) High-
Level Security Measures
11/30/2020 • 3 minutes to read • Edit Online
Resources
Esquema Nacional de Seguridad of Spain (Spanish and English)
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
ENISA Information Assurance Framework
11/30/2020 • 2 minutes to read • Edit Online
Resources
Azure standard response for request for information
Microsoft and the CSA STAR Self-Assessment
Microsoft and ISO/IEC 27001
European Union Model Clauses
11/30/2020 • 4 minutes to read • Edit Online
Resources
EU Standards Organization
EU Model Clauses
EU Data Protection Directive
European Data Protection Board
EU Model Clauses FAQ for Dynamics 365 and Office 365
Microsoft and the EU-U.S. Privacy Shield
Microsoft Common Controls Hub Compliance Framework
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
EU-US and Swiss-US Privacy Shield Frameworks
2/5/2021 • 4 minutes to read • Edit Online
How to implement
Privacy in the Microsoft Cloud — Get details on Microsoft privacy principles and standards and our approach to
regulatory compliance.
- Learn more
Data protection in Azure — Azure provides customers with strong data security, both by default and as
customer options.
- Learn more
UK G-Cloud overview
Government Cloud (G-Cloud) is a UK government initiative to ease procurement of cloud services by
government departments and promote government-wide adoption of cloud computing. G-Cloud comprises a
series of framework agreements with cloud services suppliers (such as Microsoft), and a listing of their services
in an online store, the Digital Marketplace. These enable public-sector organizations to compare and procure
those services without having to do their own full review process. Inclusion in the Digital Marketplace requires a
self-attestation of compliance, followed by a verification performed by the Government Digital Service (GDS)
branch at its discretion.
The G-Cloud appointment process was streamlined in 2014 to reduce the time and cost to the UK government,
and the government’s security classification scheme was simplified from six to three levels: OFFICIAL, SECRET,
and TOP SECRET. (G-Cloud certification levels are no longer expressed as an Impact Level, or IL; Microsoft
formerly held an IL2 accreditation for Microsoft Azure, Microsoft Dynamics 365, and Microsoft Office 365.)
Instead of the central assessment of cloud services previously provided, the new process requires cloud service
providers to self-certify and supply evidence in support of the 14 Cloud Security Principles of G-Cloud. This has
not changed either the evidence Microsoft produces or the standards that the company adheres to.
Resources
Effective Compliance Controls to Address the UK Governments Common 14 Cloud Security Principles Using
Microsoft Azure
UK Government Cloud Strategy
G-Cloud Security Principles
Digital Marketplace
Microsoft Online Services
Compliance on the Microsoft Trust Center
IT-Grundschutz Compliance workbook
11/30/2020 • 2 minutes to read • Edit Online
Resources
IT-Grundschutz
IT-Grundschutz Catalogues v.15 (2015)
BSI Standards
Azure Germany IT-Grundschutz Compliance workbook
ISO/IEC 27001:2013 Information Security Management Systems background
Compliance on the Microsoft Trust Center
Spanish Royal Decree 1720/2007, Spanish Organic
Law 15/1999
11/30/2020 • 2 minutes to read • Edit Online
Resources
Spanish Data Protection Agency (Spanish)
Organic Law 15/1999 of December 13 for the Protection of Personal Data - Spanish
Microsoft Online Services terms
Compliance on the Microsoft Trust Center
Police-Assured Secure Facilities (PASF) United
Kingdom
11/30/2020 • 2 minutes to read • Edit Online
About PASF
The National Policing Information Risk Management Team (NPIRMT) of the UK Home Office (the ministry
responsible for security, immigration, and law and order) is charged with ensuring that the storage of and access
to police information meet its standards. Through the National Policing Information Risk Management Policy, it
sets the central standards and controls for law enforcement agencies across the UK that are assessing the risk of
moving police information systems to the cloud. The policy requires that all national police services in the UK
that store and process protectively marked or other sensitive law enforcement information take an extra step in
their risk assessment: a physical inspection of the datacenter where their data will be stored. The successful
assessment of a datacenter determines that it is PASF.
To assist local police services with their due-diligence review, the NPIRMT performed a PASF audit of Azure
datacenters and has determined that they are compliant. Local police services can use this NPIRMT assessment
to support their own review. Using the NPIRMT policy guidelines, the senior information risk owner for each
police service is responsible for assessing the suitability of an individual datacenter in the context of their
particular application, which they then submit to the NPIRMT for approval.
How to implement
Azure UK Official Blueprint: Helps UK customers accelerate IaaS and PaaS deployments of compliant
workloads in Azure.
Resources
National Policing Accreditation Policy
Azure facilities, premises, and physical security
Microsoft and ISO/IEC 27001:2013 ISM Standards
Microsoft Online Services Terms
Compliance on the Microsoft Trust Center
Russian Personal Data Localization Requirements
2/5/2021 • 3 minutes to read • Edit Online
As of September 1, 2015, organizations that are considered personal data operators must ensure that, when
collecting personal data, Russian citizens' personal data recording, systematization, accumulation, storage,
clarification (updating, changing), and extraction are performed through the databases located in Russia
('personal data localization requirement').1
Microsoft services available to organizations (including but not limited to educational institutions) (hereinafter
referred to as 'customer'), including those enabling personal data processing such as Microsoft Azure, Microsoft
365, Dynamics 365, and Power Platform, are provided from data processing centers located outside of Russia
(for more information visit the Microsoft Trust Center).
Based on the type and content of information processed by customer information systems, such systems,
including those using Microsoft cloud products, may be deemed a personal data information system ('PDIS',
'ISPD'). In cases where the customer would like to use Microsoft services in a system that qualifies as PDIS
through its architecture and types of information processed, Microsoft invites its customers to consider,
amongst other things, available solutions specified below. All the scenarios provided are available for customers
as an additional option to standard business offerings.
It should be noted that it is the customer as personal data operator of PDIS who is in charge of compliance and
shall analyze and assess applicable legal requirements for personal data localization, and at its own discretion,
independently determine sufficient measures to ensure that personal data processing in PDIS complies with the
Russian personal data law.2
NOTE
1 Federal Law No. 242-FZ (edition dated 12.31.2014) 'On entering amendments into certain legislative acts of the Russian
Federation about clarifying the procedure for personal data processing in information and telecommunication networks'
dated 07.21.2014
2 Federal Law No. 152-FZ on Personal data as of 07.27. 2006
California Consumer Privacy Act (CCPA)
2/5/2021 • 4 minutes to read • Edit Online
CCPA overview
The California Consumer Privacy Act (CCPA) is the first comprehensive privacy law in the United States. It
provides a variety of privacy rights to California consumers. Businesses regulated by the CCPA will have a
number of obligations to those consumers, including disclosures, General Data Protection Regulation (GDPR)-
like consumer data subject rights (DSRs), an 'opt-out' for certain data transfers, and an 'opt-in' requirement for
minors.
The CCPA only applies to companies doing business in California which satisfy one or more of the following: (1)
have a gross annual revenue of more than $25 million, or (2) derive more than 50% of their annual income
from the sale of California consumer personal information, or (3) buy, sell or share the personal information of
more than 50,000 California consumers annually.
The CCPA goes into effect on January 1, 2020. However, enforcement by the California Attorney General (AG)
will start on July 1, 2020.
The California AG will enforce the CCPA and will have power to issue non-compliance fines. The CCPA also
provides a private right of action which is limited to data breaches. Under the private right of action, damages
can come in between $100 and $750 per incident per consumer. The California AG also can enforce the CCPA in
its entirety with the ability to levy a civil penalty of not more than $2,500 per violation or $7,500 per intentional
violation.
How you can prepare for your CCPA compliance when using
Microsoft Products and Services
Here are a few steps you could take to get ready for the CCPA:
Start leveraging the GDPR assessment in Compliance Manager as part of your CCPA privacy program.
Establish a process to efficiently respond to Data Subject Access Requests (DSARs) using the Data Subject
Requests tool.
Set up label and policies to discover, classify & label, and protect sensitive data with Microsoft Information
Protection.
Use email encryption capabilities to further control sensitive information.
Resources
5 tips to help you prepare for the new California Consumer Privacy Act
Getting Started with CCPA Guide
Data Subject Requests and the GDPR
California Consumer Privacy Act (CCPA) FAQ
Compliance on the Microsoft Trust Center
Canadian Privacy Laws
2/5/2021 • 4 minutes to read • Edit Online
How to implement
Privacy at Microsoft: Get details on Microsoft privacy principles and standards and on privacy laws specific to
Canada.
Compliance checklist for Canada: Learn more about Azure and Intune functionalities that can help meet
Canadian privacy laws.
Azure data protection: Azure provides customers with strong data security, both by default and as customer
options.
Resources
Summary of privacy laws in Canada (OPCC)
Privacy at Microsoft
Microsoft Privacy Statement
Privacy considerations in the cloud
Compliance on the Microsoft Trust Center
Personal Data Protection Act (PDPA) Argentina
2/5/2021 • 2 minutes to read • Edit Online
How to implement
Privacy in Microsoft Cloud Services: Get details on Microsoft privacy principles and standards and on privacy
laws specific to Argentina.
Azure data protection: Azure offers customers strong data security, both by default and as customer options.
Frequently asked questions
How has the GDPR changed the Personal Data Protection Act?
In late 2018, Argentina has not yet enacted GDPR-related regulations, but it has drafted a new data protection
bill — already submitted to Congress by the Executive Power and under revision by the House of
Representatives — to bring its data protection law into alignment with the GDPR. It addresses such differences
as the definition of data subjects and concerns over the cross-border transfer of personal information.
Resources
Privacy at Microsoft
Microsoft Privacy Statement
Privacy Considerations in the Cloud
Compliance on the Microsoft Trust Center
General Data Protection Regulation Summary
2/18/2021 • 21 minutes to read • Edit Online
The General Data Protection Regulation (GDPR) introduces new rules for organizations that offer goods and
services to people in the European Union (EU), or that collect and analyze data for EU residents no matter where
you or your enterprise are located. This document guides you to information to help you honor rights and fulfill
obligations under the GDPR when using Microsoft products and services. A Recommended action plan for
GDPR and Accountability Readiness Checklists provide additional resources for assessing and implementing
GDPR compliance.
Terminology
Helpful definitions for GDPR terms used in this document:
Data Controller (Controller) : A legal person, public authority, agency or other body which, alone or jointly
with others, determines the purposes and means of the processing of personal data.
Personal data and data subject : Any information relating to an identified or identifiable natural person
(data subject); an identifiable natural person is one who can be identified, directly or indirectly.
Processor : A natural or legal person, public authority, agency, or other body, which processes personal data
on behalf of the controller.
Customer Data : Data produced and stored in the day-to-day operations of running your business.
Breach Notification
The GDPR mandates notification requirements for data controllers and processors for a breach of personal data.
As a data processor, Microsoft ensures that customers are able to meet the GDPR's breach notification
requirements. Data controllers are responsible for assessing risks to data privacy and determining whether a
breach requires notification of a customer's DPA. Microsoft provides the information needed to make that
assessment. More information about how Microsoft detects and responds to a breach of personal data in Data
Breach Notification Under the GDPR.
Breach notification FAQs
What constitutes a breach of personal data under the GDPR?
Personal data means any information related to an individual that can be used to identify them directly or
indirectly. A personal data breach is 'a breach of security leading to the accidental or unlawful destruction, loss,
alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.'
What are your responsibilities as the controller?
If a breach of personal data that is likely to result in a high risk to the rights and freedoms of individuals (such as
discrimination, identity theft, fraud, financial loss, or damage to their reputation) occurs, the GDPR requires you
to:
Notify the appropriate Data Protection Authority (DPA) within 72 hours of becoming aware of it—for
example, after Microsoft notifies you. If you don't notify the DPA within that time period, you'll need to
explain why to the DPA. This notice to the DPA is required even where there is a risk to individuals that is not
likely to result in a high risk.
Notify the data subjects of the breach without undue delay.
Document the breach including a description of the nature of the breach—such as how many people were
impacted, the number of data records affected, the consequences of the breach, and any remedial action your
organization is proposing or took.
What are the responsibilities of Microsoft as the processor?
After we become aware of a personal data breach, the GDPR requires us to notify you without undue delay.
Where Microsoft is a processor our obligations reflect both GDPR requirements and our standard, worldwide
contractual provisions. We consider that all confirmed personal data breaches are in scope; there is no risk of
harm threshold. We will notify our customers whether the data breach was suffered by Microsoft directly or by
any of our sub-processors. We have processes in place to quickly identify and contact security incident
personnel you've identified in your organization. In addition, all sub-processors are contractually obliged to
report their own breaches to Microsoft, and provide guarantees to that effect.
How will Microsoft detect a data breach?
All our services and personnel follow internal incident management procedures to ensure that we take proper
precautions to avoid data breaches in the first place. However, in addition, Online Services have specific security
controls in place across our platforms to detect data breaches in the rare event that they occur.
How will Microsoft respond to a data breach?
To support you for a breach of personal data Microsoft has: - Security personnel trained on the specific
procedures to follow. - Has policies, procedures, and controls in place to ensure that Microsoft maintains
detailed records. This response includes documentation that captures the facts of the incident, its effects, and
remedial action, as well as tracking and storing information in our incident management systems.
How will Microsoft notify me in the event of a data breach?
Microsoft has policies and procedures in place to notify you promptly. To satisfy your notice requirements to the
DPA, we will provide a description of the process we used to determine if a breach of personal data has
occurred, a description of the nature of the breach and a description of the measures we took to mitigate the
breach.
GDPR FAQs
Does Microsoft make commitments to its customers with regard to the GDPR?
Yes. The GDPR requires controllers (such as organizations using Microsoft's enterprise online services) only use
processors (such as Microsoft) that provide sufficient guarantees to meet key requirements of the GDPR.
Microsoft has taken the proactive step of providing these commitments to all Volume Licensing customers as
part of their agreements.
How does Microsoft help me comply?
Microsoft provides tools and documentation to support your GDPR accountability. This includes support for
Data Subject Rights, performing your own Data Protection Impact Assessments, and working together to resolve
personal data breaches.
What commitments are in the GDPR Terms?
Microsoft's GDPR Terms reflect the commitments required of processors in Article 28. Article 28 requires that
processors commit to:
Only use subprocessors with the consent of the controller and remain liable for subprocessors.
Process personal data only on instructions from the controller, including with regard to transfers.
Ensure that persons who process personal data are committed to confidentiality.
Implement appropriate technical and organizational measures to ensure a level of personal data security
appropriate to the risk.
Assist controllers in their obligations to respond to data subjects' requests to exercise their GDPR rights.
Meet the breach notification and assistance requirements.
Assist controllers with data protection impact assessments and consultation with supervisory authorities.
Delete or return personal data at the end of provision of services.
Support the controller with evidence of compliance with the GDPR.
Under what basis does Microsoft facilitate the transfer of personal data outside of the EU?
Microsoft has long used the Standard Contractual Clauses (also known as the Model Clauses) as a basis for
transfer of data for its enterprise online services. The Standard Contractual Clauses are standard terms provided
by the European Commission that can be used to transfer data outside the European Economic Area in a
compliant manner. Microsoft has incorporated the Standard Contractual Clauses into all of our Volume Licensing
agreements via the Online Services Terms. For personal data from the European Economic Area, Switzerland,
and the United Kingdom, Microsoft will ensure that transfers of personal data to a third country or an
international organization are subject to appropriate safeguards as described in Article 46 of the GDPR. In
addition to Microsoft's commitments under the Standard Contractual Clauses for processors and other model
contracts, Microsoft continues to abide by the terms of the Privacy Shield framework but will no longer rely on it
as a basis for the transfer of personal data from the EU/EEA to the United States.
What are the other Microsoft compliance offerings?
As a global company with customers in nearly every country in the world, Microsoft has a robust compliance
portfolio to assist our customers. To view a complete list of our compliance offerings including FedRamp,
HIPAA/HITECH, ISO 27001, ISO 27002, ISO 27018, NIST 800-171, UK G-Cloud, and many others visit our
compliance offering topics.
How will GDPR affect my company?
The GDPR imposes a wide range of requirements on organizations that collect or process personal data,
including a requirement to comply with six key principles:
Transparency, fairness, and lawfulness in the handling and use of personal data. You will need to be clear with
individuals about how you are using personal data and will also need a "lawful basis" to process that data.
Limiting the processing of personal data to specified, explicit, and legitimate purposes. You will not be able to
reuse or disclose personal data for purposes that are not "compatible" with the purpose for which the data
was originally collected.
Minimizing the collection and storage of personal data to that which is adequate and relevant for the
intended purpose.
Ensuring the accuracy of personal data and enabling it to be erased or rectified. You will need to take steps to
ensure that the personal data you hold is accurate and can be corrected if errors occur.
Limiting the storage of personal data. You will need to ensure that you retain personal data only for as long
as necessary to achieve the purposes for which the data was collected.
Ensuring security, integrity, and confidentiality of personal data. Your organization must take steps to keep
personal data secure through technical and organizational security measures.
You will need to understand what your organization's specific obligations are to the GDPR are and how you will
meet them, though Microsoft is here to help you on your GDPR journey.
What rights must companies enable under GDPR?
The GDPR provides EU residents with control over their personal data through a set of 'data subject rights'. This
includes the right to:
Access information about how personal data is used.
Access personal data held by an organization.
Have incorrect personal data deleted or corrected.
Have personal data rectified and erased in certain circumstances (sometimes referred to as the "right to be
forgotten").
Restrict or object to automated processing of personal data.
Receive a copy of personal data.
What are Processors and Controllers?
A controller is a natural or legal person, public authority, agency or other body which, alone or jointly with
others, determines the purposes and means of the processing of personal data. A processor is a natural or legal
person, public authority, agency, or other body, which processes personal data on behalf of the controller.
Does the GDPR apply to Processors and Controllers?
Yes, the GDPR applies to both controllers and processors. Controllers must only use processors that take
measures to meet the requirements of the GDPR. Under the GDPR, processors face additional duties and liability
for noncompliance, or acting outside of instructions provided by the controller, as compared to the Data
Protection Directive. Processor duties include, but are not limited to:
Processing data only as instructed by the controller.
Using appropriate technical and organizational measures to protect personal data.
Assisting the controller with data subject requests.
Ensuring subprocessors it engages meet these requirements.
How much can companies be fined for noncompliance?
Companies can be fined up to €20m or 4% of annual global turnover, whichever is greater, for failure to meet
certain GDPR requirements. Additional individual remedies could increase your risk if you fail to adhere to
GDPR requirements.
Does my business need to appoint a Data Protection Officer (DPO)?
It depends on several factors identified within the regulation. Article 37 of the GDPR states that controllers and
processors shall designate a data protection officer in any case where: (a) the processing is carried out by a
public authority or body, except for courts acting in their judicial capacity; (b) the core activities of the controller
or the processor consist of processing operations which, by virtue of their nature, their scope and/or their
purposes, require regular and systematic monitoring of data subjects on a large scale; or (c) the core activities of
the controller or the processor consist of processing on a large scale of special categories of data pursuant to
Article 9 and personal data relating to criminal convictions and offenses referred to in Article 10.
How much will it cost to meet compliance with the GDPR?
Meeting compliance with the GDPR will cost time and money for most organizations, though it may be a
smoother transition for those who are operating in a well-architected cloud services model and have an
effective data governance program in place.
How do I know if the data that my organization is processing is covered by the GDPR?
The GDPR regulates the collection, storage, use, and sharing of 'personal data'. Personal data is defined broadly
under the GDPR as any data that relates to an identified or identifiable natural person.
Personal data can include, but is not limited to, online identifiers (for example, IP addresses), employee
information, sales databases, customer services data, customer feedback forms, location data, biometric data,
CCTV footage, loyalty scheme records, health, and financial information and much more. It can even include
information that does not appear to be personal-such as a photo of a landscape without people-where that
information is linked by an account number or unique code to an identifiable individual. And even personal data
that has been pseudonymized can be personal data if the pseudonym can be linked to a particular individual.
Processing of certain "special" categories of personal data, such as personal data that reveals a person's racial or
ethnic origin, or concerns their health or sexual orientation, is subject to more stringent rules than the
processing of "ordinary" personal data. This evaluation of personal data is highly fact-specific, so we
recommend engaging an expert to evaluate your specific circumstances.
My organization is only processing data on behalf of others. Does it still need to comply with the
GDPR?
Yes. Although the rules differ somewhat, the GDPR applies to organizations that collect and process data for
their own purposes ('controllers') as well as to organizations that process data on behalf of others ('processors').
This requirement is a shift from the existing Data Protection Directive, which applies to controllers.
What specifically is deemed personal data?
Personal data is any information relating to an identified or identifiable person. There is no distinction between a
person's private, public, or work roles. Personal data can include:
Name
Home address
Work address
Telephone number
Mobile number
Email address
Passport number
National ID card
Social Security Number (or equivalent)
Driver's license
Physical, physiological, or genetic information
Medical information
Cultural identity
Bank details / account numbers
Tax file number
Work address
Credit/Debit card numbers
Social media posts
IP address (EU region)
Location / GPS data
Cookies
Am I allowed to transfer data outside of the EU?
Yes, however the GDPR strictly regulates transfers of personal data of European residents to destinations outside
the European Economic Area. You may need to set up a specific legal mechanism, such as a contract, or adhere
to a certification mechanism in order to enable these transfers. Microsoft details the mechanisms we use in the
Online Services Terms.
I have data retention requirements through compliance. Do these requirements override the right
to erasure?
Where there are legitimate grounds for continued processing and data retention, such as 'for compliance with a
legal obligation, which requires processing by Union or Member State law to which the controller is subject'
(Article 17(3)(b)), the GDPR recognizes that organizations may be required to retain data. You should, however,
make sure you engage your legal counsel to ensure that the grounds for retention are weighed against the
rights and freedoms of the data subjects, their expectations at the time the data was collected, etc.
Does the GDPR deal with encr yption?
Encryption is identified in the GDPR as a protective measure that renders personal data unintelligible when it is
affected by a breach. Therefore, whether or not encryption is used may impact requirements for notification of a
personal data breach. The GDPR also points to encryption as an appropriate technical or organizational measure
in some cases, depending on the risk. Encryption is also a requirement through the Payment Card Industry Data
Security Standard and part of the strict compliance guidelines specific to the financial services industry.
Microsoft products and services such as Azure, Dynamics 365, Enterprise Mobility + Security, Office Microsoft
365, SQL Server/Azure SQL Database, and Windows 10 offer robust encryption for data in transit and data at
rest.
How does the GDPR change an organization's response to personal data breaches?
The GDPR will change data protection requirements and make stricter obligations for processors and controllers
regarding notice of personal data breaches. Under the new regulation, the processor must notify the data
controller of a personal data breach, after having become aware of it, without undue delay. Once aware of a
personal data breach, the controller must notify the relevant data protection authority within 72 hours. If the
breach is likely to result in a high risk to the rights and freedoms of individuals, controllers will also need to
notify impacted individuals without undue delay. Additional guidance on this topic is being developed by the
EU's Article 29 Working Party.
Microsoft products and services—such as Azure, Dynamics 365, Enterprise Mobility + Security, Microsoft Office
365, and Windows 10—have solutions available today to help you detect and assess security threats and
breaches and meet the GDPR's breach notification obligations.
Additional resources
Address your needs around GDPR with one of our global partners offering Microsoft-based solutions
Know how Microsoft manages your data, where it's located, who can access it and the terms, and more.
How Microsoft Detects and Responds to a Breach of Personal Data, and Notifies You Under the GDPR
Assess your GDPR readiness today
Microsoft 365 GDPR action plan — Top priorities for
your first 30 days, 90 days, and beyond
2/5/2021 • 6 minutes to read • Edit Online
This article includes a prioritized action plan you can follow as you work to meet the requirements of the
General Data Protection Regulation (GDPR). This action plan was developed in partnership with Protiviti, a
Microsoft partner specializing in regulatory compliance.
The GDPR introduces new rules for companies, government agencies, non-profits, and other organizations that
offer goods and services to people in the European Union (EU), or that collect and analyze data for EU residents.
The GDPR applies no matter where you or your enterprise are located.
P H A SE O UTC O M ES
A REA TA SK S
A REA TA SK S
Understand your GDPR requirements and consider * Use the Microsoft GDPR Assessment Tool to privately
engaging with a Microsoft GDPR Advisor y Par tner. benchmark your readiness and get recommendations for
next steps.
* Assess and manage your compliance risks by using
Microsoft Compliance Manager in the Microsoft 365
compliance center to conduct a GDPR Assessment of your
organization.
* Work with your Microsoft GDPR Advisory Partner to
establish internal guidelines to respond to Data Subject
Requests (DSRs) and exclusions from DSRs.
* Work with your Microsoft GDPR Advisory partner to
perform a gap analysis in GDPR compliance for your
organization, and develop a roadmap that charts your
journey to GDPR compliance.
* Learn how to use the GDPR Dashboard and Data Subject
Request capability in the Microsoft 365 compliance center.
Star t discovering the types of personal data you are * Use Content Search and eDiscovery cases to easily search
storing and where it resides to comply with DSRs. across mailboxes, public folders, Microsoft 365 Groups,
Microsoft Teams, SharePoint Online sites, One Drive for
Business sites and Skype for Business conversations. Learn
how to use sensitive information types to find personal data
of EU citizens
* When working with vast quantities of content, identify
documents that are relevant to a particular subject (for
example, a compliance investigation) quickly and with better
precision than traditional keyword searches with Advanced
eDiscovery (classic), powered by machine learning
technologies.
* Preview search results, get keyword statistics for one or
more searches, bulk-edit content searches, and export the
results using the Security & Compliance Center.
A REA TA SK S
Star t implementing compliance requirements using * Manage your GDPR Compliance with Microsoft
Microsoft 365 data governance and compliance Compliance Manager within the Microsoft 365 compliance
capabilities. center.
* Help users identify and classify personal data, as defined by
the GDPR, with a classification schema and associated Office
365 Labels for Exchange email, SharePoint sites, OneDrive
for Business sites and Microsoft 365 Groups. See Office 365
Information Protection for GDPR.
A REA TA SK S
Use Microsoft 365 security capabilities to prevent * Improve authentication for administrators and end users in
data breaches and implement protections for the Microsoft Cloud by enabling multi-factor authentication
personal data. for all user accounts and modern authentication for all apps.
For recommended policy configuration, see Identity and
device access configurations.
* Deploy Windows Defender Advanced Threat Protection
(ATP) to all desktops for protection against malicious code,
data breach prevention, and responses.
* Enable audit logging and mailbox auditing for all Exchange
mailboxes to monitor for potentially malicious activity and to
enable forensic analysis of data breaches.
* Configure, test, and deploy Office 365 Data Loss
Prevention (DLP) policies to identify, monitor and
automatically protect over 80 common sensitive data types
within documents and emails, including financial, medical,
and personally identifiable information.
* Implement Office 365 Advanced Threat Protection (ATP) to
help prevent the most common attack vectors including
phishing emails and Office documents containing malicious
links and attachments.
A REA TA SK S
Use Microsoft 365 advanced data governance tools * Use Office 365 Advanced Data Governance to identify
and information protection to implement ongoing personal information in documents and emails by
governance programs for personal data. automatically applying Office 365 Labels.
* Protect personal data stored on devices across the
organization by deploying Microsoft Intune.
* Implement AAD Conditional Access policies with Microsoft
Intune to ensure that sensitive personal information is
stored and accessed according to corporate policies. For
recommended policy configuration, see Identity and device
access configurations
* Implement data retention policies with Office 365 Labels,
Advanced Data Governance, and Retention Policies to retain
personal data for as long as necessary in your jurisdiction.
Monitor ongoing compliance across Microsoft 365 * Use Office 365 Alert Policies, data loss prevention reports
and other Cloud applications. Consider addressing and Microsoft Cloud App Security to monitor usage of cloud
data residency requirements for EU personal data. applications and implement advanced alerting policies based
on heuristics and user activity.
* Address organizational, regional, and local data residency
requirements while configured as one global organization
using Microsoft's multi-geo capabilities for Exchange Online
mailboxes, OneDrive for Business sites and SharePoint
Online sites.
Learn more
Guide to the General Data Protection Regulation (GDPR) by the Information Commissioner's Office
General Data Protection Regulation (GDPR) FAQs for small organizations by the Information Commisioner's
Office
Microsoft.com/GDPR
Microsoft Trust Center
Information protection for GDPR with Microsoft 365
capabilities
2/5/2021 • 2 minutes to read • Edit Online
Microsoft 365 provides a rich set of capabilities to help you achieve compliance with the General Data
Protection Regulation (GDPR). This article summarizes recommended capabilities with links to more
information.
For more information about how Microsoft can help you with the GDPR, see Get Started: Support for GDPR
Accountability in the Service Trust Portal.
Information protection
Office 365 provides a rich set of data governance capabilities. For help with finding, classifying, protecting, and
monitoring personal data, see Office 365 Information Protection for GDPR.
For help with on-premises servers, including file shares, SharePoint Server, Exchange Server, Skype for Business
Server, Project Server, and Office Online Server, see GDPR for on-premises Office servers.
Threat Protection
Threat protection is built across Microsoft 365 services. Here are a few resources to get you started:
Office 365 security roadmap: Top priorities for the first 30 days, 90 days, and beyond. This roadmap includes
recommendations for implementing capabilities.
Protect against threats in Office 365. Learn about protection actions you can take in the Microsoft 365
security center.
Windows Threat Protection. Learn more about Windows Defender Advanced Threat Protection and other
capabilities in Windows 10.
Learn more
Microsoft Trust Center
Microsoft's data protection officer
1/26/2021 • 2 minutes to read • Edit Online
Microsoft has designated a European Union Data Protection Officer (DPO) to be an independent advisor for
Microsoft's engineering and business groups and to help ensure that all proposed processing of personal data
meets EU legal requirements and Microsoft's corporate standards. The role was designed to meet the GDPR
criteria set out in Articles 37-39.
Qualifications
The DPO role requires successful candidates to have at least seven years of professional data protection
experience, or a mix of 10 years of data protection, security, and enterprise risk management experience in order
to be considered for the position. In addition, candidates must have demonstrated expertise in international data
protection law and practices.
Contact
Data subjects may contact the data protection officer by filling out the webform at
https://aka.ms/privacyresponse. The DPO can also be reached by post at:
Microsoft EU Data Protection Officer
One Microsoft Place
South County Business Park
Leopardstown
Dublin 18
D18 P521
Ireland
Telephone: +353 (1) 706-3117
The contact details for the Data Protection Officer have been communicated to Microsoft's Supervisory
Authority.
Learn more
Microsoft Trust Center
Support your GDPR program with Accountability
Readiness Checklists
2/5/2021 • 5 minutes to read • Edit Online
The General Data Protection Regulation (GDPR) introduces new rules for organizations that offer goods and
services to people in the European Union (EU), or that collect and analyze data for EU residents no matter where
you or your enterprise are located. Additional details are in the GDPR Summary topic.
Customer agreements
Online ser vice terms : You can find Microsoft contractual commitments with regard to the GDPR in the
Online Services Terms.
Microsoft product terms : Microsoft extends the GDPR Terms commitments to all Volume Licensing
customers.
Data protection addendum : Microsoft services extends the commitments to Microsoft Consulting
Services customers and others.
Learn more
Microsoft Trust Center
Azure and Dynamics 365 accountability readiness
checklist for the GDPR
2/9/2021 • 2 minutes to read • Edit Online
To support the General Data Protection Regulation (GDPR) when using Microsoft Azure and Dynamics 365, use
the set of privacy and security controls for personal data processors:
ISO/IEC 27701 for privacy management requirements
ISO/IEC 27001 for security techniques requirements
Microsoft Azure and Dynamics 365 services are certified to ISO 27701 (PIMS).
Microsoft Support and Professional Services
accountability readiness checklist for the GDPR
2/5/2021 • 27 minutes to read • Edit Online
1. Introduction
This accountability readiness checklist provides a convenient way to access information you may need to
support GDPR when using Microsoft Professional Services and Support Services. The checklist is organized
using the titles and reference number (in parentheses for each checklist topic) of a set of privacy and security
controls for personal data processors drawn from:
ISO/IEC 27701 for privacy management requirements.
ISO/IEC 27001 for security techniques requirements.
This control structure is also used to organize the presentation of the internal controls that Microsoft
Professional Services implements to support GDPR, which you can download from the Service Trust Portal.
Identify and document The customer should A description of the (5)(1)(b), (32)(4)
purpose (7.2.1) document the purpose for processing Microsoft
which personal data is performs for you, and the
processed. purposes of that
processing, that can be
included in your
accountability
documentation.
- Microsoft Professional
Services Data Protection
Addendum [1]
Identify lawful basis The customer should A description of processing (5)(1)(a), (6)(1)(a), (6)(1)(b),
(7.2.2) understand any personal data by Microsoft (6)(1)(c), (6)(1)(d), (6)(1)(e),
requirements related to the services for inclusion in (6)(1)(f), (6)(3), (6)4)(a), (6)
lawful basis of processing, your accountability (4)(b), (6)(4)(c), (6)(4)(d), (6)
such as whether consent documentation. (4)(e), (8)(3), (9)(1), (9)(2)(b),
must first be given. - Key Information from (9)(2)(c), (9)(2)(d), (9)(2)(e),
Microsoft Professional (9)(2)(f), (9)(2)(g), (9)(2)(h),
Services for Customer Data (9)(2)(i), (9)(2)(j), (9)(3), (9)
Protection Impact (4), (10), (17)(3)(a), (17)(3)
Assessments [9] (b), (17)(3)(c), (17)(3)(d), (17)
(3)(e), (18)(2), (22)(2)(a), (22)
(2)(b), (22)(2)(c), (22)(4)
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Determine when The customer should Microsoft Professional (6)(1)(a), (8)(1), (8)(2)
consent is to be understand legal or Services does not provide
obtained (7.2.3) regulatory requirements for direct support for gaining
obtaining consent from user consent.
individuals prior to
processing personal data
(when it is required, if the
type of processing is
excluded from the
requirement, etc.), including
how consent is collected.
Obtain and record When it is determined to be Microsoft Professional (7)(1), (7)(2), (9)(2)(a)
consent (7.2.4) required, the customer Services does not provide
should appropriately obtain direct support for gaining
consent. The customer user consent.
should also be aware of any
requirements for how a
request for consent is
presented and collected.
Contracts with PII The customer should The Microsoft contracts (5)(2), (28)(3)(e), (28)(9)
Processors (7.2.6) ensure that their contracts that require us to aid with
with processors include your obligations under the
requirements for aiding GDPR, including support for
with any relevant legal or the data subject's rights.
regulatory obligations - Microsoft Professional
related to processing and Services Data Protection
protecting personal data. Addendum [1]
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Records related to The customer should Microsoft Professional (5)(2), (24)(1), (30)(1)(a), (30)
processing PII (7.2.7) maintain all necessary and Services maintains records (1)(b), (30)(1)(c), (30)(1)(d),
required records related to necessary to demonstrate (30)(1)(g), (30)(1)(f), (30)(3),
processing personal data compliance and support for (30)(4), (30)(5)
(for example, purpose, accountability under the
security measures, etc.). GDPR. See the Microsoft
Where some of these Professional Services
records must be provided Security Documentation [2]
by a sub-processor, the
customer should ensure
that they can obtain such
records.
Providing information The customer should Templated information (11)(2), (12)(1), (12)(7), (13)
to PII principals (7.3.3) comply with any about Microsoft (3), (21)(4)
requirements around Professional Services that
how/when/in what form the you can include in the data
required information is to you provide to data
be given to an individual subjects.
related to the processing of - Microsoft Professional
their personal data. In cases Services Data Subject
where a third party may Requests for the GDPR and
provide required CCPA [7]
information, the customer - Key Information from
should ensure that it is Microsoft Professional
within the parameters Services for Customer Data
required by the GDPR. Protection Impact
Assessments [9]
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Provide mechanism to The customer should Information about (7)(3), (13)(2)(c), (14)(2)(d),
modify or withdraw understand requirements capabilities in Microsoft (18)(1)(a), (18)(1)(b), (18)(1)
consent (7.3.4) for informing users about services that you can use (c), (18)(1)(d)
their right to access, correct, when defining the
and/or erase their personal information you provide to
data and for providing a data subjects when
mechanism for which them requesting consent.
to do so. If a third-party - Microsoft Professional
system is used and provides Services Data Subject
this mechanism as part of Requests for the GDPR and
its functionality, the CCPA [7]
customer should utilize that
functionality as necessary.
Provide mechanism to The customer should Information about (13)(2)(b), (14)(2)(c), (21)(1),
object to processing understand requirements Microsoft services relating (21)(2), (21)(3), (21)(5), (21)
(7.3.5) around rights of data to object to processing that (6)
subjects. Where an you can include in the data
individual has a right to you provide to data
object to processing, the subjects.
customer should inform - Microsoft Professional
them, and have a way for Services Data Subject
the individual to register Requests for the GDPR and
their objection. CCPA [7]
Providing copy of PII The customer should Information about (15)(3), (15)(4), (20)(1), (20)
processed (7.3.8) understand requirements capabilities in Microsoft (2), (20)(3), (20)(4)
around providing a copy of services to allow you to
the personal data being obtain a copy of their
processed to the individual. personal data that you can
These may include include in the data you
requirements around the provide to data subjects.-
format of the copy (that is, Microsoft Professional
that it is machine readable), Services Data Subject
transferring the copy, etc. Requests for the GDPR and
Where the customer uses a CCPA [7]
third-party system that
provides the functionality to
provide copies, they should
utilize this functionality as
necessary.
Request management The customer should Information about (12)(3), (12)(4), (12)(5), (12)
(7.3.9) understand requirements capabilities in Microsoft (6), (15)(1)(a), (15)(1)(b), (15)
for accepting and services that you can use (1)(c), (15)(1)(d), (15)(1)(e),
responding to legitimate when defining the (15)(1)(f), (15)(1)(g), (15)(1)
requests from individuals information you provide to (h)
related to the processing of data subjects as you
their personal data. Where manage data subject
the customer uses a third- requests.- Microsoft
party system, they should Professional Services Data
understand whether that Subject Requests for the
system provides the GDPR and CCPA [7]
capabilities for such
handling of requests. If so,
the customer should utilize
such mechanisms to handle
requests, as necessary.
Automated decision The customer should Information about any (13)(2)(f), (14)(2)(g), (22)(1),
making (7.3.10) understand requirements capabilities in Microsoft (22)(3)
around automated personal services for that might
data processing and where support automated
decisions are made by such decision making that you
automation. These may can use in your
include providing accountability
information about the documentation, and
processing to an individual, templated information for
objecting to such data subjects about those
processing, or to obtain capabilities.
human intervention. Where - Key Information from
such features are provided Microsoft Professional
by a third-party system, the Services for Customer Data
customer should ensure Protection Impact
that the third party Assessments [9]
provides any required
information or support.
Limit collection (7.4.1) The customer should A description of the data (5)(1)(b), (5)(1)(c)
understand requirements collected by Microsoft
around limits on collection services.
of personal data (for - Microsoft Professional
example, that the collection Services Data Protection
should be limited to what is Addendum [1]
needed for the specified - Key Information from
purpose). Microsoft Professional
Services for Customer Data
Protection Impact
Assessments [9]]
Limit processing (7.4.2) The customer is responsible A description of the data (25)(2)
for limiting the processing collected by Microsoft
of personal data so that it is services.
limited to what is adequate - Microsoft Professional
for the identified purpose. Services Data Protection
Addendum [1]
- Key Information from
Microsoft Professional
Services for Customer Data
Protection Impact
Assessments [9]
Define and document The customer should Customer is responsible for (5)(1)(c)
PII minimization and understand requirements de-identification before
de-identification around de-identification of transferring data to
objectives (7.4.3) personal data, which may Microsoft. Microsoft applies
include, when it should be de-identification and
used, the extent to which it pseudonymization
should de-identify, and internally, where
instances when it cannot be appropriate, to provide
used. additional privacy
safeguards for personal
data.
Comply with The customer should use Customer is responsible for (5)(1)(c)
identification levels and comply with de- de-identification before
(7.4.4) identification objectives and transferring data to
methods set by their Microsoft. Microsoft applies
organization. de-identification and
pseudonymization
internally, where
appropriate, to provide
additional privacy
safeguards for personal
data.
PII de-identification and The customer should Capabilities provided by (5)(1)(c),(5)(1)(e), (6)(4)(e),
deletion (7.4.5) understand requirements Microsoft Services to (11)(1), (32)(1)(a)
around the retention of support your data retention
personal data past its use policies.
for the identified purposes. - Microsoft Professional
Where provided tooling by Services Data Subject
the system, the customer Requests for the GDPR and
should utilize those tools to CCPA [7]
erase or delete as
necessary.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Retention (7.4.7) The customer should Information about the (13)(2)(a), (14)(2)(a)
determine how long retention of personal data
personal data should be by Microsoft services that
retained, taking into you can include in
consideration the identified documentation provided to
purposes. data subjects.
- Microsoft Professional
Services Data Protection
Addendum [1]
Transmission controls The customer should A description of the types (15)(2), (30)(1)(e), (5)(1)(f)
(7.4.10) understand requirements of personal data that are
around safeguarding the transferred by Microsoft
transmission of personal services and the locations
data, including who has they are transferred
access to transmission between, and the legal
mechanisms, records of safeguards for the transfer.
transmission, etc. - Key Information from
Microsoft Professional
Services for Customer Data
Protection Impact
Assessments [9]
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Identify basis for PII The customer should be A description of the types Articles (44), (45), (46), (47),
transfer (7.5.1 aware of requirements for of personal data that are (48), and (49)
transferring personal data transferred by Microsoft
(PII) to a different services and the locations
geographic location and they are transferred
document what measures between, and the legal
are in place to meet such safeguards for the transfer.
requirements. - Key Information from
Microsoft Professional
Services for Customer Data
Protection Impact
Assessments [9]
Joint controller (7.5.5) The customer should Microsoft is not a joint (26)(1), (26)(2), (26)(3)
determine whether they are controller of personal
a joint controller with any information provided as
other organization, and part of Support and
appropriately document Consulting Data.
and allocate responsibilities.
5. Data protection & security
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Understanding the Customers should How Microsoft considers (24)(3), (28)(10), (28)(5),
organization and its determine their role in each service as either a (28)(6), (32)(3), (40)(1), (40)
context (5.2.1) processing personal data processor or controller (2)(a), (40)(2)(b), (40)(2)(c),
(for example, controller, when processing personal (40)(2)(d), (40)(2)(e), (40)(2)
processor, co-controller) to data. (f), (40)(2)(g), (40)(2)(h), (40)
identify the appropriate - Microsoft Professional (2)(i), (40)(2)(j), (40)(2)(k),
requirements (regulatory, Services Data Protection (40)(3), (40)(4), (40)(5), (40)
etc.) for processing personal Addendum [1] (6), (40)(7), (40)(8), (40)(9),
data. (40)(10), (40)(11), (41)(1),
(41)(2)(a), (41)(2)(b), (41)(2)
(c), (41)(2)(d), (41)(3), (41)
(4), (41)(5), (41)(6), (42)(1),
(42)(2), (42)(3), (42)(4), (42)
(5), (42)(6), (42)(7), (42)(8)
Understanding the Customers should identify How Microsoft incorporates (35)(9), (36)(1), (36)(3)(a),
needs and expectations parties that may have a role the views of all stakeholders (36)(3)(b), (36)(3)(c), (36)(3)
of interested par ties or interest in their in consideration of the risks (d), (36)(3)(e), (36)(3)(f), (36)
(5.2.2) processing of personal data involved in the processing (5)
(for example, regulators, of personal data.
auditors, data subjects, - Key Information from
contracted personal data Microsoft Professional
processors), and be aware Services for Customer Data
of requirements to engage Protection Impact
such parties where Assessments [9]
required.
Determining the scope As part of any overall How Microsoft services (32)(2)
of the information security or privacy program include the processing of
security management that a customer may have, personal data in
system (5.2.3, 5.2.4) they should include the information security
processing of personal data management and privacy
and requirements relating programs.
to it. - Microsoft Professional
Services ISO/IEC
27001:2013 ISMS
Statement of Applicability
[11]
- ISO 27001 Audit Report
[10]
Planning (5.3) Customers should consider How Microsoft services (32)(1)(b), (32)(2)
the handling of personal consider the risks specific to
data as part of any risk the processing of personal
assessment they complete data as part of their overall
and apply controls as they security and privacy
deem necessary to mitigate program.
risk related to personal data - Microsoft Professional
they control. Services ISO/IEC
27001:2013 ISMS
Statement of Applicability
[11]
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Organization of The customer should, within Microsoft has published (37)(1)(a), (37)(1)(b), (37)(1)
Information Security their organization, define information on the (c), (37)(2), (37)(3), (37)(4),
Customer consideration responsibilities for security Microsoft Data Protection (37)(5), (37)(6), (37)(7), (38)
(6.3) and protection of personal Officer, the nature of their (1), (38)(2), (38)(3), (38)(4),
data. This may include duties, reporting structure (38)(5), (38)(6), (39)(1)(a),
establishing specific roles to and contact information. (39)(1)(b), (39)(1)(c), (39)(1)
oversee privacy-related - Microsoft DPO (d), (39)(1)(e), (39)(2)
matters, including a DPO. Information [13]
Appropriate training and
management support
should be provided to
support these roles.
Physical media transfer The customer should How Microsoft services (32)(1)(a), (5)(1)(f)
(6.5.3) determine internal policies protect personal data
for protecting personal data during any transfer of
when transferring physical physical media.
media (for example, - Microsoft Professional
encryption). Services ISO/IEC
27001:2013 ISMS
Statement of Applicability
[11]
- Microsoft Professional
Services Control Set [4]
User registration and The customer should The tools provided by (5)(1)(f)
de-registration (6.6.2) manage user registration Microsoft services to help
and de-registration within you enforce access control.
the service they utilize, - Microsoft Professional
using the tools available to Services Security
them. Documentation [2]
Secure log on The customer should utilize How Microsoft services (5)(1)(f)
procedures (6.6.5) provided mechanisms in the support internal access
service to ensure secure log control policies related to
on capabilities for their personal data.
users where necessary. - Who can access your data
and on what terms [6]
Secure disposal or reuse Where the customer uses How Microsoft Professional (5)(1)(f)
of equipment (6.8.1) cloud computing services Services ensures that
(PaaS, SaaS, IaaS) they personal data is erased
should understand how the from storage equipment
cloud provider ensures that before that equipment is
personal data is erased transferred or reused, when
from storage space prior to utilizing Microsoft Azure
that space being assigned cloud computing services
to another customer. during professional services.
- Microsoft Professional
Services Security
Documentation [2]
Clear desk and clear The customer should What Microsoft implements (5)(1)(f)
screen policy (6.8.2) consider risks around to manage hardcopy.
hardcopy material that - Microsoft maintains these
displays personal data, and controls internally, see
potentially restrict the Microsoft Professional
creation of such material. Services ISO/IEC
Where the system in use 27001:2013 ISMS
provides the capability to Statement of Applicability
restrict this (for example, [11]
settings to prevent printing - Microsoft Professional
or copying/pasting of Services GDPR Control Set
sensitive data), the [4]
customer should consider
the need to utilize those
capabilities.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Information backup The customer should How Microsoft ensures the (32)(1)(c), (5)(1)(f)
(6.9.2) ensure that they use availability of data that may
system provided capabilities include personal data, how
to create redundancies in accuracy of restored data is
their data and test as ensured, and the tools and
necessary. procedures Microsoft
services provide to allow
you to back up and restore
data.
- Microsoft Enterprise
Business Continuity
Management
Documentation [5]
Event logging (6.9.3) The customer should The data Microsoft service (5)(1)(f)
understand the capabilities records for you, including
for logging provided by the user activities, exceptions,
system and utilize such faults and information
capabilities to ensure that security events, and how
they can log actions related you can access those logs
to personal data that they for use as part of your
deem necessary. record keeping.
- Microsoft Professional
Services Security
Documentation [2]
- Microsoft Professional
Services Control Set [4]
Information transfer The customer should have How Microsoft services (5)(1)(f)
policies and procedures procedures for cases where transfer physical media that
(6.10.) personal data may be may contain personal data,
transferred on physical including the circumstances
media (such as a hard drive when transfer might occur,
being moved between and the protective
servers or facilities). These measures taken to protect
may include logs, the data.
authorizations, and - Microsoft Professional
tracking. Where a third- Services ISO/IEC
party or other processor 27001:2013 ISMS
may be transferring physical Statement of Applicability
media, the customer should [11]
ensure that that - Microsoft Professional
organization has Services Control Set [4]
procedures in place to
ensure security of the
personal data.
Confidentiality or non- The customer should How Microsoft services (5)(1)(f), (28)(3)(b), (38)(5)
disclosure agreements determine the need for ensure that individuals with
(6.10.2) confidentiality agreements authorized access to
or the equivalent for personal data have
individuals with access to or committed themselves to
responsibilities related to confidentiality.
personal data. - Microsoft Professional
Services ISO/IEC
27001:2013 ISMS
Statement of Applicability
[11]
- Microsoft Professional
Services Control Set [4]
Supplier Relationships The customer should How Microsoft services (5)(1)(f), (28)(1), (28)(3)(a),
(6.12) ensure that any information address security and data (28)(3)(b), (28)(3)(c), (28)(3)
security and personal data protection in our (d), (28)(3)(e), (28)(3)(f), (28)
protection requirements agreements with our (3)(g), (28)(3)(h),(30)(2)(d),
and that are the suppliers and how we (32)(1)(b)
responsibility of a third ensure that those
party are addressed in agreements are effectively
contractual information or implemented.
other agreements. The - Who can access your data
agreements should also and on what terms [6]
address the instructions for
processing.
Responsibilities and The customer should How to notify Microsoft (5)(1)(f), (33)(1), (33)(3)(a),
procedures (during understand and document services if you detect a (33)(3)(b), (33)(3)(c), (33)(3)
information security their responsibilities during security incident or breach (d), (33)(4), (33)(5), (34)(1),
incidents) (6.13.2) a data breach or security of personal data. (34)(2), (34)(3)(a), (34)(3)(b),
incident involving personal - Microsoft Professional (34)(3)(c), (34)(4)
data. Responsibilities may Services and Breach
include notifying required Notification Under the
parties, communications GDPR [8]
with processors or other
third-parties, and
responsibilities within the
customer's organization.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Response to information The customer should have Description of the (33)(1), (33)(2), (33)(3)(a),
security incidents processes for determining information Microsoft (33)(3)(b), (33)(3)(c), (33)(3)
(6.13.3) when a personal data services provides to help (d), (33)(4), (33)(5), (34)(1),
breach has occurred. you decide if a breach of (34)(2)
personal data has occurred.
- Microsoft Professional
Services and Breach
Notification Under the
GDPR [8]
Protection of records The customer should How Microsoft services (5)(2), (24)(2)
(6.15.1) understand the store records relating to the
requirements for records processing of personal data.
related to personal data - Microsoft Professional
processing that need to be Services Security
maintained. Documentation [2]
Independent review of The customer should be How Microsoft services test (32)(1)(d), (32)(2)
information security aware of requirements for and assesses the
(6.15.2) assessments of the security effectiveness of technical
of personal data processing. and organizational
This may include internal or measures to ensure the
external audits, or other security of processing,
measures for assessing the including any audits by
security of processing. third parties.
Where the customer is - Microsoft Professional
dependent on another Services Data Protection
organization of third party Addendum [1]
for all or part of the
processing, they should
collect information about
such assessments
performed by them.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Technical compliance The customer should How Microsoft services are (32)(1)(d), (32)(2)
review (6.15.3) understand requirements tested security based on
for testing and evaluating identified risks, including
the security of processing tests by third parties, and
personal data. This may the types of technical tests.
include technical tests such - For a listing of external
as penetration testing. certifications, see Microsoft
Where the customer uses a Trust Center Compliance
third-party system or offerings [12]
processor, they should - For more information
understand what about vulnerability testing
responsibilities they have your applications, see
for securing and testing the Microsoft Professional
security (for example, Services Security
managing configurations to Documentation [2]
secure data and then
testing those configuration
settings). Where the third
party is responsible for all
or part of the security of
processing, the customer
should understand what
testing or evaluation the
third party performs to
ensure the security of the
processing.
1 Microsoft Professional
Services Data Protection
Addendum
2 Microsoft Professional
Services Security
Documentation
4 Microsoft Professional
Services GDPR Control Set
7 Microsoft Professional
Services Data Subject
Requests for the GDPR and
CCPA
8 Microsoft Professional
Services and Breach
Notification Under the
GDPR
Learn more
Microsoft Trust Center
Accountability Readiness Checklist for Microsoft 365
2/5/2021 • 30 minutes to read • Edit Online
1. Introduction
This accountability readiness checklist provides a convenient way to access information you may need to
support the GDPR when using Microsoft Office 365.
You can manage the items in this checklist with Compliance Manager by referencing the Control ID and Control
Title under Customer Managed Controls in the GDPR tile.
In addition, items in this checklist under 5. Data Protection & Security provide references to controls listed under
Microsoft Managed Controls in the GDPR tile in Compliance Manager. Reviewing the Microsoft Implementation
Details for these controls provide additional explanation of Microsoft's approach to fulfilling the customer
considerations in the checklist item.
The checklist and Compliance Manager are organized using the titles and reference number (in parentheses for
each checklist topic) of a set of privacy and security controls for personal data processors drawn from:
ISO/IEC 27701 for privacy management requirements.
ISO/IEC 27001 for security techniques requirements.
This control structure is also used to organize the presentation of the internal controls that Microsoft Office 365
implements to support GDPR, which you can download from the Service Trust Center.
Determine when The customer should Office 365 does not provide (6)(1)(a), (8)(1), (8)(2)
consent is to be understand legal or direct support for gaining
obtained (7.2.3) regulatory requirements for user consent.
obtaining consent from
individuals prior to
processing personal data
(when it is required, if the
type of processing is
excluded from the
requirement, etc.), including
how consent is collected.
Identify and document The customer should A description of the (5)(1)(b), (32)(4)
purpose (7.2.1) document the purpose for processing Microsoft
which personal data is performs for you, and the
processed. purposes of that
processing, that can be
included in your
accountability
documentation.
- Microsoft Online Services
Terms, Data Protection
Terms, see Processing of
Personal Data; GDPR [1]
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Identify lawful basis The customer should A description of processing (5)(1)(a), (6)(1)(a), (6)(1)(b),
(7.2.2) understand any personal data by Microsoft (6)(1)(c), (6)(1)(d), (6)(1)(e),
requirements related to the services for inclusion in (6)(1)(f), (6)(3), (6)4)(a), (6)
lawful basis of processing, your accountability (4)(b), (6)(4)(c), (6)(4)(d), (6)
such as whether consent documentation. (4)(e), (8)(3), (9)(1), (9)(2)(b),
must first be given. - Key Information from (9)(2)(c), (9)(2)(d), (9)(2)(e),
Office 365 for Customer (9)(2)(f), (9)(2)(g), (9)(2)(h),
Data Protection Impact (9)(2)(i), (9)(2)(j), (9)(3), (9)
Assessments[10] (4), (10), (17)(3)(a), (17)(3)
(b), (17)(3)(c), (17)(3)(d), (17)
(3)(e), (18)(2), (22)(2)(a), (22)
(2)(b), (22)(2)(c), (22)(4)
Determine when The customer should Office 365 does not provide (6)(1)(a), (8)(1), (8)(2)
consent is to be understand legal or direct support for gaining
obtained (7.2.3) regulatory requirements for user consent.
obtaining consent from
individuals prior to
processing personal data
(when it is required, if the
type of processing is
excluded from the
requirement, etc.), including
how consent is collected.
Obtain and record When it is determined to be Office 365 does not provide (7)(1), (7)(2), (9)(2)(a)
consent (7.2.4) required, the customer direct support for gaining
should appropriately obtain user consent.
consent. The customer
should also be aware of any
requirements for how a
request for consent is
presented and collected.
Contracts with PII The customer should The Microsoft contracts (5)(2), (28)(3)(e), (28)(9)
Processors (7.2.6) ensure that their contracts that require us to aid with
with processors include your obligations under the
requirements for aiding GDPR, including support for
with any relevant legal or the data subject's rights.
regulatory obligations - Microsoft Online Services
related to processing and Terms, Data Protection
protecting personal data. Terms, see Processing of
Personal Data; GDPR [1]
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Records related to The customer should The tools provided by (5)(2), (24)(1), (30)(1)(a), (30)
processing PII (7.2.7) maintain all necessary and Microsoft services to help (1)(b), (30)(1)(c), (30)(1)(d),
required records related to you maintain the records (30)(1)(g), (30)(1)(f), (30)(3),
processing personal data necessary demonstrate (30)(4), (30)(5)
(that is, purpose, security compliance and support for
measures, etc.). Where accountability under the
some of these records must GDPR.
be provided by a sub- - Search the audit log in
processor, the customer Office 365 Security and
should ensure that they can Compliance Center [16]
obtain such records.
Providing information The customer should Templated information (11)(2), (12)(1), (12)(7), (13)
to PII principals (7.3.3) comply with any about Microsoft services (3), (21)(4)
requirements around that you can include in the
how/when/in what form the data you provide to data
required information is to subjects.
be given to an individual - Office 365 Data Subject
related to the processing of Requests for the GDPR [8]
their personal data. In cases - Key Information from
where a third party may Office 365 for Customer
provide required Data Protection Impact
information, the customer Assessments [10]
should ensure that it is
within the parameters
required by the GDPR.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Provide mechanism to The customer should Information about (7)(3), (13)(2)(c), (14)(2)(d),
modify or withdraw understand requirements capabilities in Microsoft (18)(1)(a), (18)(1)(b), (18)(1)
consent (7.3.4) for informing users about services that you can use (c), (18)(1)(d)
their right to access, correct, when defining the
and/or erase their personal information you provide to
data and for providing a data subjects when
mechanism for which them requesting consent.
to do so. If a third-party - Office 365 Data Subject
system is used and provides Requests for the GDPR [8]
this mechanism as part of
its functionality, the
customer should utilize that
functionality as necessary.
Provide mechanism to The customer should Information about (13)(2)(b), (14)(2)(c), (21)(1),
object to processing understand requirements Microsoft services relating (21)(2), (21)(3), (21)(5), (21)
(7.3.5) around rights of data to object to processing that (6)
subjects. Where an you can include in the data
individual has a right to you provide to data
object to processing, the subjects.
customer should inform - Office 365 Data Subject
them, and have a way for Requests for the GDPR [8]
the individual to register see Step 4: Restrict
their objection.
Correction or erasure The customer should Templated information (5)(1)(d), (13)(2)(b), (14)(2)
(7.3.7) understand requirements about Microsoft services (c), (16), (17)(1)(a), (17)(1)
for informing users about relating to their ability to (b), (17)(1)(c), (17)(1)(d), (17)
their right to access, correct, access, correct, or erase (1)(e), (17)(1)(f), (17)(2)
and/or erase their personal personal data that you can
data and for providing a include in the data you
mechanism for which them provide to data subjects.
to do so. If a third-party - Office 365 Data Subject
system is used and provides Requests for the GDPR [8]
this mechanism as part of see Step 5: Delete
its functionality, the
customer should utilize that
functionality as necessary.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Providing copy of PII The customer should Information about (15)(3), (15)(4), (20)(1), (20)
processed (7.3.8) understand requirements capabilities in Microsoft (2), (20)(3), (20)(4)
around providing a copy of services to allow you to
the personal data being obtain a copy of their
processed to the individual. personal data that you can
These may include include in the data you
requirements around the provide to data subjects.
format of the copy (that is, - Office 365 Data Subject
that it is machine readable), Requests for the GDPR [8]
transferring the copy, etc. see Step 6: Export
Where the customer uses a
third-party system that
provides the functionality to
provide copies, they should
utilize this functionality as
necessary.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Request management The customer should Information about (13)(2)(f), (14)(2)(g), (22)(1),
(7.3.9) understand requirements capabilities in Microsoft (22)(3)
for accepting and services that you can use
responding to legitimate when defining the
requests from individuals information you provide to
related to the processing of data subjects as you
their personal data. Where manage data subject
the customer uses a third- requests.
party system, they should - Office 365 Data Subject
understand whether that Requests for the GDPR [8]
system provides the customer should
capabilities for such understand requirements
handling of requests. If so, around automated personal
the customer should utilize data processing and where
such mechanisms to handle decisions are made by such
requests as necessary. automation. These may
include providing
information about the
processing to an individual,
objecting to such
processing, or to obtain
human intervention. Where
such features are provided
by a third-party system, the
customer should ensure
that the third party
provides any required
information or support.
Information about any
capabilities in Microsoft
services that might
support automated
decision making that
you can use in your
accountability
documentation, and
templated information
for data subjects about
those capabilities.
- Key Information from
Office 365 for
Customer Data
Protection Impact
Assessments [10]
Limit collection (7.4.1) The customer should A description of the data (5)(1)(b), (5)(1)(c)
understand requirements collected by Microsoft
around limits on collection services.
of personal data (for - Microsoft Online Services
example, that the collection Terms, Data Protection
should be limited to what is Terms, see Processing of
needed for the specified Personal Data; GDPR [1]
purpose). - Key Information from
Office 365 for Customer
Data Protection Impact
Assessments [10]
Limit processing (7.4.2) The customer is responsible A description of the data (25)(2)
for limiting the processing collected by Microsoft
of personal data so that it is services.
limited to what is adequate - Microsoft Online Services
for the identified purpose. Terms, Data Protection
Terms, see Processing of
Personal Data; GDPR [1]
- Key Information from
Office 365 for Customer
Data Protection Impact
Assessments [10]
Define and document The customer should Microsoft applies de- (5)(1)(c)
PII minimization and understand requirements identification and
de-identification around de-identification of pseudonymization
objectives (7.4.3) personal data that may internally, where
include, when it should be appropriate, to provide
used, the extent to which it additional privacy
should de-identify, and safeguards for personal
instances when it cannot be data.
used.
Comply with The customer should use Microsoft applies de- (5)(1)(c)
identification levels and comply with de- identification and
(7.4.4) identification objectives and pseudonymization
methods set by their internally, where
organization. appropriate, to provide
additional privacy
safeguards for personal
data.
PII de-identification and The customer should Capabilities provided by (5)(1)(c), (5)(1)(e), (6)(4)(e),
deletion (7.4.5) understand requirements Microsoft cloud services to (11)(1), (32)(1)(a)
around the retention of support your data retention
personal data past its use policies.
for the identified purposes. - Office 365 Data Subject
Where provided tooling by Requests for the GDPR [8]
the system, the customer see Step 5: Delete
should utilize those tools to
erase or delete as
necessary.
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Retention (7.4.7) The customer should Information about the (13)(2)(a), (14)(2)(a)
determine how long retention of personal data
personal data should be by Microsoft services that
retained, taking into you can include in
consideration the identified documentation provided to
purposes. data subjects.
- Microsoft Online Services
Terms, Data Protection
Terms, see Data Security,
Retention [1]
Transmission controls The customer should A description of the types (15)(2), (30)(1)(e), (5)(1)(f)
(7.4.10) understand requirements of personal data that are
around safeguarding the transferred by Microsoft
transmission of personal services and the locations
data, including who has they are transferred
access to transmission between, and the legal
mechanisms, records of safeguards for the transfer.
transmission, etc. - Key Information from
Office 365 for Customer
Data Protection Impact
Assessments [10]
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Identify basis for PII The customer should be A description of the types Articles (44), (45), (46), (47),
transfer (7.5.1) aware of requirements for of personal data that are (48), and (49)
transferring personal data transferred by Microsoft
(PII) to a different services and the locations
geographic location and they are transferred
document what measures between, and the legal
are in place to meet such safeguards for the transfer.
requirements. - Key Information from
Office 365 for Customer
Data Protection Impact
Assessments [10]
Understanding the Customers should How Microsoft considers (24)(3), (28)(10), (28)(5),
organization and its determine their role in each service as either a (28)(6), (32)(3), (40)(1), (40)
context (5.2.1) processing personal data processor or controller (2)(a), (40)(2)(b), (40)(2)(c),
(for example, controller, when processing personal (40)(2)(d), (40)(2)(e), (40)(2)
processor, co-controller) to data. (f), (40)(2)(g), (40)(2)(h), (40)
identify the appropriate - Microsoft Online Services (2)(i), (40)(2)(j), (40)(2)(k),
requirements (regulatory, Terms, Data Protection (40)(3), (40)(4), (40)(5), (40)
etc.) for processing personal Terms, see Processing of (6), (40)(7), (40)(8), (40)(9),
data. Personal Data; GDPR, (40)(10), (40)(11), (41)(1),
Processor, and Controller (41)(2)(a), (41)(2)(b), (41)(2)
Roles and Responsibilities (c), (41)(2)(d), (41)(3), (41)
[1] (4), (41)(5), (41)(6), (42)(1),
(42)(2), (42)(3), (42)(4), (42)
(5), (42)(6), (42)(7), (42)(8)
Understanding the Customers should identify How Microsoft incorporates (35)(9), (36)(1), (36)(3)(a),
needs and expectations parties that may have a role the views of all stakeholders (36)(3)(b), (36)(3)(c), (36)(3)
of interested par ties or interest in their in consideration of the risks (d), (36)(3)(e), (36)(3)(f), (36)
(5.2.2) processing of personal data involved in the processing (5)
(for example, regulators, of personal data.
auditors, data subjects, - Key Information from
contracted personal data Office 365 for Customer
processors), and be aware Data Protection Impact
of requirements to engage Assessments [10]
such parties where - Office 365 ISMS Manual
required. [14] see 4.2
UNDERSTANDING THE
NEEDS AND EXPECTATIONS
OF INTERESTED PARTIES
- Understanding the needs
and expectations of
interested parties 5.2.2 in
Compliance Manager
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Determining the scope As part of any overall How Microsoft services (32)(2)
of the information security or privacy program include the processing of
security management that a customer may have, personal data in
system (5.2.3, 5.2.4) they should include the information security
processing of personal data management and privacy
and requirements relating programs.
to it. - Microsoft Office 365
ISO/IEC 27001:2013 ISMS
Statement of Applicability
[12] see A.19
- SOC 2 Type 2 Audit
Report [11]
- Office 365 ISMS Manual
[14] see 4. Context of the
Organization
- 5.2.3 Determining the
scope of the information
security management
system in Compliance
Manager
- 5.2.4 Information security
management system in
Compliance Manager
Planning (5.3) Customers should consider How Microsoft services (32)(1)(b), (32)(2)
the handling of personal consider the risks specific to
data as part of any risk the processing of personal
assessment they complete data as part of their overall
and apply controls as they security and privacy
deem necessary to mitigate program.
risk related to personal data - Office 365 ISMS Manual
they control. [14] see 5.2 Policy
- 5.3 Planning in
Compliance Manager
Organization of The customer should, within An overview of the role of (37)(1)(a), (37)(1)(b), (37)(1)
Information Security their organization, define Microsoft's Data Protection (c), (37)(2), (37)(3), (37)(4),
Customer consideration responsibilities for security Officer, the nature of his (37)(5), (37)(6), (37)(7), (38)
(6.3) and protection of personal duties, reporting structure (1), (38)(2), (38)(3), (38)(4),
data. This may include and contact information. (38)(5), (38)(6), (39)(1)(a),
establishing specific roles to - Microsoft's Data (39)(1)(b), (39)(1)(c), (39)(1)
oversee privacy-related Protection Officer [18] (d), (39)(1)(e), (39)(2)
matters, including a DPO. - Office 365 ISMS Manual
Appropriate training and [14] see 5.3
management support ORGANIZATIONAL ROLES,
should be provided to RESPONSIBILITIES, AND
support these roles. AUTHORITIES
- 6.3 Organization of
information security in
Compliance Manager
Physical media transfer The customer should How Microsoft services (32)(1)(a), (5)(1)(f)
(6.5.3) determine internal policies protect personal data
for protecting personal data during any transfer of
when transferring physical physical media.
media (for example, - FedRAMP Moderate
encryption). FedRAMP System Security
Plan [3] see 13.10 Media
Protection (MP)
- 6.5.3 Physical media
transfer in Compliance
Manager
User registration and The customer should The tools provided by (5)(1)(f)
de-registration (6.6.2) manage user registration Microsoft services to help
and de-registration within you enforce access control.
the service they utilize, - Office 365 Security
using the tools available to Documentation [2] see
them. Protect access to data and
services in Office 365
- 6.6.2 User registration
and de-registration in
Compliance Manager
Secure log on The customer should utilize How Microsoft services (5)(1)(f)
procedures (6.6.5) provided mechanisms in the support internal access
service to ensure secure log control policies related to
on capabilities for their personal data.
users where necessary. - Who can access your data
and on what terms [6]
- 6.6.5 Secure log-on
procedures in Compliance
Manager
Secure disposal or reuse Where the customer uses How Microsoft services (5)(1)(f)
of equipment (6.8.1) cloud computing services ensure that personal data is
(PaaS, SaaS, IaaS) they erased from storage
should understand how the equipment before that
cloud provider ensures that equipment is transferred or
personal data is erased reused.
from storage space prior to - FedRAMP Moderate
that space being assigned FedRAMP System Security
to another customer. Plan [3] see 13.10 Media
Protection (MP)
- 6.8.1 Secure disposal or
reuse of equipment in
Compliance Manager
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Clear desk and clear The customer should What Microsoft implements (5)(1)(f)
screen policy (6.8.2) consider risks around to manage hardcopy.
hardcopy material that - Microsoft maintains these
displays personal data, and controls internally, see
potentially restrict the Microsoft Office 365
creation of such material. ISO/IEC 27001:2013 ISMS
Where the system in use Statement of Applicability
provides the capability to [12] A.10.2, A.10.7, and
restrict this (for example, A.4.1
settings to prevent printing - 6.8.2 Clear desk and clear
or copying/pasting of screen policy in Compliance
sensitive data), the Manager
customer should consider
the need to utilize those
capabilities.
Information backup The customer should How Microsoft ensures the (32)(1)(c), (5)(1)(f)
(6.9.2) ensure that they use availability of data that may
system provided capabilities include personal data, how
to create redundancies in accuracy of restored data is
their data and test as ensured, and the tools and
necessary. procedures Microsoft
services provide to allow
you to back up and restore
data.
- FedRAMP Moderate
FedRAMP System Security
Plan [3] see 10.9 Availability
- 6.9.2 Information Backup
in Compliance Manager
Event logging (6.9.3) The customer should The data Microsoft service (5)(1)(f)
understand the capabilities records for you, including
for logging provided by the user activities, exceptions,
system and utilize such faults and information
capabilities to ensure that security events, and how
they can log actions related you can access those logs
to personal data that they for use as part of your
deem necessary. record keeping.
- Search the audit log in
Office 365 Security and
Compliance Center [16]
- 6.9.3 Event logging in
Compliance Manager
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Information transfer The customer should have How Microsoft services (5)(1)(f)
policies and procedures procedures for cases where transfer physical media that
(6.10.1) personal data may be may contain personal data,
transferred on physical including the circumstances
media (such as a hard drive when transfer might occur,
being moved between and the protective
servers or facilities). These measures taken to protect
may include logs, the data.
authorizations, and - FedRAMP Moderate
tracking. Where a third- FedRAMP System Security
party or other processor Plan [3] see 13.10 Media
may be transferring physical Protection (MP)
media, the customer should - 6.10.1 Information
ensure that that transfer policies and
organization has procedures in Compliance
procedures in place to Manager
ensure security of the
personal data.
Confidentiality or non- The customer should How Microsoft services (5)(1)(f), (28)(3)(b), (38)(5)
disclosure agreements determine the need for ensure that individuals with
(6.10.2) confidentiality agreements authorized access to
or the equivalent for personal data have
individuals with access to or committed themselves to
responsibilities related to confidentiality.
personal data. - SOC 2 Type 2 Audit
Report [11] see CC1.4 pp33
- Confidentiality or non-
disclosure agreements
6.10.2 in Compliance
Manager
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Supplier Relationships The customer should How Microsoft services (5)(1)(f), (28)(1), (28)(3)(a),
(6.12) ensure that any information address security and data (28)(3)(b), (28)(3)(c), (28)(3)
security and personal data protection in our (d), (28)(3)(e), (28)(3)(f), (28)
protection requirements agreements with our (3)(g), (28)(3)(h),(30)(2)(d),
and that are the suppliers and how we (32)(1)(b)
responsibility of a third ensure those agreements
party are addressed in are effectively implemented.
contractual information or - Who can access your data
other agreements. The and on what terms [6]
agreements should also - Contracts for sub-
address the instructions for processors: Contracting
processing. with Microsoft [7]
- 6.12 Supplier
Relationships in Compliance
Manager
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Responsibilities and The customer should How to notify Microsoft (5)(1)(f), (33)(1), (33)(3)(a),
procedures (during understand and document services if you detect a (33)(3)(b), (33)(3)(c), (33)(3)
information security their responsibilities during security incident or breach (d), (33)(4), (33)(5), (34)(1),
incidents) (6.13.2) a data breach or security of personal data (34)(2), (34)(3)(a), (34)(3)(b),
incident involving personal - Office 365 and Breach (34)(3)(c), (34)(4)
data. Responsibilities may Notification Under the
include notifying required GDPR [9]
parties, communications - 6.13.2 Responsibilities and
with processors or other procedures in Compliance
third-parties, and Manager
responsibilities within the
customer's organization.
Response to information The customer should have Descriptions of the (33)(1), (33)(2), (33)(3)(a),
security incidents processes for determining information Microsoft (33)(3)(b), (33)(3)(c), (33)(3)
(6.13.3) when a personal data services provide to help you (d), (33)(4), (33)(5), (34)(1),
breach has occurred. decide if a breach of (34)(2)
personal data has occurred.
- Office 365 and Breach
Notification Under the
GDPR [9]
- 6.13.3 Response to
information security
incidents in Compliance
Manager
Protection of records The customer should How Microsoft services (5)(2), (24)(2)
(6.15.1) understand the store records relating to the
requirements for records processing of personal data
related to personal data - Search the audit log in
processing that need to be Office 365 Security and
maintained. Compliance Center [16]
- Microsoft Office 365
ISO/IEC 27001:2013 ISMS
Statement of Applicability
[12] see A.18.1.3
- Office 365 ISMS Manual
[14], see 9 Performance
evaluation
C USTO M ER SUP P O RT IN G M IC RO SO F T A DDRESSES GDP R
C AT EGO RY C O N SIDERAT IO N DO C UM EN TAT IO N A RT IC L E( S)
Independent review of The customer should be How Microsoft services test (32)(1)(d), (32)(2)
information security aware of requirements for and assesses the
(6.15.2) assessments of the security effectiveness of technical
of personal data processing. and organizational
This may include internal or measures to ensure the
external audits, or other security of processing,
measures for assessing the including any audits by
security of processing. third parties.
Where the customer is - Microsoft Online Services
dependent on another Terms, Data Protection
organization of third party Terms, see Data Security,
for all or part of the Auditing Compliance [1]
processing, they should - Office 365 ISMS Manual
collect information about [14]see 9 Performance
such assessments evaluation
performed by them. - 6.15.2 Independent
review of information
security in Compliance
Manager
Technical compliance The customer should How Microsoft services are (32)(1)(d), (32)(2)
review (6.15.3) understand requirements tested security based on
for testing and evaluating identified risks, including
the security of processing tests by third parties, and
personal data. This may the types of technical tests
include technical tests such and any available reports
as penetration testing. from the tests.
Where the customer uses a - Microsoft Online Services
third-party system or Terms, Data Protection
processor, they should Terms, see Data Security,
understand what Auditing Compliance [1]
responsibilities they have - For a listing of external
for securing and testing the certifications, see Microsoft
security (for example, Trust Center Compliance
managing configurations to offerings [13]
secure data and then - For more information
testing those configuration about penetration testing
settings). Where the third your applications, see
party is responsible for all FedRAMP Moderate
or part of the security of FedRAMP System Security
processing, the customer Plan (SSP) [3], CA-8
should understand what Penetration Testing (M) (H)
testing or evaluation the pp204
third party performs to - 6.15.3 Technical
ensure the security of the compliance review in
processing. Manager
Learn more
Microsoft Trust Center
Service Trust Portal
Data Subject Requests and the GDPR and CCPA
2/5/2021 • 4 minutes to read • Edit Online
The General Data Protection Regulation (GDPR) introduces new rules for organizations that offer goods and
services to people in the European Union (EU), or that collect and analyze data for EU residents no matter where
you or your enterprise are located. Additional details can be found in the GDPR Summary topic.
Similarly, the California Consumer Privacy Act (CCPA), provides privacy rights and obligations to California
consumers, including rights similar to GDPR's Data Subject Rights, such as the right to delete, access, and
receive (portability) their personal information. The CCPA also provides for certain disclosures, protections
against discrimination when electing exercise rights, and "opt-out/ opt-in" requirements for certain data
transfers classified as "sales". This document guides you to information on the completion of Data Subject
Requests (DSRs) under the GDPR and CCPA using Microsoft products and services.
Office 365
Azure
Intune
Dynamics 365
Visual Studio Family
Azure DevOps Services
Microsoft Support and Professional Services
Terminology
Helpful definitions for GDPR terms used in this document:
Data Controller (Controller): A legal person, public authority, agency or other body which, alone or jointly
with others, determines the purposes and means of the processing of personal data.
Personal data and data subject: Any information relating to an identified or identifiable natural person (data
subject); an identifiable natural person is one who can be identified, directly or indirectly.
Processor: A natural or legal person, public authority, agency, or other body, which processes personal data
on behalf of the controller.
Customer Data: Data produced and stored in the day-to-day operations of running your business.
What is a DSR?
The General Data Protection Regulation (GDPR) gives rights to people (known in the regulation as data subjects)
to manage the personal data that has been collected by an employer or other type of agency or organization
(known as the data controller or just controller). The GDPR gives data subjects specific rights to their personal
data; these rights include obtaining copies of it, requesting changes to it, restricting the processing of it, deleting
it, or receiving it in an electronic format so it can be moved to another controller.
California Consumer Privacy Act (CCPA) provides privacy rights and obligations to California consumers,
including rights similar to GDPR's Data Subject Rights, such as the right to delete, access, and receive
(portability) their personal information.
As a controller, you are obligated to promptly consider each DSR and provide a substantive response either by
taking the requested action or by providing an explanation for why the DSR cannot be accommodated by the
controller. A controller should consult with its own legal or compliance advisers regarding the proper disposition
of any given DSR.
Several processes may be involved completing a DSR, subject to your organization's GDPR-compliance rules.
Discover y . The process of determining what data is needed to complete a DSR.
Access . Retrieval and potential transmission to the data subject of discovered information.
Rectify . Implement changes or other requested personal data changes.
Restrict . Changing the access or processing of persona data by restricting access, or removing data from the
Microsoft cloud.
Expor t . Providing a "structured, commonly used, machine-readable format" of personal data to the data
subject, as provided by the GDPR's "right of data portability."
Delete . Permanent removal of personal data from the Microsoft cloud.
Learn more
Microsoft Trust Center
Manage GDPR data subject requests with the DSR
case tool in the Security & Compliance Center
2/5/2021 • 26 minutes to read • Edit Online
The EU General Data Protection Regulation (GDPR) is about protecting and enabling individuals' privacy rights
inside the European Union (EU). The GDPR gives individuals in the European Union (known as data subjects) the
right to access, retrieve, correct, erase, and restrict processing of their personal data. Under the GDPR, personal
data means any information relating to an identified or identifiable natural person. A formal request by a person
to their organization to take an action on their personal data is called a Data Subject Request or DSR. For
detailed information about responding to DSRs for data in Office 365, see Office 365 Data Subject Request
Guide.
To manage investigations in response to a DSR submitted by a person in your organization, you can use the DSR
case tool in the Security & Compliance Center to find content stored in:
Any user mailbox in your organization. This includes Skype for Business conversations and one-to-one
chats in Microsoft Teams
All mailboxes associated with an Microsoft 365 Group and all team mailboxes in Microsoft Teams
All SharePoint Online sites and OneDrive for Business accounts in your organization
All Teams sites and Microsoft 365 Group sites in your organization
All public folders in Exchange Online
Using the DSR case tool you can:
Create a separate case for each DSR investigation.
Control who has access to the DSR case by adding people as members of the case; only members can
access the case and can only see their cases in the list of cases on the DSR cases page in the Security &
Compliance Center. Also, you can assign different permissions to different members of the same case. For
example, you can allow some members to only view the case and search results and allow other
members to create searches and export search results.
Use the built-in search to search for all content created or uploaded by a specific data subject.
Optionally revise the built-in search query and rerun the search to narrow the search results.
Add other content searches associated with the DSR case. This includes creating searches that return
partially indexed items and system-generated logs from the Office Roaming Service.
Export data in response to a DSR access or export request.
Delete cases when the DSR investigation process is complete. This removes all searches and export jobs
associated with the case.
Here's the high-level process for using the DSR case tool to manage DSR investigations:
Step 1: Assign eDiscovery permissions to potential case members
Step 2: Create a DSR case and add members
Step 3: Run the search query
Step 4: Export the data
(Optional) Step 5: Revise the built-in search query
More information about using the DSR case tool
IMPORTANT
Our tools can help admins perform DSR access or export requests by enabling them to utilize the built-in search and
export functionality found in the DSR case tool. The tool helps to facilitate a best-effort method to export data that's
relevant to a DSR request submitted by a data subject. However, it's important to note that search results can vary based
on the data subject or the admin actions taken that may impact whether or not an item would be deemed as "personal
data" for export purposes. For example, if the data subject was the last person to modify a file they didn't create, the file
might not be returned in the search results. Similarly, an admin could export data without including partially indexed
items or all versions of SharePoint documents. Therefore, the tools provided can help facilitate accessing and exporting
data requests; however, the results are subject to specific admin and data subject usage scenarios.
NOTE
By default, a global administrator (or other members of the Organization Management role group in the Security &
Compliance Center don't have the necessary permissions to export Content Search results (see Step 4 in this article). To
address this, an admin can add themselves as a member of the eDiscovery Manager role group.
TIP
Consider adding the name of the person who submitted the DSR request that you're investigating in the name
and/or description of the new case. Note that only members of this case (and eDiscovery Administrators) will be
able to see the case in the list of cases on the Data subject requests page.
4. On the Request details page, under Data subject (the person who filed this request) , select the
person that you want to find and export data for and then click Next .
5. On the Confirm your case settings page, you can change the case name and description, and select a
different data subject. Otherwise, click Save .
A page is displayed that confirms the new DSR case has been created.
For example, if the name of the data subject is Ina Leonte, the keyword query would look like this:
TIP
You can also view the search query statistics to see the number of mailbox and site items that are returned by the
search, and the top content locations that contain items that match the search query. For more information, see
View information and statistics about a search.
You can edit the built-in search query, change the content locations that are searched, and then rerun the search.
See Step 5 for more information.
NOTE
By default, a global administrator (or other members of the Organization Management role group in the Security &
Compliance Center) don't have the necessary permissions to export Content Search results. To address this, an admin can
add themselves as a member of the eDiscovery Manager role group.
The computer you use to export data has to meet the following system requirements:
32-bit or 64-bit versions of Windows 7 and later versions
Microsoft .NET Framework 4.7
A supported browser:
Microsoft Edge
Or
Microsoft Internet Explorer 10 and later versions
NOTE
Microsoft doesn't manufacture third-party extensions or add-ons for ClickOnce applications. Exporting
data using an unsupported browser with third-party extensions or add-ons isn't supported.
NOTE
Due to the high amount of disk activity (reads and writes), you should download search results to a local disk
drive; don't download them to a mapped network drive or other network location.
a. The toggle under Select all in mailbox section at the top of the flyout page is selected, which indicates
that all mailboxes are searched. To narrow the scope of the search, click the toggle to unselect it, and then
click Choose users, groups, or teams and choose specific mailboxes to search.
b. The toggle under Select all in the sites section in the middle of the flyout page is selected, which
indicates that all sites are searched. To narrow the search to selected sites, you would unselect the toggle
and then click Choose sites . You have to add each specific site that you want to search, including the
data subject's OneDrive account.
c. The toggle in the Exchange public folders section is selected, which means all Exchange public folders
are searched. You can only search all Exchange public folders or none of them. You can't choose specific
ones to search.
3. If you modify the content locations in the built-in search, click Save & run to restart the search.
NOTE
When you search all mailbox locations or just specific mailboxes, data from other Office 365 applications that's saved to
user mailboxes is included when you export the results of the search. This data won't be included in the estimated search
results and isn't available for preview. But it's included when you export and download the search results. For more
information the applications that store data in a user's mailbox, see Content stored in Exchange Online mailboxes.
IMPORTANT
Services supporting in-product DSRs require direct usage of the service's application programming interface (API) or user
interface (UI), describing applicable CRUD (create, read, update, delete) operations. Consequently, execution of DSRs within
a given service must be done in addition to execution of a DSR within the Azure Portal in order to complete a full request
for a given data subject. Please refer to specific services' reference documentation for further details.
Step 1: Discover
The first step in responding to a DSR is to find the personal data that is the subject of the request. This first step
— finding and reviewing the personal data at issue — will help you determine whether a DSR meets your
organization's requirements for honoring or declining a DSR. For example, after finding and reviewing the
personal data at issue, you may determine the request doesn't meet your organization's requirements because
doing so may adversely affect the rights and freedoms of others.
After you find the data, you can then perform the specific action to satisfy the request by the data subject.
Azure Active Directory is Microsoft's cloud-based, multi-tenant directory and identity management service. You
can locate identifiable information of end users, such as customer and employee user profiles and user work
information that contain personal data in your Azure Active Directory (AAD) environment by using the Azure
portal.
This is particularly helpful if you want to find or change personal data for a specific user. You can also add or
change user profile and work information. You must sign in with an account that's a global admin for the
directory.
How do I locate or view user profile and work information?
1. Sign in to the Azure portal with an account that's a global admin for the directory.
2. Select Azure Active Director y .
3. Select Users .
4. On the All users blade, select a user from the list, and then, on the blade for the selected user, select
Profile to view user profile information that might contain personal data.
5. If you need to add or change user profile information, you can do so by selecting Edit in the command
bar, then select Save after making changes.
Service-specific interfaces
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming
interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services'
reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 2: Access
After you've found Customer Data containing personal data that is potentially responsive to a DSR, it is up to
you and your organization to decide which data to provide to the data subject. You can provide them with a copy
of the actual document, an appropriately redacted version, or a screenshot of the portions you have deemed
appropriate to share. For each of these responses to an access request, you will have to retrieve a copy of the
document or other item that contains the responsive data.
When providing a copy to the data subject, you may have to remove or redact personal information about other
data subjects and any confidential information.
Azure Active Directory
Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant
administrator the capability to manage DSR access requests. DSR Access requests allow for access of the
personal data of the user, including: (a) identifiable information about an end-user and (b) system-generated
logs.
Service-specific interfaces
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming
interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services'
reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 3: Rectify
If a data subject has asked you to rectify the personal data that resides in your organization's data, you and your
organization will have to determine whether it's appropriate to honor the request. Rectifying the data may
include taking actions such as editing, redacting, or removing personal data from a document or other type or
item. The most expedient way to do this for Microsoft Support and FastTrack data is provided below.
Azure Active Directory
Enterprise customers have the ability to manage DSR rectify requests, including limited editing features per the
nature of a given Microsoft service. As a data processor, Microsoft does not offer the ability to correct system-
generated logs as it reflects factual activities and constitutes a historical record of events within Microsoft
services. With respect to Azure Active Directory, limited editing features exist to rectify identifiable information
about an end-user, as described further below.
A z u r e A c t i v e D i r e c t o r y : r e c t i fy / c o r r e c t i n a c c u r a t e o r i n c o m p l e t e p e r so n a l d a t a
You can correct, update, or delete identifiable information about end users, such as customer and employee user
profiles and user work information that contain personal data, such as a user's name, work title, address, or
phone number, in your Azure Active Directory (AAD) environment by using the Azure portal. You must sign in
with an account that's a global admin for the directory.
Ho w d o I c o rre c t o r u p d a t e u s e r p ro f i l e a n d w o rk i n f o rma t i o n i n A z u re A c t i v e Di re c t o ry ?
1. Sign in to the Azure portal with an account that's a global admin for the directory.
2. Select Azure Active Director y .
3. Select Users .
4. On the All users blade, select a user from the list, and then, on the blade for the selected user, select
Profile to view the user profile information that needs to be corrected or updated.
5. Correct or update the user profile information including work information by selecting Edit in the
command bar, then selectSave after making changes.
Service-Specific Interfaces
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming
interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services'
reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 4: Restrict
Data subjects may request that you restrict processing of their personal data. We provide both the Azure Portal
and pre-existing application programming interfaces (APIs) or user interfaces (UIs). These experiences provide
the enterprise customer's tenant administrator the capability to manage such DSRs through a combination of
data export and data deletion. A customer may (1) export an electronic copy of the personal data of the user,
including (a) account(s), (b) system-generated logs, and (c) associated logs, followed with (2) deletion of the
account and associated data residing within Microsoft systems.
Step 5: Delete
The "right to erasure" by the removal of personal data from an organization's Customer Data is a key protection
in the GDPR. Removing personal data includes removing all personal data and system-generated logs, except
audit log information. When a user is soft deleted (see details below), the account is disabled for 30 days. If no
further action is taken during this 30-day period, the user is permanently deleted (again, see details below).
Upon a permanent delete , the user's account, personal data, and system-generated logs are expunged within
an additional 30 days. If a tenant admin immediately issues a permanent delete , the user's account, personal
data, and system-generated logs are expunged within 30 days of issuance.
IMPORTANT
You must be a tenant administrator to delete a user from the tenant.
1. Sign in to the Azure portal with an account that's a global admin for the directory.
2. Select Azure Active Director y .
3. Select Users .
4. Check the box next to the user you want to delete, select Delete user , and then select Yes in the box
asking if you want to delete the user.
IMPORTANT
Be aware that by clicking Yes you are permanently, and irrevocably, deleting the user and all associated data and system-
generated logs. If you do this by mistake, you'll have to manually add the user back to the tenant. The associated data
and system-generated logs are non-recoverable.
Service-specific interfaces
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming
interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services'
reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 6: Export
The "right of data portability" allows a data subject to request a copy of their personal data in an electronic
format (that's a "structured, commonly used, machine read-able, and interoperable format") that may be
transmitted to another data controller. Azure supports this by enabling your organization to export the data in
the native JSON format, to your specified Azure Storage Container.
IMPORTANT
You must be a tenant administrator to export user data from the tenant.
IMPORTANT
The ability to restrict or rectify system-generated logs is not supported. System-generated logs constitute factual actions
conducted within the Microsoft cloud and diagnostic data, and modifications to such data would compromise the
historical record of actions, increasing fraud and security risks.
IMPORTANT
Services supporting in-product DSRs require direct usage of the service's application programming interface (API) or user
interface (UI). Consequently, execution of an in-product DSRs must be done in addition to execution of a DSR
within the Azure Por tal in order to complete a full request for a given data subject. Please refer to
specific ser vices' reference documentation for fur ther details.
Step 1: Access
The tenant admin is the only person within your organization who can access system-generated logs associated
with a particular user's use of Azure. The data retrieved for an access request will be provided in a machine-
readable format and will be provided in files that will allow the user to know which services the data is
associated with. As noted above, the data retrieved will not include data that may compromise the security of
the service.
Azure Active Directory
Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant
administrator the capability to manage access requests. Access requests will allow for access of the personal
data of the user, including: (a) identifiable information about an end user and (b) service-generated logs. The
process is identical to that described in the Azure Active Directory section of Part 1, Step 2: Access.
Service-specific interfaces
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming
interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services'
reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 2: Delete
The tenant admin is the only person within your organization who can execute a DSR delete request for a
particular user within an Azure tenant.
Azure Active Directory
Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant
administrator the capability to manage DSR delete requests. DSR delete requests follow the same as described
in the Delete a user and associated data through the Azure portal section of Part 1, Step 5: Delete.
Service-specific interfaces
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming
interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services'
reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 3: Export
The tenant admin is the only person within your organization who can access system-generated logs associated
with a particular user's use of Azure. The data retrieved for an export request will be provided in a machine-
readable format and will be provided in files that will allow the user to know which services the data is
associated with. As noted above, the data retrieved will not include data that may compromise the security or
stability of the service.
Export system-generated logs using the Azure portal
After you receive an export request for a data subject, you can use the Azure portal to export system-generated
logs associated with a given user.
Here's the high-level process for exporting data from your tenant.
1. Go to the Azure portal and create an export request on behalf of the user.
2. Export the data and send file to user.
To e x p o rt a u s e r' s i n f o f ro m a n A z u re t e n a n t
1. Open the Azure portal, select All ser vices , type policy into the filter, and then select Policy .
2. In the Policy blade, select User privacy , select Manage User Requests , and then select Add expor t
request .
3. Complete the Expor t data request :
User. Type the email address of the Azure Active Directory user that requested the export.
Subscription. Select the account you use to report resource usage and to bill for services. This is also the
location of your Azure storage account.
Storage account. Select the location of your Azure Storage (Blob). For more info, see the Introduction to
Microsoft Azure Storage — Blob storage article.
Container. Create a new (or select an existing) container as the storage location for the user's exported
privacy data.
4. Select Create .
The export request goes into Pending status. You can view the report status on the User privacy —
Over view blade.
IMPORTANT
Because personal data can come from multiple systems, it's possible that the export process might take up to one month
to complete.
Service-Specific Interfaces
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming
interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services'
reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Notify about exporting or deleting issues
If you run into issues while exporting or deleting data from the Azure portal, go to the Azure portal Help +
Suppor t blade and submit a new ticket under Subscription Management > Other Security and
Compliance Request > Privacy Blade and GDPR Requests .
Learn more
Microsoft Trust Center
Azure DevOps Services Data Subject Requests for
the GDPR and CCPA
2/5/2021 • 3 minutes to read • Edit Online
The European Union General Data Protection Regulation (GDPR) gives rights to people, known in the regulation
as data subjects, to manage the personal data that's collected by a data controller. A data controller, or just
controller, is an employer or other type of agency or organization. Personal data is defined broadly under the
GDPR as any data that relates to an identified or identifiable natural person. The GDPR gives data subjects
specific rights to their personal data. These rights include obtaining copies of personal data, requesting
corrections to it, restricting the processing of it, deleting it, or receiving it in an electronic format so it can be
moved to another controller. A formal request by a data subject to a controller to take an action on their
personal data is called a Data Subject Request, or DSR.
Similarly, the California Consumer Privacy Act (CCPA), provides privacy rights and obligations to California
consumers, including rights similar to GDPR's Data Subject Rights, such as the right to delete, access and receive
(portability) their personal information. The CCPA also provides for certain disclosures, protections against
discrimination when electing exercise rights, and "opt-out/ opt-in" requirements for certain data transfers
classified as "sales". Sales are broadly defined to include the sharing of data for a valuable consideration. For
more information about the CCPA, see the California Consumer Privacy Act and the California Consumer Privacy
Act FAQ.
For general information about GDPR, see the GDPR section of the Service Trust portal.
This guide discusses how to use Microsoft tools to export or delete personal data collected during an
authenticated (signed-in) session of Azure DevOps Services (formerly known as Visual Studio Team Services).
Learn more
Microsoft is committed to ensuring that your Azure DevOps Services data remains secure and private, without
exception. Visit the Azure DevOps Services data protection overview whitepaper to learn more about how we
protect your Azure DevOps Services data.
See also
Microsoft's GDPR commitments to customers of our generally available enterprise software products
Microsoft Trust center
Service Trust portal
Microsoft privacy dashboard
Microsoft privacy response center
Azure Data Subject Requests for the GDPR
Dynamics 365 Data Subject Requests for the GDPR
and CCPA
2/5/2021 • 21 minutes to read • Edit Online
The European Union General Data Protection Regulation (GDPR) gives rights to people (known in the regulation
as data subjects) to manage the personal data that has been collected by an employer or other type of agency or
organization (known as the data controller or just controller). Personal data is defined broadly under the GDPR
as any data that relates to an identified or identifiable natural person. The GDPR gives data subjects specific
rights to their personal data; these rights include obtaining copies of it, requesting changes to it, restricting the
processing of it, deleting it, or receiving it in an electronic format so it can be moved to another controller. A
formal request by a data subject to a controller to take an action on their personal data is called in this
document a Data Subject Rights Request or DSR request.
Similarly, the California Consumer Privacy Act (CCPA), provides privacy rights and obligations to California
consumers, including rights similar to GDPR's Data Subject Rights, such as the right to delete, access, and
receive (portability) their personal information. The CCPA also provides for certain disclosures, protections
against discrimination when electing exercise rights, and "opt-out/ opt-in" requirements for certain data
transfers classified as "sales". Sales are broadly defined to include the sharing of data for a valuable
consideration. For more information about the CCPA, see the California Consumer Privacy Act and the California
Consumer Privacy Act FAQ.
The guide discusses how to use Microsoft's products, services, and administrative tools to help our controller
customers find and act on personal data to respond to DSR requests. Specifically, this includes how to find,
access, and act on personal data or personal information that reside in Microsoft's cloud. Here's a quick
overview of the processes outlined in this guide:
Discover : Use search and discovery tools to more easily find customer- data that may be the subject of a
DSR request. Once potentially responsive documents are collected, you can perform one or more of the DSR
actions described in the following steps to respond to the request. Alternatively, you may determine that the
request doesn't meet your organizations guidelines for responding to DSR requests.
Access: Retrieve personal data that resides in the Microsoft cloud and, if requested, make a copy of it that is
available to the data subject.
Rectify: Make changes or implement other requested actions on the personal data, where applicable.
Restrict: Restrict the processing of personal data, either by removing licenses for various online services or
turning off the desired services where possible. You can a
Delete: Permanently remove personal data that resided in Microsoft's cloud.
Expor t/Receive (Por tability): Provide an electronic copy (in a machine-readable format) of personal data
or personal information to the data subject. Personal information under the CCPA is any information relating
to an identified or identifiable person. There is no distinction between a person's private, public, or work
roles. The defined term "personal information" roughly aligns with "personal data" under GDPR. However, the
CCPA also includes family and household data. For more information about the CCPA, see the California
Consumer Privacy Act and the California Consumer Privacy Act FAQ.
Each section in this guide outlines the technical procedures that a data controller organization can take to
respond to a DSR request for personal data in Microsoft's cloud
GDPR terminology
The following list provides definitions of terms that are relevant to this guide:
Controller : The natural or legal person, public authority, agency or other body which, alone or jointly with
others, determines the purposes and means of the processing of personal data; where the purposes and
means of such processing are determined by Union or Member State law, the controller, or the specific
criteria for its nomination may be provided for by Union or Member State law.
Personal data and data subject: Any information relating to an identified or identifiable natural person
('data subject'); an identifiable natural person is one who can be identified, directly or indirectly, in particular
by reference to an identifier such as a name, an identification number, location data, an online identifier or to
one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social
identity of that natural person.
Processor : A natural or legal person, public authority, agency, or other body, which processes personal data
on behalf of the controller.
Customer Data: All data, including all text, sound, video, or image files, and software, that are provided to
Microsoft by, or on behalf of, a customer through use of the enterprise service. Customer Data includes both
(1) identifiable information of end users (for example, user names and contact information in Azure Active
Directory) and Customer Content that a customer uploads into or creates in specific services (for example,
customer content in an Azure Storage account, customer content of an Azure SQL Database, or a customer's
virtual machine image in Azure Virtual Machines).
System-Generated Logs: Logs and related data generated by Microsoft that help Microsoft provide
enterprise services to users. System-generated logs contain primarily pseudonymized data, such as unique
identifiers—typically a number generated by the system that cannot on its own identify an individual person
but is used to deliver the enterprise services to users. System-generated logs may also contain identifiable
information about end users, such as a user name.
How this guide can help you meet your controller responsibilities
The guide, divided into two parts, describes how to use Dynamics 365 products, services, and administrative
tools to help you find and act on data in the Microsoft cloud in response to requests by data subjects who are
exercising their rights under the GDPR. The first part addresses personal data that is included in customer data,
followed by a part addressing other pseudonymized personal data captured in system-generated logs.
Par t 1: Responding to Data Subject Rights (DSR) requests for Personal Data included in
customer data: Part 1 of this guide discusses how to access, rectify, restrict, delete, and export personal data
from Dynamics 365 applications (software as a service), which is processed as part of the customer data you
have provided to the online service.
Par t 2: Responding to data subject rights requests for Pseudonymized Data: When you use
Dynamics 365 enterprise services, Microsoft generates some information (referred to within this document
as system-generated logs) to provide the service, which is limited to the usage footprint left behind by end
users to identify their actions in the system. Although this data cannot be attributed to a specific data subject
without the use of additional information, some of it may be deemed personal under the GDPR. Part 2 of this
guide discusses how to access, delete, and export system-generated logs produced by Dynamics 365.
NOTE
The Data Log Expor t is displayed. Note that a list of export data requests submitted by your organization is
displayed.
4. To create a new request for a user, click Create Expor t Data Request .
After you create a new request, it will be listed on the Data Log Expor t page where you can track its status.
After a request is complete, you can click a link to access the system-generated logs, which will be exported to
your organization's Azure Storage location within 30 days of creating the request. The data will be saved in
common, machine-readable file formats such as JSON or XML. If you don't have an Azure account and Azure
Storage location, you'll need to create an Azure account and/or Azure Storage location for your organization so
that the Data Log Export tool can export the system-generated logs.
Azure supports this request by enabling your organization to export the data in the native JSON format, to your
specified Azure Storage Container. Introduction to Microsoft Azure Storage—Blob storage article. The data
retrieved will not include data that may compromise the security and stability of the service.
IMPORTANT
You must be a tenant administrator to export user data from the tenant.
How long does the Microsoft Data Log Expor t tool This can depend on several factors. In most cases it should
take to complete a request? complete in one or two days, but it can take up to 30 days.
What format will the output be in? The output will be structured machine-readable files such as
XML, CSV, or JSON.
What data does the Data Log Expor t tool return? The Data Log Export tool returns system-generated logs
that Microsoft stores. Exported data will span across various
Microsoft services including Office 365, Azure, and
Dynamics.
*Who has access to Data Log Expor t tool to submit Dynamics 365 global administrators will have access to the
access requests for system-generated logs? GDPR Log Manager utility.
How is data returned to the user? Data will be exported to your organization's Azure Storage
location; it will be up to admins in your organization to
determine how they will show/return this data to users.
What will data in system-generated logs look like? Example of a system-generated log record in JSON format:
"DateTime": "2017-04-28T12:09:29-07:00",
"AppName": "SharePoint",
"Action": "OpenFile",
"IP": "154.192.13.131",
"DevicePlatform": "Windows 1.0.1607"
Learn more
Microsoft Trust Center
Intune Data Subject Requests for the GDPR and
CCPA
2/5/2021 • 10 minutes to read • Edit Online
The European Union General Data Protection Regulation (GDPR) gives rights to people (known in the regulation
as data subjects) to manage the personal data that has been collected by an employer or other type of agency or
organization (known as the data controller or just controller). Personal data is defined broadly under the GDPR
as any data that relates to an identified or identifiable natural person. The GDPR gives data subjects specific
rights to their personal data; these rights include obtaining copies of personal data, requesting corrections to it,
restricting the processing of it, deleting it, or receiving it in an electronic format so it can be moved to another
controller. A formal request by a data subject to a controller to take an action on their personal data is called a
Data Subject Request or DSR.
Similarly, the California Consumer Privacy Act (CCPA), provides privacy rights and obligations to California
consumers, including rights similar to GDPR's Data Subject Rights, such as the right to delete, access, and
receive (portability) their personal information. The CCPA also provides for certain disclosures, protections
against discrimination when electing exercise rights, and "opt-out/ opt-in" requirements for certain data
transfers classified as "sales". Sales are broadly defined to include the sharing of data for a valuable
consideration. For more information about the CCPA, see the California Consumer Privacy Act and the California
Consumer Privacy Act FAQ.
The guide discusses how to use Microsoft products, services, and administrative tools to help our controller
customers find and act on personal data to respond to DSRs. Specifically, this guidance includes how to find,
access, and act on personal data or personal information that reside in the Microsoft cloud. Here's a quick
overview of the processes outlined in this guide:
Discover : Use search and discovery tools to more easily find customer data that may be the subject of a
DSR. Once potentially responsive documents are collected, you can perform one or more of the DSR actions
described in the following steps to respond to the request. Alternatively, you may determine that the request
doesn't meet your organization's guidelines for responding to DSRs.
Access: Retrieve personal data that resides in the Microsoft cloud and, if requested, make a copy of it that
can be available to the data subject.
Rectify: Make changes or implement other requested actions on the personal data, where applicable.
Restrict: Restrict the processing of personal data, either by removing licenses for various Azure services or
turning off the desired services where possible. You can also remove data from the Microsoft cloud and
retain it on-premises or at another location.
Delete: Permanently remove personal data that resided in the Microsoft cloud.
Expor t/Receive (Por tability): Provide an electronic copy (in a machine-readable format) of personal data
or personal information to the data subject. Personal information under the CCPA is any information relating
to an identified or identifiable person. There is no distinction between a person's private, public, or work
roles. The defined term "personal information" roughly aligns with "personal data" under GDPR. However, the
CCPA also includes family and household data. For more information about the CCPA, see the California
Consumer Privacy Act and the California Consumer Privacy Act FAQ.
Each section in this guide outlines the technical procedures that a data controller organization can take to
respond to a DSR for personal data in the Microsoft cloud.
Terminology
The following list provides definitions of terms that are relevant to this guide.
Controller : The natural or legal person, public authority, agency or other body which, alone or jointly with
others, determines the purposes and means of the processing of personal data; where the purposes and
means of such processing are determined by Union or Member State law, the controller, or the specific
criteria for its nomination may be provided for by Union or Member State law.
Personal data and data subject: Any information relating to an identified or identifiable natural person
('data subject'); an identifiable natural person is one who can be identified, directly or indirectly, in particular
by reference to an identifier such as a name, an identification number, location data, an online identifier or to
one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social
identity of that natural person.
Processor : A natural or legal person, public authority, agency, or other body, which processes personal data
on behalf of the controller.
Customer Data: All data, including all text, sound, video, or image files, and software, that are provided to
Microsoft by, or on behalf of, a customer through use of the enterprise service. Customer Data includes both
(1) identifiable information of end users (for example, user names and contact information in Azure Active
Directory) and Customer Content that a customer uploads into or creates in specific services (for example,
customer content in an Azure Storage account, customer content of an Azure SQL Database, or a customer's
virtual machine image in Azure Virtual Machines).
System-Generated Logs: Logs and related data generated by Microsoft that help Microsoft provide
enterprise services to users. System-generated logs contain primarily pseudonymized data, such as unique
identifiers—typically a number generated by the system that cannot on its own identify an individual person
but is used to deliver the enterprise services to users. System-generated logs may also contain identifiable
information about end users, such as a user name.
How to use this guide
This guide consists of two parts:
Par t 1: Responding to Data Subject Requests for Customer Data: Part 1 of this guide discusses how
to access, rectify, restrict, delete, and export data from applications in which you have authored data. This
section details how to execute DSRs against both Customer Content and also identifiable information of end
users.
Par t 2: Responding to Data Subject Requests for System-Generated Logs: When you use
Microsoft's enterprise services, Microsoft generates some information, known as System-Generated Logs, in
order to provide the service. Part 2 of this guide discusses how to access, delete, and export such information
for Azure.
Understanding DSRs for Azure Active Directory and Microsoft Intune
When considering services provided to enterprise customers, execution of DSRs must always be understood
within the context of a specific Azure Active Directory tenant. Notably, DSRs are always executed within a given
Azure Active Directory tenant. If a user is participating in multiple tenants, it is important to emphasize that a
given DSR is only executed within the context of the specific tenant the request was received within. This context
is critical to understand as it means the execution of a DSR by one enterprise customer will not impact the data
of an adjacent enterprise customer.
The same also applies for Microsoft Intune provided to an enterprise customer: execution of a DSR against an
Intune account associated with an Azure Active Directory tenant will only pertain to data within the tenant. In
addition, it is important to understand the following when handling Intune accounts within a tenant:
If an Intune user creates an Azure subscription, the subscription will be handled as if it were an Azure Active
Directory tenant. Consequently, DSRs are scoped within the tenant as described previously.
If an Azure subscription created via an Intune account is deleted, it will not affect the actual Intune account.
Again, as noted previously, DSRs executing within the Azure subscription are limited to the scope of the
tenant itself.
DSRs against an Intune account itself, outside a given tenant , are executed via the Consumer Privacy
Dashboard. Refer to the Windows Data Subject Request Guide for further details.
IMPORTANT
Services supporting in-product DSRs require direct usage of the service's application programming interface (API) or user
interface (UI), describing applicable CRUD (create, read, update, delete) operations. Consequently, execution of DSRs within
a given service must be done in addition to execution of a DSR within the Azure Portal in order to complete a full request
for a given data subject. Please refer to specific services' reference documentation for further details.
Step 1: Discover
The first step in responding to a DSR is to find the personal data that is the subject of the request. This first step -
finding and reviewing the personal data at issue - will help you determine whether a DSR meets your
organization's requirements for honoring or declining a DSR. For example, after finding and reviewing the
personal data at issue, you may determine the request doesn't meet your organization's requirements because
doing so may adversely affect the rights and freedoms of others.
After you find the data, you can then perform the specific action to satisfy the request by the data subject. For
details, see the following resources:
Data collection
Data storage and processing
View personal data
Step 2: Access
After you've found Customer Data containing personal data that is potentially responsive to a DSR, it is up to
you and your organization to decide which data to provide to the data subject. You can provide them with a copy
of the actual document, an appropriately redacted version, or a screenshot of the portions you have deemed
appropriate to share. For each of these responses to an access request, you will have to retrieve a copy of the
document or other item that contains the responsive data.
When providing a copy to the data subject, you may have to remove or redact personal information about other
data subjects and any confidential information.
The following explains how to get a copy of data in response to a DSR access request.
Azure Active Directory
Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant
administrator the capability to manage DSR access requests. DSR Access requests allow for access of the
personal data of the user, including: (a) identifiable information about an end user and (b) system-generated
logs.
Service-Specific Interfaces
Microsoft Intune provides the ability to discover Customer Data directly via user interfaces (UIs) or pre-existing
application programming interfaces (APIs).
Step 3: Rectify
If a data subject has asked you to rectify the personal data that resides in your organization's data, you and your
organization will have to determine whether it's appropriate to honor the request. Rectifying the data may
include taking actions such as editing, redacting, or removing personal data from a document or other type or
item.
As a data processor, Microsoft does not offer the ability to correct system-generated logs as it reflects factual
activities and constitutes a historical record of events within Microsoft services. With respect to Intune, admins
can't update device or app-specific information. If an end user wants to correct any personal data (like the device
name), they must do so directly on their device. Such changes are synchronized the next time they connect to
Intune.
Step 4: Restrict
Data subjects may request that you restrict processing of their personal data. We provide both the Azure portal
and pre-existing application programming interfaces (APIs) or user interfaces (UIs). These experiences provide
the enterprise customer's tenant administrator the capability to manage such DSRs through a combination of
data export and data deletion. For details, see Processing personal data.
Step 5: Delete
The "right to erasure" by the removal of personal data from an organization's Customer Data is a key protection
in the GDPR. Removing personal data includes removing all personal data and system-generated logs, except
audit log information. For details, see Delete end user personal data.
Learn more
Microsoft Trust Center
Microsoft Support and Professional Services Data
Subject Requests for the GDPR and CCPA
2/5/2021 • 22 minutes to read • Edit Online
Step 1: Discover
The first step in obtaining Microsoft's assistance in responding to a DSR is to find the personal data that is the
subject of the DSR. This first step—finding and reviewing the personal data at issue—will help a customer
determine whether a DSR meets the organization's policies for honoring a data subject request.
After the customer finds the data, the customer can then perform the specific action to satisfy the request by the
data subject. Depending on what the customer is trying to do will determine what level of discovery the
customer needs to engage in.
Where Microsoft assists a customer with the resolution of a DSR then this is a business function, and the request
is made through your regular support channel and not through a request to the Privacy Response Center.
In discovering relevant data and obtaining Microsoft's assistance, a customer has several options for how to
approach the DSR:
Option A: Cross-Microsoft Support Customer DSR. Apply the DSR to all the customer's support data across
Microsoft's support environment. To do this, a customer can just ask Microsoft to apply the DSR to all Support
Data collected.
Option B: Specific Customer Engagements. Use online systems to review tickets, then identify specific
engagements containing the relevant personal data and report them Microsoft. Microsoft will attempt to
provide assistance to perform a search if the customer does not have the ability to search across engagements
(tickets).
Once engagements are identified, request to apply the DSR to either a specific part of the record or everything
related to that engagement across Microsoft.
To identify specific engagements, customers need to search across their engagements. For Premier customers,
the Contract Service Manager ("CSM") for a customer has visibility across all Support Requests (SRs) that are
created under that Contract Schedule. For Non-Premier, equivalent support engagement portals are available,
such as through Online Services support areas.
The CSM can go to the portal at Services Hub and select manage all Support Requests.
IMPORTANT
In addition to the case history in Services Hub, customers may also have personal data of an end user in files that was
collected by Microsoft (or, with customer's permission, removed from the Online Service) during a support engagement.
Examples may include copies of customer's exchange mailboxes, Azure VMs, or databases. This personal data may or may
not be mentioned in the case history (i.e. ticket) for a particular engagement. To review that data, the Customer Contact
must be a specific authenticated (via AAD or MSA) Support Request contact that has received a URL for a workspace in
Microsoft Support Data Transfer and Management tool (DTM). A Customer Contact will have access to the files, but no
global view is available, and Services Hub will not indicate if files exist.
Once customers have identified all the relevant data in the selected support tickets, customers can decide
whether to request the deletion of everything related to a ticket or selectively apply the DSR to individual
instances of personal data.
Step 2: Access
After a customer has found Support Data containing personal data that is potentially responsive to a DSR, it is
up to the customer to decide which personal data to include in the response. For example, the customer may
choose to remove personal data about other data subjects and any confidential information.
Response to the DSR may include a copy of the actual document, an appropriately redacted version, or a
screenshot of the portions the customer has deemed appropriate to share. For each of these responses to an
access request, the customer will have to retrieve a copy of the document or other item that contains the
responsive data.
Access to the personal data of an end user may be from a mention or notation in the various types of content
documentation. Since customers may access the engagement ticket and the content, they can provide a
summary of personal data themselves without further assistance from Microsoft.
In rare cases, customer may have need to obtain copies of support interaction data (for example, emails,
transcribed copies of phone recordings; chat transcripts) between a Microsoft Representative and the
Customer's Representative. To the extent required, Microsoft may provide redacted copies of these transcripts
based on need, sensitivity, and difficulty.
Step 3: Rectify
If a data subject has asked the customer to rectify the personal data that resides in their organization's Support
Data, the customer will have to determine whether it's appropriate to honor the request. If the customer chooses
to honor the request, then the customer may request that Microsoft make the change. Microsoft may rectify
data or may delete customer's data from the support systems and request that the customer resubmit it to
Microsoft in corrected format.
Step 4: Restrict
The customer may at any time close an engagement or contact Microsoft and request the engagement be
closed. A closed engagement will prevent any work from being performed.
For extra assurance, customer may contact Microsoft and request that a note be placed in the engagement
ticketing system instructing that the case should not be re-opened for any reason absent the customer's
permission.
Note: Engagements (tickets) will also be deleted according on a retention and deletion schedule, based on the
sensitivity of data, service, and system. If customer requires a copy of data, they should ensure that they have
extracted data prior to deletion.
Step 5: Delete
The "right to erasure" by the removal of personal data from an organization's Support Data is a key protection in
the GDPR. Removing personal data includes deleting entire engagements, documents, or files or deleting
specific data within an engagement, document, or file.
As a customer investigates or prepares to delete personal data in response to a DSR, here are a few important
things to understand about how deletion works for Microsoft Support.
All data at Microsoft has a retention and deletion policy applied to it, which will vary depending on risk and
other factors.
Customers requesting the deletion of a data subject's personal data universally across Support systems may do
so through your TAM or by filing a Support Request (SR) in Services Hub or equivalent system. You must
indicate that this is a request to assist with a DSR under GDPR.
Option A: Cross-Microsoft Support Customer DSR. For a cross system DSR, customer must provide the personal
data that Microsoft needs to identify the required data (for example, email address; phone number). Microsoft
will not correlate or research records and will only search directly on identifiers provided by the customer. When
data is found, Microsoft will delete all engagements and all associated data.
Important Note: this may result in loss of historical records that are important to customer's organization.
Option B: Specific Customer Engagements. For specific engagements that the customer has identified and wants
deleted, do not delete tickets out of Services Hub. This will result in personal data remaining in logs and
downstream systems that may not be deleted within the needed timeframe. Instead, identify the ticket or
personal data within the ticket that must be deleted, and contact Microsoft Support to assist you in deleting that
data.
Microsoft Support Data Transfer and Management tool (DTM ) instructions
For all these searches, Microsoft will not search across DTM due to the potential sensitivity of content in files.
However, if the customer desires, Microsoft will delete all files contained in DTM associated with the customer's
account. Due to the potential for serious customer impact, Microsoft requires a separate request from customer
specifying the deletion of DTM files.
For open cases, the Customer Contact can go into DTM and delete files.
For cases closed less than 90 days, a request must be made to a TAM or in an SR to have the files removed.
For cases closed after than 90 days, files have already been automatically deleted.
Even if the personal data was only located within a file that has been deleted, customers must still have
Microsoft run a check across systems for the personal data as some data may have been removed from DTM
in the course of providing support.
Step 6: Export
The "right of data portability" allows a data subject to request a copy of their personal data in an electronic
format and request that your organization transmit it to another controller. In the case of Support Data, any
usable information that Microsoft has would be in the form of engagement information or files that can be
returned to you for re-communication or uploading to another controller.
Note: Exported data may not include Microsoft's intellectual property or any data that may compromise the
security or stability of the service.
Example for Illustration Purposes Only
John is a Premier CSM for an Enterprise customer, Contoso, that uses O365 for its employee e-mail and Azure to
host a Contoso SQL Database. Contoso has multiple open and closed tickets. Recently, Microsoft Support, with
Contoso's permission, moved a copy of the SQL Database into DTM for support and troubleshooting.
John receives a DSR from Jane asking that all her data be deleted. John goes into Services Hub and searches
across engagements to identify that Jane had email account issues and so was referenced in two tickets by
name and email address. He contacts his TAM, provides the TAM with Jane's name and e-mail address as an
identifier, and requests that those two tickets be deleted, along with all downstream data that may have been
generated out of those tickets.
He also suspects he was engaged in a chat conversation with support personnel where he mentions Jane, so he
requests that chat log to be deleted.
He also knows that Jane's personal data is in the SQL Database. Since the SQL VM was moved into DTM less
than 90 days ago, he asks his TAM separately to assist in the immediate deletion of the database out of DTM.
Lastly, since he knows that data may have been removed from the DTM file while providing support, he asks
Microsoft to run a check across IT systems for Jane's personal data from the SQL Database.
Microsoft Support performs all these deletions and, based on customer request, the TAM provides him with an
attestation statement that the required data has been deleted.
Introduction to DSRs
The European Union General Data Protection Regulation (GDPR) gives rights to people (known in the regulation
as data subjects) to manage the personal data that has been collected by an employer or other type of agency or
organization (known as the data controller or just controller). Personal data is defined broadly under the GDPR
as any data that relates to an identified or identifiable natural person. The GDPR gives data subjects specific
rights to their personal data; these rights include obtaining copies of it, requesting changes to it, restricting the
processing of it, deleting it, or receiving it in an electronic format so it can be moved to another controller. A
formal request by a data subject to a controller to take an action on their personal data is called a Data Subject
Request or DSR. The controller is obligated to promptly consider each DSR and provide a substantive response
either by taking the requested action or by providing an explanation for why the DSR cannot be accommodated
by the controller. A controller should consult with its own legal or compliance advisers regarding the proper
disposition of any given DSR.
Similarly, the California Consumer Privacy Act (CCPA), provides privacy rights and obligations to California
consumers, including rights similar to GDPR's Data Subject Rights, such as the right to delete, access, and
receive (portability) their personal information. The CCPA also provides for certain disclosures, protections
against discrimination when electing exercise rights, and "opt-out/ opt-in" requirements for certain data
transfers classified as "sales". Sales are broadly defined to include the sharing of data for a valuable
consideration. For more information about the CCPA, see the California Consumer Privacy Act and the California
Consumer Privacy Act FAQ.
The guide discusses how to use Office 365 products, services, and administrative tools to help you find and act
on personal data or personal information to respond to DSRs. Specifically, this includes how to find, access, and
act on personal data or personal information that resides in Microsoft's cloud. Here's a quick overview of the
processes outlined in this guide:
Discover : Use search and discovery tools to more easily find customer data that may be the subject of a
DSR. Once potentially responsive documents are collected, you can perform one or more of the DSR actions
described in the following steps to respond to the request. Alternatively, you may determine that the request
doesn't meet your organization's guidelines for responding to DSRs.
Access: Retrieve personal data that resides in the Microsoft cloud and, if requested, make a copy of it that
can be available to the data subject.
Rectify: Make changes or implement other requested actions on the personal data, where applicable.
Restrict: Restrict the processing of personal data, either by removing licenses for various Microsoft cloud
services or turning off the desired services where possible. You can also remove data from the Microsoft
cloud and retain it on-premises or at another location.
Delete: Permanently remove personal data that resided in the Microsoft cloud.
Expor t/Receive (Por tability): Provide an electronic copy (in a machine-readable format) of personal data
or personal information to the data subject. Personal information under the CCPA is any information relating
to an identified or identifiable person. There is no distinction between a person's private, public, or work
roles. The defined term "personal information" roughly lines up with "personal data" under GDPR. However,
the CCPA also includes family and household data. For more information about the CCPA, see the California
Consumer Privacy Act and the California Consumer Privacy Act FAQ.
Terminology
Here are definitions of terms from the GDPR that are relevant to this guide.
Controller : The natural or legal person, public authority, agency or other body which, alone or jointly with
others, determines the purposes and means of the processing of personal data; where the purposes and
means of such processing are determined by Union or Member State law, the controller, or the specific
criteria for its nomination may be provided for by Union or Member State law.
Personal data and data subject: Any information relating to an identified or identifiable natural person
('data subject'); an identifiable natural person is one who can be identified, directly or indirectly, in particular
by reference to an identifier such as a name, an identification number, location data, an online identifier or to
one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social
identity of that natural person.
Processor : A natural or legal person, public authority, agency, or other body, which processes personal data
on behalf of the controller.
Customer Data: All data, including all text, sound, video, or image files, and software, that is provided to
Microsoft by, or on behalf of, a customer through use of the enterprise service. Customer Data includes both
(1) identifiable information of end users (for example, user names and contact information in Azure Active
Directory) and Customer Content that a customer uploads into or creates in specific services (for example,
customer content in a Word or Excel document, or in the text of an Exchange Online email; customer content
added to a SharePoint Online site, or saved to a OneDrive for Business account).
System-Generated Logs: Logs and related data generated by Microsoft that help Microsoft provide
enterprise services to users. System-generated logs contain primarily pseudonymized data, such as unique
identifiers (typically a number generated by the system) cannot on its own identify an individual person but
is used to deliver the enterprise services to users. System-generated logs may also contain identifiable
information about end users, such as a user name.
How to use this guide
To help you find information relevant to your use case, this guide is divided into four parts.
Par t 1: Responding to DSRs for Customer Data : Customer Data is data produced and stored in Office
365 in the day-to-day operations of running your business. Examples of the most commonly used Office 365
applications that allow you to author data include Word, Excel, PowerPoint, Outlook, and OneNote. Office 365
also consists of applications such as SharePoint Online, Teams, and Forms that allow you to better collaborate
with others. Part 1 of this guide discusses how to discover access, rectify, restrict, delete, and export data
from Office 365 applications that have been used to author and store data in Office 365 online services. It
addresses products and services for which Microsoft is acting as a data processor to your organization, and
thus DSR capability is made available to your tenant administrator.
Par t 2: Responding to DSRs with Respect to Insights Generated by Office 365 : Office 365 provides
certain insights through services like Delve, MyAnalytics, and Workplace Analytics. How these insights are
generated and how to respond to DSRs related to them are explained in Part 2 of this guide.
Par t 3: Responding to DSRs for system-generated Logs : When you use Office 365 enterprise services,
Microsoft generates some information such as service logs that record the use or performance of features in
the online services. Most service-generated data contain pseudonymous identifiers generated by Microsoft
and this category is thus generally referred to within this document as system-generated logs. Although this
data can't be attributed to a specific data subject without the use of additional information, some of it may be
deemed personal under GDPR's definition for "personal data." Part 3 of this guide discusses how to access,
delete, and export system-generated logs.
Par t 4: Additional resources to assist you with DSRs : Part 4 of this guide lists limited scenarios in
which Microsoft is the data controller when certain Office 365 products and services are used.
NOTE
In most cases, when users in your organization use Microsoft Office 365 products and services, you are the data
controller and Microsoft is the processor. As a data controller, you are responsible for responding to the data subject
directly. To assist you with this, Parts 1-3 of this guide detail the technical capabilities available to your organization to
respond to a DSR request. In some limited scenarios, however, Microsoft will be the data controller when people use
certain Office 365 products and services. In these cases, the information in Part 4 provides guidance on how data subjects
can submit DSR requests to Microsoft.
NOTE
The Content Search eDiscovery tool is not available in Office 365 operated by 21Vianet (China). This means you won't
able to use this tool to search for and export Customer Data in the Office 365 applications shown in Table 1. However,
you can use the In-Place eDiscovery tool in Exchange Online to search for content in user mailboxes. You can also use the
eDiscovery Center in SharePoint Online to search for content in SharePoint sites and OneDrive accounts. Alternatively,
you can ask a document owner to help you find and make changes or deletions to content or export it if necessary. For
more information, see:
Create an In-Place eDiscovery search
Set up an eDiscovery Center in SharePoint Online
NOTE
In Office 365 Germany, the Security & Compliance Center is located at https://protection.office.de.
NOTE
This guide assumes that all data that might be relevant to a DSR investigation is stored in Office 365; in other words,
stored in the Microsoft cloud. Data stored on a user's local computer or on-premises on your organization's file servers is
outside the scope of a DSR investigation for data stored in Office 365. For guidance about responding to DSR requests for
data in on-premises organizations, see GDPR for Office on-premises Servers.
File type The extension of a document or file. • csv — Searches for comma-
Use this condition to search for Office separated value (CSV) files; Excel files
documents and files created by Office can be saved in CSV format and CSV
365 applications. Use this condition file can easily be imported into Excel
when searching for documents on
SharePoint Online sites and OneDrive • docx — Searches for Word file
for Business accounts.
The corresponding document property • mpp — Searches for Project files
is filetype.
For a complete list of file extensions • one — Searches for OneNote files
that you can search for, see that
Default crawled file name extensions • pdf — Search for files saved in a PDF
and parsed file types in SharePoint] format
(https://technet.microsoft.com/library/jj
219530.aspx). • pptx — Searches for PowerPoint files
Message type The email message type to search for. • *contacts — Searches the My
Use this condition to search mailboxes Contacts list (People) of a mailbox
for contacts (People), meetings
(Calendar) tasks, or Skype for Business • *email — Searches email messages
conversations. The corresponding
email property is kind. • *im — Searches Skype for Business
conversations
• *meetings — Searches
appointments and meeting requests
(Calendar)
There are many more email and document properties and search conditions that you can use to build more
complex search queries. See the following sections in the Keyword queries and search conditions for Content
Search help topic for more information.
Searchable email properties
Searchable site (document) properties
Search conditions
Searching for personal data in SharePoint lists, discussions, and forms
In addition to searching for personal data in documents, you can also use Content Search to search for other
types of data that's created by using native SharePoint Online apps. This includes data created by using
SharePoint lists, discussions, and forms. When you run a Content Search and search SharePoint Online sites (or
OneDrive for Business accounts) data from lists, discussions, and forms that match the search criteria will be
returned in the search results.
Ex a m p l e s o f se a r c h q u e r i e s
Here are some examples of search queries that use keywords and conditions to search for personal data in
response to a DSR. The examples show two versions of the query: one showing the keyword syntax (where the
condition is included in Keyword box) and one showing the GUI-based version of the query with conditions.
Ex a m p l e 1
This example returns Excel files on SharePoint Online sites and OneDrive for Business accounts that contain the
specified email address. Files might be returned if the email address appears in the file metadata.
Keyword syntax
GUI
Ex a m p l e 2
This example returns Excel or Word files on SharePoint Online sites and OneDrive for Business accounts that
contain the specified employee ID or birth date.
GUI
Ex a m p l e 3
This example returns email messages that contain the specified ID number, which is a France Social Security
Number (INSEE)
You export both the results of a content search and the partially indexed items from the content location that
were search. You can also export only the partially indexed items. Then you can open them in their native
application and review the content. You have to use this option to export items from SharePoint Online and
OneDrive for Business. See Export Content Search results from the Security & Compliance Center.
Ex p o r t a sp e c i fi c se t o f p a r t i a l l y i n d e x e d i t e m s fr o m m a i l b o x e s
Instead of exporting all partially indexed mailbox items from a search, you can rerun a Content Search to search
for a specific list of partially indexed items, and then export them. You can do this only for mailbox items. See
Prepare a CSV file for a targeted Content Search in Office 365.
Next steps
After you find the personal data that's relevant to the DSR, be sure to retain the specific Content Search that you
used to find the data. You will likely reuse this search to complete other steps in the DSR response process, such
as obtaining a copy of it, exporting it, or permanently deleting it.
Additional considerations for selected applications
The following sections describe things you should keep in mind when searching for data in the following Office
365 applications.
Office Lens
OneDrive for Business and SharePoint Experience Settings
Microsoft Teams for Education
Microsoft To Do
Skype for Business
Office Lens
A person using Office Lens (a camera app supported by devices running iOS, Android, and Windows) can take a
picture of whiteboards, hardcopy documents, business cards, and other things that contain a lot of text. Office
Lens uses optical character recognition technology that extracts text in an image and save it to an Office
document such as a Word, PowerPoint, and OneNote or to a PDF file. Users can then upload the file that
contains the text from the image to their OneDrive for Business account in Office 365. That means you can use
the Content Search tool to search, access, delete, and export data in files that were created from an Office Lens
image. For more information about Office Lens, see:
Office Lens for iOS
Office Lens for Android
Office Lens for Windows
OneDrive for Business and SharePoint Online experience settings
In addition to user-created files stored in OneDrive for Business accounts and SharePoint Online sites, these
services store information about the user that is used to enable various experiences. Users still in your
organization can access much of this information by using in-product functionality. The following information
provides guidance on how to access, view, and export OneDrive for Business and SharePoint Online application
data.
Sh a r e P o i n t u se r p r o fi l e s
The user's Delve profile allows users to maintain properties stored in the SharePoint Online user profile,
including birthday, mobile phone number (and other contact information), about me, projects, skills and
expertise, schools and education, interests, and hobbies.
E n d u s e rs
End users can discover, access, and rectify SharePoint Online user profile data using the Delve profile experience.
See View and update your profile in Office Delve for more details.
Another way for users to access their SharePoint profile data is to navigate to the edit profile page in their
OneDrive for Business account, which can be accessed by going to the EditProfile.aspx path under the
OneDrive for Business account URL. For example, for a user [email protected] , the user's OneDrive for
Business account is at:
https://contoso-my.sharepoint.com/personal/user1\_contoso\_com/\_layouts/15/OneDrive.aspx
https://contoso-my.sharepoint.com/personal/user1\_contoso\_com/\_layouts/15/EditProfile.aspx
Properties sourced in Azure Active Directory can't be changed within SharePoint Online. However, users can go
to their Account page by selecting their photo in the Office 365 header, and then selecting My account .
Changing the properties here may require users to work with their admins to discover, access, or rectify a user
profile property.
A d mi n s
An admin can access and rectify profile properties in the SharePoint admin center. In the SharePoint admin
center , select the user profiles tab. select Manage user profiles , enter a user's name, and then select Find .
The admin can right-select any user and select Edit My Profile . Properties sourced in Azure Active Directory
can't be changed within SharePoint Online.
An admin can export all User Profile properties for a user by using the Expor t-SPOUserProfile cmdlet in
SharePoint Online PowerShell. See Export-SPOUserProfile.
For more information about user profiles, see Manage user profiles in the SharePoint admin center.
U se r I n fo r m a t i o n l i st o n Sh a r e P o i n t O n l i n e si t e s
A subset of a user's SharePoint user profile is synchronized to the User information list of every site that they
visit or have permissions to access. This is used by SharePoint Online experiences, such as People columns in
document libraries, to display basic information about the user, such as the name of the creator of a document.
The data in a User Information list matches the information stored in SharePoint user profile and will be
automatically rectified if the source is changed. For deleted users, this data remains in the sites they interacted
with for referential integrity of SharePoint column fields.
Admins can control which properties are replicable inside the SharePoint admin center. To do this:
1. Go to the SharePoint admin center and select the user profiles tab.
2. select Manage User Proper ties to see a list of properties.
3. Right-select any property and select Edit and adjust various settings.
4. Under Policy Settings , the replicable property controls whether the property will be represented in the
User information list. Not all properties support adjusting this.
An admin can export all User information properties for a user on a given site by using the Expor t-
SPOUserInfo cmdlet in SharePoint Online PowerShell. See Export-SPOUserInfo.
O n e D r i v e fo r B u si n e ss e x p e r i e n c e se t t i n g s
A user's OneDrive for Business experience stores information to help the user find and navigate content of
interest to them. Most of this information can be accessed by end users using in-product features. An admin can
export the information using a PowerShell Script and SharePoint Client-Side Object Model (CSOM) commands.
See Export OneDrive for Business experience settings for more information about the settings, how they are
stored, and how to export them.
O n e D r i v e fo r B u si n e ss a n d Sh a r e P o i n t O n l i n e se a r c h
The in-app search experience in OneDrive for Business and SharePoint Online stores a user's search queries for
30 days to increase relevance of search results. An admin can export search queries for a user by using the
Expor t-SPOQuer yLogs cmdlet in SharePoint Online PowerShell. See Export-SPOQueryLogs.
Microsoft Teams for Education
Microsoft Teams for Education offers two additional collaboration features that teachers and students can use
that creates and stores personal data: Assignments and OneNote Class Notebook. You can use Content Search
to discover data in both.
A ssi g n m e n t s
Students files associated with an Assignment are stored in a document library in the corresponding Teams
SharePoint Online site. IT admins can use the Content Search tool to search for student files that are related to
assignments. For example, an admin could search all SharePoint Online sites in the organization and use the
student's name and class or assignment name in the search query to find data relevant to a DSR.
There's other data related to Assignments that isn't stored in the class team SharePoint Online site, which means
it's not discoverable with Content Search. This includes:
Files that the teacher assigns to students as part of the assignment
Student grades and feedback from the teacher
The list of documents submitted for an assignment by each student
Assignment metadata
For this type if data, an IT admin or data owner (such as a teacher) may have to go into the Assignment in the
class team to find data relevant to a DSR.
O n e N o t e C l a ss N o t e b o o k
The OneNote Class Notebook is stored in the class team SharePoint Online site. Every student in a class has a
private notebook that's shared with the teacher. There's also a content library where a teacher can share
documents with students, and a collaboration space for all students in the class. Data related to these capabilities
is discoverable with Content Search.
Here's specific guidance to search for a Class Notebook.
1. Run a Content Search using the following search criteria:
Search all SharePoint Online sites
Include the name of the class team as a search keyword; for example, "9C Biology."
2. Preview the search results and look for the item that corresponds to the Class Notebook.
3. Select that item, and then copy the folder path that's displayed in the details pane. This is the root folder
for the Class Notebook.
4. Edit the search that you created in step 1 and replace the class name in the keyword query with the folder
path of the Class Notebook and precede the folder path with the path site property; for example,
path:" https://contosoedu.onmicrosoft.com/sites/9C Biology/SiteAssets/9C Biology
Notebook/" . Be sure to include the quotation marks and the trailing forward slash.
5. Add a search condition and select the File Type condition and use one for the value of the file type. This
returns all OneNote files in the search results. The resulting keyword syntax would look something like
this:
6. Rerun the Content Search. The search results should include all OneNote files for the Class Notebook
from the class team.
Microsoft To Do
Tasks (called to-dos, which are saved in to-do lists) in Microsoft To Do are saved as tasks in a user's Exchange
Online mailbox. That means that you can use the Content Search tool to search, access, delete, and export to-
dos. For more information, see Set up Microsoft To Do.
Skype for Business
Here some additional information about how to access, view, and export personal data in Skype for Business.
Files attached to a meeting are retained in the actual meeting for 180 days and then become inaccessible.
These files can be accessed by meeting participants by joining the meeting from the meeting request and
then viewing or downloading the attached file. See the "Use the attachments in the meeting" section in
Preload attachments for a Skype for Business meeting.
Conversations in Skype for Business are retained in the Conversation History folder in user mailboxes. You
can use Content Search to search mailboxes for data in Skype conversations.
A data subject can export their contacts in Skype for Business. To do this, they would right-select a contact
group in Skype for Business and select Copy . Then they can paste the list of email addresses into a text or
Word document.
If the Exchange Online mailbox of a meeting participant is placed on Litigation Hold or assigned to an Office
365 retention policy, files attached to a meeting are retained in the participants mailbox. You can use Content
Search to search for those files in the participant's mailbox if the retention period for the file has not expired.
For more information about retaining files, see Retaining large files attached to a Skype for Business meeting.
NOTE
Exporting mailbox items from a user's mailbox using Content Search requires that the user (whose mailbox you're
exporting items from) is assigned an Exchange Online Plan 2 license.
NOTE
Understanding the actions that result in an item being soft-deleted or hard-deleted will help you determine how to delete
data in a way that meets GDPR requirements when responding to a deletion request.
Legal holds and retention policies: In Office 365, a "hold" can be place on mailboxes and sites. In short,
this means that nothing is permanently removed (hard-deleted) if a mailbox or site is on hold, until the
retention period for an item expires or until the hold is removed. This is important in the context of deleting
Customer Content in response to a DSR: if an item is hard-deleted from a content location that is on hold, the
item is not permanently removed from Office 365. That means it could conceivably be recovered by an IT
admin. If your organization has a requirement or policy that data be permanently deleted and unrecoverable
in Office 365 in response to DSR, then a hold would have to be removed from a mailbox or site to
permanently delete data in Office 365. More than likely, your organization's guidelines for responding to
DSRs have a process in place to determine whether a specific DSR deletion request or a legal hold takes
precedence. If a hold is removed to delete items, it can be reimplemented after the item is deleted.
Deleting documents in SharePoint Online and OneDrive for Business
After you find the document on a SharePoint Online site or in a OneDrive for Business account (by following the
guidance in Discover section of this guide) that needs to be deleted, a data privacy officer or IT admin would
need to be assigned the necessary permissions to access the site and delete the document. If appropriate, the
document owner can also be instructed to delete the document.
Here's the high-level process for deleting documents from sites.
1. Go to the site and locate the document.
2. Delete the document. When you delete a document from a site, it's sent to the first-stage Recycle Bin.
3. Go to the first-stage Recycle Bin (the site Recycle Bin) and delete the same document you deleted in the
previous step. The document is sent to the second-stage Recycle Bin. At this point, the document is soft-
deleted .
4. Go to the second-stage Recycle Bin (which is the site collection Recycle Bin) and delete the same document
that you deleted from the first-stage Recycle Bin. At this point, the document is hard-deleted.
IMPORTANT
You can't delete a document that is located on a site that is on hold (with one of the retention or legal hold features in
Office 365). In the case where a DSR delete request takes precedence over a legal hold, the hold would have to be
removed from the site before a document could be permanently deleted.
NOTE
To hard-delete mailbox items to satisfy a DSR deletion request by following the procedure in the previous topic, you may
have to soft-delete those items while the mailbox is still on hold so that they are moved to the Recoverable Items folder.
Deleting a user
In addition to deleting personal data in response to a DSR deletion request, a data subject's "right to be
forgotten" may also be fulfilled by deleting their user account. Here are some reasons that you might want to
delete a user:
The data subject has left (or is in the process of leaving) your organization.
The data subject has requested that you delete system-generated logs that have been collected about them.
Examples of data in system-generated logs include Office 365 app and service usage data, information about
search requests performed by the data subject, and data generated by product and services as a product of
system functionality and interaction by users or other systems. For more information, see Part 3: Responding
to DSRs for system-generated Logs in this guide.
Permanently prevent the data subject from accessing or processing data in Office 365 (as opposed to
temporarily restriction access by the methods described in the section Responding to DSR restriction
requests.
After you delete a user account:
The user can no longer sign-in to Office 365 or access any of your organization's Microsoft resources, such as
their OneDrive for Business account, SharePoint Online sites, or their Exchange Online mailbox.
Personal data, such as email address, alias, phone number, and mailing address, that's associated with the
user account is deleted
Some Office 365 apps remove information about the user. For example, in Microsoft Flow, the deleted user is
removed from the list of owners for a shared flow.
System-generated logs about the data subject, with the exception of data that may compromise the security
or stability of the service, will be deleted 30 days after the user account is deleted. For more information, see
the section Deleting system-generated logs.
IMPORTANT
After you delete a user account, that person will lose the ability to sign in to Office 365 and the ability to sign in to any
products or services for which he or she formerly relied upon for a work or school account. That person would also be
unable to initiate any DSR requests through Microsoft directly in instances where Microsoft is the data controller. For
more information, see the Product and services authenticated with an Org ID for which Microsoft is a data controller
section in Part 4 of this guide.
NOTE
In the event that you are a customer currently engaged in FastTrack migrations, deleting the user account will not delete
the data copy held by the Microsoft FastTrack team, which is held for the sole purpose of completing the migration. If,
during the migration, you would like the Microsoft FastTrack team to also delete the data copy, you can submit a request.
In the ordinary course of business, Microsoft FastTrack will delete all data copies once the migration is complete.
Like the soft-deletion and hard-deletion of data that was described in the previous section on deleting personal
data, when you delete a user account, there is also a soft-deleted and hard-deleted state.
When you initially delete a user account (by deleting the user in the admin center or in the Azure portal), the
user account is soft-deleted, and moved the Recycle Bin in Azure for up to 30 days. At this point, the user
account can be restored.
If you permanently deleted the user account, the user account is hard-deleted and removed from the Recycle
Bin in Azure. At this point, the user account can't be restored, and any data associated with the user account
will be permanently removed from the Microsoft cloud. Hard-deleting an account deletes system-generated
logs about the data subject, except for data that may compromise the security or stability of the service.
Here's the high-level process for deleting a user from your organization.
1. Go to the admin center or the Azure portal and locate the user.
2. Delete the user. When you initially delete the user, the user's account is sent to the Recycle Bin. At this
point, the user is soft-deleted. The account is retained in the soft-deleted for 30 days, which allows you to
restore the account. After 30 days, the account is automatically hard-deleted. For specific instructions, see
Delete users from Azure AD.
You can also soft-delete a user account in the admin center. See Delete a user from your organization.
3. If you don't want to wait for 30-days for the user account to be hard-deleted, you can manually hard-
delete it. To do this in the Azure portal, go to the Recently deleted users list and permanently delete the
user. At this point, the user is hard-deleted. For instructions, see How to permanently delete a recently
deleted user.
You can't hard-delete a user in the Office 365 admin portal.
NOTE
In Office 365 operated by 21Vianet (China), you can't permanently delete a user as previously described. To permanently
delete a user, you can submit a request via the Office 365 admin portal at this URL. Go to Commerce and then select
Subscription -> Privacy -> GDPR and enter the required information.
There are several ways that you can search for records in an Access database that might be responsive to a DSR
request. For a DSR investigation, you can search for records that related to the data subject or search for records
that contain specific data. For example, you could either search or go to a record that corresponds to the data
subject. Or you can search for records that contain specific data, such as personal data about the data subject.
For more information, see:
Find records in an Access database
Create a simple select query
A c c e ss
After you find the records or fields that are relevant to the DSR request, you can take a screenshot of the data or
export it to an Excel file, Word file, or a text file. You can also create and print a report based on a record source,
or a select query that you created to find the data. See:
Introduction to reports in Access
Export data to Excel
Export data to a Word document
Export data to a text file
Ex p o r t
As previously explained, you can export data from an Access database to different file formats. The export file
format that you choose might be determined by the specific DSR export request from a data subject. See Import
and export for a list of topics that describe how to export Access data in different file formats.
Del et e
You can delete an entire record or just a field from an Access database. The quickest way to delete a record from
an Access database is to open the table in Datasheet view, select the record (row) or just the data in a field that
you want to delete, and then press Delete. You can also use a select query that you created to find data and then
convert it to a delete query. See:
Delete one or more records from a database
Create and run a delete query
Business Apps for Office 365
This section explains how to use the in-app functionality in each of the following Business Apps for Office 365 to
respond to DSR requests.
Bookings
Listings
Connections
Bookings
The following sections explain how to use the in-app functionality in Microsoft Bookings to find, access, export,
and delete personal data. This applies to both the standalone Bookings app and to Bookings when accessed
through the Business center.
Microsoft Bookings allows administrators and users or staff, with a Bookings license in their organization, to set
up booking pages so customers can schedule and make changes to appointments, receive confirmation emails,
updates, cancellation, and reminders email. Business owners and their staff can also book events on behalf of
their customers with Bookings.
The following types of data are created by customers, administrators, or staff:
Contact information of customers, par tners, and friends - This data contains name, phone
number, email address, address, and notes.
Contacts for anyone can be manually created by using the Bookings Web, iOS, and Android clients.
Contacts for anyone can be imported from a C1's mobile device into Bookings with the Bookings
iOS and Android clients.
Contacts are also auto-created at the time of booking creation through the booking workflow for
anyone booked, whether the booking is created by a user on a customer's behalf or if it's created
by the customer using the owner's booking page.
Booking events - These are meetings between the business owner or their designated staff and a
customer, which are created either by the business owner or the customer through the business owner's
public booking page. This data includes name, address, email address, phone number, and any other info
the business owner collects from the customer at the time of booking.
Email confirmations/cancellations/updates - These are email messages generated and sent by the
system in association with specific booking events. They contain personal data about the staff who is
scheduled to deliver the relevant service and they contain personal data about the customer that was
entered by either the business owner or the customer at the time of booking.
All customer content is stored in the Exchange Online mailbox that hosts the organization's Bookings. This
content is retained for as long as the business owner and customer are active in the service, unless they
explicitly request that the data be deleted or if they leave the service. This content can be deleted with in-product
UI, with a cmdlet, or through deletion of the relevant booking mailbox. Once the deleted action is initiated, the
data is deleted within the time period set by the business owner.
If a customer decides to leave the service, their customer contents is deleted after 90 days. For more information
about when mailbox content is deleted after a user account in deleted, see Removing Exchange Online data.
End User Identifiable Information
End user Identifiable Information (EUII) includes personal and contact information about the staff that gets
scheduled in Bookings. It's added to the Staff details pages when the business owner sets up Bookings and
makes updates after the setup. It contains staff member's name, initials, email address, and phone number. This
data is stored in the Exchange Online mailbox that hosts Bookings.
This data is retained for as long as the staff member is active in the service unless it's explicitly deleted the
business owner or an admin using the in-app UI or by deleting the relevant booking mailbox. When the admin
initiates the deletion of staff's details, or if the staff member leaves the service, their details are deleted in
accordance with the Exchange Online mailbox's content retention policies set by the business owner or admin.
D i sc o v e r / A c c e ss
To export data corresponding to the business owner, staff and customers, you can use the Business center
privacy portal. See Export or delete user data using Business center privacy portal.
Del et e
You can delete the following types of Bookings data in response to a DSR deleting request:
Business profile information and contacts: You can delete the Bookings mailbox in the admin center.
After you delete the mailbox, you can restore it with 30 days. After 30 days, the account and the
corresponding mailbox are permanently deleted. For details about deleting a user account, see the section
Deleting a user.
Staff details: You can delete staff from the Bookings dashboard. To permanently detail staff, you can delete
their Office 365 account.
Bookings events: You can delete bookings events from the Bookings calendar, which will remove the
customer's information.
Meeting requests, email confirmations/cancellations/updates, and email reminders: You can
delete these from the Bookings calendar, which will remove the customer's information.
Business owners and admins can also delete their customer's data by using the Business center privacy portal.
See Export or delete user data using Business center privacy portal.
Additionally, you can delete business owner and staff data, you can delete the corresponding user account. See
the section Deleting a user.
Listings
The following sections explain how to use the in-app functionality in Microsoft Listings to find, access, export,
and delete personal data.
D i sc o v e r
Listings owner can connect their business to Google, Bing, Yelp, and Facebook to see an aggregated view of
ratings and reviews. Listings collect and store the following types of data:
Google reviews and ratings
Bing reviews and ratings
Yelp reviews and ratings
Facebook reviews and ratings
A c c e ss
Listings owner can sign in to the Listings dashboard to see their reviews and ratings.
Ex p o r t
To export business owner, staff and customer data, use the Business center privacy portal. See Export or delete
user data using Business center privacy portal.
Del et e
If a Listings owner would like to delete their Listings information, they can disconnect from the provider on the
Listings page. After they disconnect, their Listings information will be deleted.
Connections
The following sections explain how to use the in-app functionality in Microsoft Connections to find, access,
export, and delete personal data.
D i sc o v e r
A Connections owner can sign in to the Connections dashboard and see the email campaigns they've sent.
Ex p o r t
To export business owner, staff and customer data, use the Business center privacy portal. See Export or delete
user data using Business center privacy portal.
Del et e
After a Connections owner sends an email campaign, they can't delete the campaign. If there are any draft
campaigns they want to delete, they can sign in to the Connections dashboard and delete the draft campaigns.
Education
This section explains how to use the in-app functionality of the following Microsoft Education apps to respond to
DSR requests.
Assignments
Class Notebook
Assignments
The following sections explain how to use the in-app functionality in Assignments to find, access, export, and
delete personal data.
D i sc o v e r / A c c e ss
Assignments stores information that is generated both by teachers and students. Some of this information is
store in SharePoint and some is stored in a non-SharePoint location.
F i n d i n g A ssi g n m e n t s d a t a st o r e d i n Sh a r e P o i n t
Students files associated with a Submission for Assignment are stored in a document library (named Student
Work ) and files associated with Assignments that are created by teachers and (accessible by students) are
stored in a different document library (named Class Files ). Both document libraries are in the corresponding
Class Team SharePoint site.
An admin can use the Content Search tool in the Security & Compliance Center to search for student files (in the
Student Work and Class Files libraries) that are related to submissions on assignments and files related to
assignments. For example, an admin could search all SharePoint sites in the organization and use the student's
name and class or assignment name in the search query to find data relevant to a DSR request.
Similarly, an admin can search for teacher files related to assignments for files that a teacher distributed to
students. For example, an admin could search all SharePoint sites in the organization and use the teacher's name
and class or assignment name in the search query to find data relevant to a DSR request.
For more information, see:
Assignments Admin Documentation
Using the Content Search eDiscovery tool to respond to DSRs (in this guide)
F i n d i n g A ssi g n m e n t s d a t a n o t st o r e d i n Sh a r e P o i n t
The following types of Assignments data are not stored in the class team SharePoint site, and therefore aren't
discoverable by using Content Search. This data this includes the following:
Student grades and feedback from the teacher
The list of documents submitted for an assignment by each student
Assignment details, like the date the assignment is due
To find data, an admin or a teacher would have to go into the Assignment in the Class Team site to find data that
may be relevant to a DSR request. An admin can add themselves as an owner to the class and view all the
assignments for that class team.
Even if a student is no longer part of a class, their data might still be present in the class and marked as "no
longer enrolled". In this case, a student submitting a DSR request would have to provide the admin the list of
classes that they were formally enrolled it.
Ex p o r t
You can export Assignments data for a specific student for all classes in which the student is enrolled by using a
PowerShell script to get a list of classes for the student and then using a PowerShell script to export the data.
See:
Configure Assignments for Teams
Get a list of classes for a specific student
Export student and teacher data from Assignments
If the student has been removed from the Team Class site, the admin can add the student back to the site before
running the export script. Or the admin can use the input file for the script to identify every class that the
student was ever enrolled in. You can also use the Assignment export script to export submissions data for all
assignments that a teacher has access to.
Del et e
You can delete Assignments data for a specific student for all classes in which the student is enrolled by using a
PowerShell script to get a list of classes for the student and then using a PowerShell script to delete the data. You
should do this before you remove the student from the class. See:
Configure Assignments for Teams
Get a list of classes for a specific student
Delete student data from Assignments
If the student has been removed from the Team Class site, the admin can add the student back to the site before
running the export script. Or the admin can use the input file for the script to identify every class that the
student was ever enrolled in. You can't use the Assignments deletion script to delete teacher data because all
Assignments are shared across the Class Team site. As an alternative, an admin would have to add themselves to
the Class Team site and then delete a specific Assignment.
Class Notebook
Searching for content in Class Notebook is discussed previously in this guide. See the OneNote Class Notebook
section. You can also use the Content Search tool to export data from a Class Notebook. Alternatively, an admin
or the data subject can export data from a Class Notebook. See Save a copy of a Class Notebook.
Flow
The following sections explain how to use the in-app functionality in Microsoft Flow to find, access, export, and
delete personal data.
Discover
People can use Flow to perform data-related tasks such as synchronizing files between applications, copying
files from one Office 365 service to another, and collecting data from one Office 365 app and storing it in
another. For example, a user could set up a Flow to save Outlook email attachments to their OneDrive for
Business account. In this example, you could use the Content Search tool to search the user's mailbox for the
email message that contained the attachment or search their OneDrive for Business account for the file. This is
an example where data handled by Flow might be discoverable in the Office 365 services connected by a Flow
workflow.
Additionally, people can use Flow to copy or upload files from Office 365 to an external service, such as
Dropbox. In these cases, a DSR request concerning the data in an external service would have to be submitted to
the external service, who is processing the data in this type of scenario.
If an admin receives a DSR request, they can add themselves as an owner of a user's flows. This enables an
admin to perform functions including exporting flow definitions, running histories, and performing flow
permission reassignments. See Manage Flows in the Admin Center.
An admin's ability to add themselves as an owner of a Flow requires an account with the following permissions:
Flow/PowerApps Plan 2 license (paid or trial)
Global administrator
or
Azure Active Directory global administrator
Having these privileges enables the admin to use the Flow admin center to access all Flows in the organization.
To add yourself as an owner of a flow.
1. Go to https://admin.flow.microsoft.com
2. Sign in with your Office 365 credentials.
3. On the Environments page, select the environment for the flows that you want to access. organizations
have a default environment.
4. On the page for the environment that you selected, select Resources , and then select Flows. A list of all
flows in the environment is displayed.
5. select View details for the flow that you want to add yourself as a member.
6. Under Owners , select Manage sharing .
7. On the Share flyout, add yourself as a member and then save the change.
After you make yourself an owner, go to Flow > My flows > Team flows to access the flow. From there, you
can download the run history or export the flow. See:
Download flow run history
Export and import your flows across environments with packaging
Access
A user can access the definitions and run histories of their flows.
Flow definitions: A user can export the definition of a flow (which is exported as a Flow package, formatted
as JSON in a zipped file). See Export and import your flows across environments with packaging.
Flow run histories: A user can download the run history of each of their flows. A flow run history is
downloaded as a CSV file, which can be opened in Excel to filter or search. Users can also download the run
history of multiple flows. See Download flow run history.
Delete
An admin can add themselves as an owner of a user's flows in the Flow admin center. If a user leaves your
organization and their Office 365 account is deleted, the flows that they are the sole owner of will be retained.
This is to help your organization transition the flows to new owners and avoid any disruption to your business
for flows that may be used for shared business processes. An admin then needs to determine whether to delete
the flows that were owned by the user or reassign to new owners, and take that action.
For shared flows, when a user is deleted from your organization, their name is removed from the list of owners.
Export
An admin can export the definition and run history of a user's flows. To do this, an admin must add themselves
as an owner of the user's flow in the Flow admin center
Flow definitions: After an admin adds themselves as an owner of a flow, they can go to Flow > My
Flows > Teams flows to export the flow definition (which is exported as a Flow package, formatted as
JSON in a zipped file). See Export and import your flows across environments with packaging.
Flow run histories: Similarly, an admin must add themselves as an owner of a Flow to export its flow
run history. The Flow run history is downloaded as a CSV file, which means you can use Excel to filter or
search. You can also download the run history of multiple Flows, as long as you have ownership. See
Download flow run history.
Connections and custom connectors in Flow
Connections require users to provide credentials to connect to APIs, SaaS applications, and custom developed
systems. These connections are owned by the user that established the connection and can be managed in-
product. After Flows have been reassigned, an admin can use PowerShell cmdlets to list and delete these
connections as part of deleting user data.
Custom connectors allow organizations to extend the capabilities of Flow by connecting to systems where an
out-of-box connector is not available. A custom connector author can share their connector with others in an
organization. After receiving a DSR deleting request, an admin should consider reassigning ownership of these
connectors to avoid business disruption. To expedite this process, an admin can use PowerShell cmdlets to list,
reassign, or delete custom connectors.
Forms
The following sections explain how to use the in-app functionality in Microsoft Forms to find, access, export, and
delete personal data.
Discover
Forms users can go to https://forms.office.com and select My forms to see the Forms they've created. They can
also select Shared with me to view Forms others have shared via a link. If there are many Forms to sort
through, users can use the in-product search bar to search for Forms by title or author. To determine whether
Microsoft Forms is a place where personal data responsive to your DSR is likely to reside, you can ask the Data
Subject to search his or her Shared with me list to determine which users ("Forms owners") have sent Forms
to the Data Subject. You can then ask the forms owners to select Share in the top navigation bar and send you a
link to a specific form so you can view it and further determine whether it is material to your DSR.
Access
After the relevant Forms are found, you can access the responses to the Form by clicking the Responses tab.
Learn more about how to check your quiz results or form results. To review response results in Excel, select the
Responses tab, and then select Open in Excel . If you would like to send the Data Subject a copy of the Form,
you can either take screenshots of the relevant questions and answers that are in shown in the application in
rich text format or send the Data Subject an Excel copy of the results. If you are using Excel and would like to
share with the Data Subject only portions of the survey result, you can delete certain rows or columns or redact
the remaining sections before sharing the results. Alternatively, you can go to Share > Get a link to
duplicate (under Share as a template) to provide the Data Subject with a replicate of the entire Form.
Delete
Any survey, quiz, questionnaire, or poll can be permanently deleted by its owner. If you would like to honor a
DSR "forget me" and delete a form in its entirety, find the Form in the list of forms, select the series of dots
(ellipsis) in the upper right corner of the form preview window, and then select Delete . Once a Form is deleted,
it can't be retrieved. For information, see Delete a Form.
Export
To export form questions and responses to an Excel file, open the form, select the Responses tab, and then
select Open in Excel .
Kaizala
The following sections explain how to use the in-app functionality in Microsoft Kaizala to find, access, export,
and delete personal data.
Discover
A user's organizational data, which is data that is shared in organizational groups, can be accessed by an admin
from the Kaizala management portal. Organizational data is retained for a duration of time determined by your
organization's retention policies. In addition to user data, Kaizala servers also store the following types of
organizational data:
List of members who are part of the organization's groups
Organization group messages data, which are messages and responses shared across organizational groups
A list of users in the organizations
Product and service usage data captured for all users in the organization.
Kaizala Actions created by the organization
Kaizala connectors data
A user's consumer data can be accessed by the data subject using the Kaizala mobile app for consumer data.
Consumer data includes the following types of data:
Data belonging to private groups on Kaizala (stored on Kaizala servers for 90 days)
A user's profile information and the user's contacts
List of members who are part of the same groups as the user
Group messages and responses shared across groups
The user's contact list (stored on Kaizala service)
Transactions made by the user on Kaizala (applies to Kaizala users in India only)
Product and service usage data for the user
Access
Kaizala users can go to their mobile device to see Kaizala content they've created on their device. To determine
whether Kaizala mobile apps are a place where personal data responsive to a DSR is likely to reside, you can ask
the data subject to search their Kaizala app for the requested information.
Export
When users in your organization use Kaizala, consumer data is generated, and organizational data may be
generated if the user participates in an organization group. Admins can export a user's organizational data from
the Kaizala management portal. Kaizala consumer users can export their private data from the Kaizala mobile
app. In both cases, note that product and service usage data is also export when an admin or user exports
Kaizala data. For details, see:
Export or delete a user's organizational data in Kaizala
Export or delete your data in the Kaizala mobile app
Delete
A Kaizala admin can remove a Kaizala user's account in the Kaizala management portal. After a user account is
deleted, the user is removed from all groups that belong to your organization and organizational data is deleted
from their device.
To remove all private data from the user's mobile device, the Kaizala user can delete their Kaizala account. After
the account is deleted, all related Kaizala content including, chats, photos, and other data will be deleted from the
device.
For details, see:
Export or delete a user's organizational data in Kaizala
Export or delete your data in the Kaizala mobile app
Planner
The following sections explain how to use the in-app functionality in Microsoft Planner to find, access, export,
and delete personal data.
Discover
Planner plans are associated with a Microsoft 365 Group, and the files for Microsoft 365 Groups are stored in an
associated SharePoint Online site for the group. That means that you can use Content Search to find Planner
files by searching the site for the Microsoft 365 Group. To do this, you need to have the URL for the Microsoft
365 Group. See Searching Microsoft Teams and Microsoft 365 Groups in the "Content Search in Office 365" help
topic for tips about getting information about Microsoft 365 Groups to help you search for Planner files in the
corresponding SharePoint Online site.
Access
As previously explained, you can search the underlying SharePoint Online site and mailbox that are associated
with a plan. Then you can preview or download the related search results to access data.
Delete
You can manually delete a user's personally information by either giving yourself permissions to access the
plans the user is part of or signing in as the user to make the changes. See Delete user data in Microsoft Planner.
Export
You can use a PowerShell script to export a user's data from Planner. When you export the data, a separate JSON
file is export for each plan that the user is a part of. See Export user data from Microsoft Planner.
Power BI
The following sections explain how to use the in-app functionality in Microsoft Power BI to find, access, export,
and delete personal data.
Discover
You can search for content in the different workspaces in Power BI, including dashboards, reports, workbooks,
and datasets. Each type of workspace contains a search field that you can use to search that workspace. See
Searching, finding, and sorting content in Power BI service.
Access
You can print dashboards, reports, and visuals from reports in Power BI to produce a physical copy. You can't
print entire reports; you can only print one page at a time. To do this, go to a report, use the search field to find
specific data, and then print that page. See Printing from Power BI service.
Delete
To delete dashboards, reports, and workbooks, see Delete almost anything in Power BI service.
Deleting a dashboard, report, or workbook doesn't delete the underlying dataset. Because Power BI relies on a
live connection to the underlying source data to be complete and accurate, deleting personal data must be done
there. (For example, if you created a Power BI report that is connected to Dynamics 365 for Sales as the live data
source, you would have to make any corrections to the data in Dynamics 365 for Sales.)
After the data is deleted, you can use the scheduled data refresh capabilities in Power BI to update the dataset
that is stored in Power BI, after which the deleted data will no longer be reflected in any Power BI reports or
dashboards that used that data. To help comply with GDPR requirements, you should have policies in place to
ensure that you are refreshing your data at an appropriate cadence.
Export
To facilitate a data portability request, you can export dashboards and reports in Power BI:
You can export the underlying data for dashboards and reports to a static Excel file. See the video in Printing
from Power BI service. Using Excel, you can then edit the personal data to be included in the portability
request, and save it in a commonly used, machine-readable format such as .csv or .xml.
You can export (download) a report from the Power BI service in Office 365 to a .pbix file if it was originally
published using Power BI Desktop. You can then import this file to Power BI Desktop and publish (export) it
to the Power BI service of another organization. See Export a report from Power BI service to Desktop.
PowerApps
The following sections explain how to use the in-app functionality in Microsoft Power Apps to find, access,
export, and delete personal data. These steps outline how an admin can transition apps and their dependent
resources to new owners to limit business disruption.
Discover
PowerApps is a service for building apps that can be shared and used within your organization. As a part of the
process of building or running an app, a user ends up storing several types of resources and data in the
PowerApps service, including apps, environments, connections, custom connectors, and permissions.
To help facilitate a DSR request related to PowerApps, you can use the administration operations exposed in the
PowerApps Admin Center and PowerApps Admin PowerShell cmdlets. Access to these tools requires an account
with the following permissions:
A paid PowerApps Plan 2 license or a PowerApps Plan 2 trial license. You can sign up for a 30-day trial license
here.
Global administrator or
Azure Active Directory global administrator
For more information about finding personal data, see Discover PowerApps personal data.
The PowerApps service also includes the Common Data Service For Apps, which enables users to store data in
standard and custom entities within a Common Data Service database. You can view the data stored in these
entities from the PowerApps Maker portal, and use the in-product search capabilities of Advanced Find to search
for specific data in the entity. For more information around discovering personal data in the Common Data
Service, see Discover Common Data Service personal data.
Access
Admins have the ability to assign themselves privileges to access and run the apps and associated resources
(including flows, connections, and custom connectors) using the PowerApps Admin Center or PowerApps Admin
PowerShell cmdlets.
After you have access to the user's app, you can use a web browser to open the app. After you open an app, you
can take a screenshot of the data. See Use PowerApps in a web browser.
Delete
Because PowerApps allow users to build line-of-business application that can be a critical part of your
organization's day-to-day operations, when a user leaves your organization and their Office 365 account is
deleted, the admin needs to determine whether to delete the apps owned by the user or reassign to new
owners. This is to help your organization transition apps to new owners and avoid any disruption to your
business for apps that may be used for shared business processes.
For shared data, like apps, admins must decide whether to permanently delete that user's shared data or keep
them by reassigning the data to themselves or someone else within their organization. See Delete PowerApps
personal data.
Any data that was stored by a user in an entity in a Common Data Service For Apps database will also need to
be reviewed and (if desired) deleted by an admin using the in-product capabilities. See Delete Common Data
Service user personal data.
Export
Admins have the ability to export personal data stored for a user within the PowerApps service using the
PowerApps Admin Center and PowerApps Admin PowerShell cmdlets. See Export PowerApps personal data.
You can also use the in-product search capabilities of Advanced Find to search for a user's personal data in any
entity. For details about exporting personal data in the Common Data Service, see Export Common Data Service
personal data.
Connections and custom connectors in PowerApps
Connections require users to provide credentials to connect to APIs, SaaS applications, and custom developed
systems. These connections are owned by the user that established the connection and can be managed in-
product. After PowerApps have been reassigned, an admin can use PowerShell cmdlets to list and delete these
connections as part of deleting user data.
Custom connectors allow organizations to extend the capabilities of PowerApps by connecting to systems where
an out-of-box connector is not available. A custom connector author can share their connector with others in an
organization. After receiving a DSR deleting request, an admin should consider reassigning ownership of these
connectors to avoid business disruption. To expedite this process, an admin can use PowerShell cmdlets to list,
reassign, or delete custom connectors.
Project Online
The following sections explain how to use the in-app functionality in Microsoft Project Online to find, access,
export, and delete personal data.
Discover and access
You can use Content Search to search the SharePoint Online site that's associated with a Project (when a Project
is first created, there's an option to create an associated SharePoint Online site); Content Search doesn't search
the data in an actual project in Project Online, only the associated site. Though Content Search searches for
metadata about projects such as people mentioned in the subject) However, this may help you find (and access)
the Project that contains the data related to the DSR.
TIP
The URL for the site collection in your organization where sites associated with Projects is
https://<your org>.sharepoint.com/sites/pwa ; for example, https://contoso.sharepoint.com/pwa . You can use
this specific site collection as the location of your content search and then the name of the Project in the search query.
Additionally, an IT admin can use the Site Collections page in the SharePoint admin center to get a list of PWA site
collections in the organization.
Delete
You can delete information about a user from your Project Online environment. See Delete user data from
Project Online.
Export
You can a specific user's content from your Project Online environment. This data is exported to multiple files in
the JSON format. For step-by instructions see, Export user data from Project Online. For detailed information
about the files that are exported, see Project Online export json object definitions.
Publisher
The following sections explain how to use the in-app functionality in Microsoft Publisher to find, access, export,
and delete personal data.
Discover
You can use the in-app search feature to find text in a Publisher file the same way as you can in most Office
applications. See Find and replace text.
Access
After you find data, you can take a screenshot of it or copy and paste it into a Word or text file and provide that
to the data subject. You can also save a publication as a Word, PDF, or XPS file. See:
Save a publication as a Word document
Save As or convert a publication to .pdf or .xps using Publisher
Export
You can provide a data subject with the actual Publisher file or as previously explained, you can save a
publication as a Word, PDF, or XPS file. See:
Save a publication as a Word document
Save As or convert a publication to .pdf or .xps using Publisher
Delete
You can delete content from a publication, delete entire pages, or delete an entire Publisher file. See Add or
delete pages.
Stream
The following sections explain how to use the in-app functionality in Microsoft Stream to find, access, export,
and delete personal data.
Discover
To discover content that is generated or uploaded to Stream that may be relevant to a data subject request, a
Stream admin can run a user report to determine what videos, video descriptions, groups, channels, or
comments a Stream user may have uploaded, created, or posted by a user. For instructions on how to generate a
report, see Managing user data in Microsoft Stream. The report output is in HTML format and contains
hyperlinks that can be used to navigate to videos of potential interest. If you would like to view a video that has
custom permission set and you are not part of the original users for whom the video was intended, you can
view in admin mode, See Admin capabilities in Microsoft Stream.
Access
Depending on the nature of the data subject request, a copy of the report described above can be used help
satisfy a data subject request. The user report includes the Stream user's name and unique ID, a list of videos the
user uploaded, a list of videos the user has access to, a list of channels the user created, a list of all the groups
the user is a member of, and a list of all comments the user left on videos. The report further shows whether the
user viewed each video listed in the user report. If you would like to provide the data subject with access to a
video to satisfy a DSR request, you can share the video.
Export
See the Access section for Stream.
Delete
To delete or edit videos or any other Stream content, a Stream admin can select view in admin mode to perform
the necessary function. See Admin capabilities in Microsoft Stream. If a user has left the organization and would
like to have their name removed from appearing next to videos that they uploaded, you can remove their name
or replace it with another. See Managing deleted users in Microsoft Stream.
Sway
The following sections explain how to use the in-app functionality in Microsoft Sway to find, access, export, and
delete personal data.
Discover
Content created using Sway (found at www.sway.com) can only be seen by the owner and those that the author
has permitted to view the Sway. See Privacy Settings in Sway. To determine whether Sway is a place where
personal data responsive to your DSR is likely to reside, you can ask the Data Subject and organizational users
who are likely to have generated content about the Data Subject to search their Sways and share with you any
Sways that are likely to contain personal data responsive to the Data Subject's request. For information on how
to share a Sway, see "Share a Sway from your Organizational Account" in this Share your Sway article.
Access
If you have found personal data in a Sway that you would like to share with the Data Subject, you can provide
the Data Subject with access to the data through one of several means. You can provide the Data Subject a copy
of the online version of Sway (as described above); you can take screenshots of the relevant portion of the Sway
that you would like to share; or you can print or download the Sway to Word or convert it to a PDF. How to
download a Sway is further described in the "export" section below.
Delete
To learn how to delete a Sway, go to the "How do I delete my Sway?" section in Privacy settings in Sway.
Export
To export a Sway, open the Sway that you would like to download, select the series of dots (ellipsis) in the upper
right corner, select Expor t, and then choose either Word or PDF .
Whiteboard
The following sections explain how to use the in-app functionality in Microsoft Whiteboard to find, access,
export, and delete personal data.
Whiteboard 2016 on Surface Hub
Whiteboard on all other platforms
Whiteboard 2016 on Surface Hub
This section describes responding to DSR requests for data created using the built-in Whiteboard 2016 app on
Surface Hub.
D i sc o v e r
Whiteboard files (.wbx files) are stored in users' OneDrive for Business account. You can ask the data subject or
other users if whiteboards they created may contain personal data responsive to a DSR request. They can share
a whiteboard with you, or you can get a copy of it to give to the data subject.
To access and transfer whiteboards:
1. Give yourself access to the user's OneDrive for Business account. See the "Get access to the former
employee's OneDrive for Business documents" section in Get access to and back up a former user's data.
2. Go to the Whiteboard App Data folder in the user's OneDrive for Business account and copy the .wbx files of
the whiteboards that you want to transfer.
3. Give yourself access to the data subject's OneDrive for Business account, and then go to Whiteboard App
Data folder.
4. Paste the .wbx files that you copied in the previous step.
A c c e ss
If you find personal data in a whiteboard that's responsive to a DSR access request, you can provide the data
subject access to a whiteboard in several ways:
Take screenshots of the relevant portions of a whiteboard.
Upload a copy of the .wbx file to the data subject's OneDrive for Business account. See the previous section
for steps on accessing and transferring .wbx files.
Export a copy of whiteboard as a .png file.
Ex p o r t
You can give yourself access to the user's OneDrive for Business account and then delete the whiteboards.
1. Give yourself access to the data subject's OneDrive for Business account. See the "Get access to the former
employee's OneDrive for Business documents" section in Get access to and back up a former user's data
2. Go to the Whiteboard App Data folder and then delete the contents of this folder.
Whiteboard for PC, Surface Hub, and other platforms
If an admin receives a DSR request for data in the new Whiteboard app, they can use Whiteboard PowerShell to
add themselves (or other users) as an owner of a user's whiteboards. This enables an admin to perform actions
including accessing, exporting, and deleting whiteboards. Use either the Set-WhiteboardOwner cmdlet to add
yourself or another user as the owner of a whiteboard or use the Invoke-TransferAllWhiteboards cmdlet to
transfer the ownership of all whiteboards for a specific user to a new owner. For information about using these
cmdlets and installing the Whiteboard PowerShell module, see Microsoft Whiteboard cmdlet reference. After
you or another person has ownership of a whiteboard, see Microsoft Whiteboard cmdlet reference.
After you or another person has ownership of a whiteboard, see the Whiteboard support article for detailed
guidance about accessing, exporting, and deleting whiteboards.
Yammer
The following sections explain how to use the in-app functionality in Microsoft Yammer to find, access, export,
and delete personal data.
Discover
From the Yammer admin center, a Yammer verified admin (global admin or verified admin set up in Yammer)
can export data pertaining to a given user. The export includes the messages and files posted and modified by
the user, and information about topics and groups created by the user. When a user-specific data export is run,
the admin will also receive an inbox message with the user's account activity data that they can provide to the
user if they so choose. For detailed instructions, see Yammer Enterprise: Privacy.
User-specific exports are for a single network, so if the user is in an external Yammer network, the admin must
export data for that external network, and for the home network.
To access data not included in data export, screenshots can be taken for the user's profile, settings, group
memberships, bookmarked messages, followed users, and followed topics. Users or admins can collect this
information. For more information, see Yammer Enterprise: Privacy.
Access
You can view data in the exported files, including the full text of messages and the contents of files. You can also
select links in the exported files to go directly to the posted messages and files in Yammer, and to groups, and
topics the user created, messages the user liked, messages where the user is @mentioned, polls the user has
voted on, and links the user has added.
Per-user data export does not include:
The user's profile:
If the user has a Yammer identity, the user has full control of their profile. For information on how
to view and modify the profile, see Change my Yammer profile and settings.
If the user has an Office 365 identity, the Yammer user profile is pulled automatically from Office
365, which gets the profile information from Azure Active Directory (AAD). Yammer users can
temporarily change their profiles in Yammer, but these changes are overwritten when there is a
change in AAD, so you must view and change directory data in AAD. See Manage Yammer users
across their lifecycle from Office 365 and Add or change profile information for a user in Azure
Active Directory.
The user's settings:
The user can view and change their own settings. For information on how to view and modify user
settings, see Change my Yammer profile and settings. An admin can view this information and take
screenshots, but can't change it. Go to Yammer settings > People , and then select the name of the user.
The user's group membership, bookmarked messages, followed users, and followed topics.
The user can view this information. For information on how, see Tips for staying organized in
Yammer. An admin can view this information and take screenshots, but can't change it. Go to
Yammer settings > People , and then select the name of the user.
Export
For instructions for how to export data, see Manage GDPR data subject requests in Yammer Enterprise. You must
run a per-user export for each Yammer network the user is a member of.
Yammer has data retention settings that either soft-delete or hard-delete data when a user deletes a message or
file. If this is set to soft-delete, data a user has deleted will be included in the export. If the Yammer data retention
setting is set to hard-delete, the deleted information is no longer stored in Yammer, so will not be included in the
export.
Delete
Yammer allows verified admins to execute a GDPR-compliant delete via the Yammer admin center if they receive
a DSR. This option is called Erase User, and it suspends the user for 14 days and then removes all their personal
data, excluding files and messages. If the user is a guest user, this must be done for each external network the
guest is a member of.
NOTE
If an admin wants to remove the files and messages of a user during the 14-day window, they will have to perform a user
level export to identify the files and messages, and then decide which ones to delete either by in-product deletion or by
using a PowerShell script. After the 14-day window, the admin can no longer associate the user with their files or
messages.
When a user is deleted with the Erase User option, notification is sent to the Yammer Inbox of all network
admins and verified admins. The Erase User option deletes the user's Yammer profile, but does not delete their
Office 365 or Azure Active Directory profile.
For detailed steps to remove a user, see Manage GDPR data subject requests in Yammer Enterprise.
NOTE
For Yammer, in additional to removing the Yammer license from user accounts, you also must disable users' ability to sign
in to Yammer with Yammer credentials (by enforcing the use of their Office 365 credentials when signing in). For detailed
instructions, see Turn off Yammer access for Microsoft 365 users.
Temporarily removing data from SharePoint Online or OneDrive for Business sites
Another way to restrict the processing of personal data is to temporarily remove it from Office 365 in response
to a DSR. When your organization determines that the restriction no longer applies, you can import the data
back into Office 365.
Because most Office documents are on a SharePoint Online or OneDrive for Business site, here's a high-level
process for removing documents from sites and then re-importing them.
1. Get a copy of the document that is the subject of the restriction request. You may have to request either
access to the site or ask a global admin or a site collection administrator to provide you with a copy of the
document.
2. Store the document in an on-premises location (such as a file server or a file share) or another location
other than your Office 365 tenant in the Microsoft cloud.
3. Permanently delete (purge) the original document from Office 365. This is a 3-step process:
a. Delete the original copy of the document. When you delete a document from a site, it's sent to the
site Recycle Bin (also called the first-stage Recycle Bin).
b. Go to the site Recycle Bin and delete that copy of the document. When you delete a document
from the site Recycle Bin, it's sent to the site collection Recycle Bin (also called the second-stage
Recycle Bin). See Delete a file, folder, or link from a SharePoint document library.
c. Go to the site collection Recycle Bin and delete that copy of the document, which permanently
removes it from Office 365. See Delete items from the site collection recycle bin.
4. When the restriction no longer applies, the copy of the document that was stored on-premises can be re-
uploaded to the site in Office 365.
IMPORTANT
The preceding procedure won't work if the document is located on a site that is on hold (with one of the retention or legal
hold features in Office 365). In the case where a restriction request for a DSR takes precedence over a legal hold, the hold
would have to be removed from the site before a document could be permanently deleted. Additionally, the document
history for deleted documents is permanently removed.
Profile data: This is the profile information from your organization's Global Address List in Azure Active
Directory, and optional information that users have chosen to add about themselves. To access or export
profile data in Delve, a user can select Me > Update profile . They can either copy the content directly from
the page or
Blog data: This is blog posts published by a user. To access or export blog data, a user can select Me > All
posts . They can either copy the content directly from the page or take a screenshot.
Recent people data: These are the people in the organization that Delve has inferred are most relevant to
the user at a given time. When a user selects Me > See all in the "select a person to see what they're
working on" pane, Delve shows the most relevant people for a user at a given time.
Dat a avai l abl e t h r o u gh an expo r t l i n k i n Del ve
People list data: These are the people the user has viewed in Delve. The People list is shown in the left
pane on the home page. Users can export the list of people they have most recently viewed in Delve.
Favorites data: These are boards and documents that the user has marked as their favorite. The Favorites
page shows boards and documents that the user has added to their favorites. Users can export a list of their
current favorite boards and documents.
Feature settings data: These are Delve configurations or actions that result from a user's use of Delve.
Users can export a full list of these settings.
To access or export the above data, the user can select the gear icon in the upper-right corner in Delve, and then
select Feature settings > Expor t data . Information is exported in JSON format.
D a t a t h a t ' s a v a i l a b l e t h r o u g h o t h e r se r v i c e s
Popular documents data: These are documents and email attachments that may be relevant to the user.
Delve dynamically organizes these documents and email messages based on the user's activities and people
they work with in Office 365. When a user opens Delve or selects Home , Delve shows the most relevant
documents or attachments for the user at a given time. To access or export the actual documents and
attachments, the user can go to the Office 365 service through which the document or attachment was made
available (such as Office.com, SharePoint Online, OneDrive for Business, or Exchange Online).
Recent documents and email attachments data: These are the most recent documents and email
attachments that the user has modified. When a user selects Me > See all in the "Get back to your recent
documents and email attachments" pane, Delve shows the latest documents and email attachments the user
has modified at a given time. To access or export the actual documents and attachments, the user can go to
the Office 365 service through which the document or attachment was made available; for example,
Office.com, SharePoint Online, OneDrive for Business, or Exchange Online.
Documents from people around your data: These are the documents that Delve has inferred are most
relevant to the user at a given time. When a user selects Me > See all in the "Discover documents from
people around you" pane, Delve shows the most relevant documents for a user at a given time. To access or
export the actual documents, the user can go to the Office 365 service through which the document or
attachment was made available (for example, Office.com, SharePoint Online, OneDrive for Business, or
Exchange Online).
Rectify
Users can modify the following information in Delve:
Profile information: A user can select Me > Update profile to update their information. Depending on
your organization's settings in the Global Address List, users may not be able to modify all their profile
information, such as their name or job title.
Feature settings: A user can select the gear icon in the upper-right corner in Delve, and then select Feature
settings > to change the desired settings.
Restrict
To restrict processing in Delve for your organization, you can turn off the Office Graph. Learn more here.
Delete
Users can delete the following information in Delve:
Profile information: To delete profile information, a user can select Me > Update profile and either
delete free-form text. Depending on your organization's settings in the Global Address List, users may not be
able to delete all their profile information, such as their name or job title.
Documents and email attachments: To delete a document or attachment, users must go to the service
where the document or attachment is stored (such as SharePoint Online, OneDrive for Business, or Exchange
Online) and delete the document there.
MyAnalytics
MyAnalytics provides statistics to users to help them understand how they spend their time at work. To help
your users better understand the data that is presented to them in their personal dashboard and how that data
is calculated, direct your users to MyAnalytics personal dashboard.
Access and export
If your organization uses MyAnalytics, then Microsoft generates insights for all users. All MyAnalytics insights
are derived from email and meeting headers in the user's mailbox. Users can go to the MyAnalytics dashboard
while signed in to their Office 365 account to view the insights that are generated about how they spend their
time at work. They can take screenshots of MyAnalytics insights if they want to have permanent copies of their
information.
Rectify
All insights generated by MyAnalytics are derived from the user's mail and calendar items. Therefore, there is
nothing to rectify other than the source email or calendar items.
Restrict
To restrict processing for a specific user, you can opt them out of MyAnalytics. To see how, see Configure
MyAnalytics user settings.
Delete
All mailbox content, including MyAnalytics data, is purged when a user account is "hard-deleted" from Active
Directory. For more information, see the Deleting a user section in this guide.
Workplace Analytics
Workplace Analytics allows organizations to augment Office 365 data with their own business data to gain
insights about organizational productivity, collaboration patterns, and employee engagement. This article
explains the control that your organization has over the data that Workplace Analytics processes and who has
access to that data.
To assist you with DSRs in Workplace Analytics:
1. Determine whether your organization is using Workplace Analytics. For more information, see Assign
licenses to users. If your organization is not using Workplace Analytics, there is no further action.
2. If your organization is using Workplace Analytics, then see who in your organization has been assigned
to the role of Workplace Analytics administrator. You should also determine if the data subject's mailbox
is licensed for Workplace Analytics. If necessary, have your Workplace Analytics administrator contact
Microsoft Support in handling the following DSR requests:
Access and export
Workplace Analytics insight reports created by you may or may not contain personal data of users that your
organization licensed for Workplace Analytics, depending on the information that your organization used to
supplement the Office 365 data. Your Workplace Analytics administrator needs to review those reports to
determine if they contain a user's personal data. If a report does contain a user's personal data, then you need to
decide if you want to provide a copy of that report to the user. Workplace Analytics allows you to export the
report.
Rectify
As explained above, Workplace Analytics uses Office 365 data with the organizational data that you provide to
generate reports of interest to you. The Office 365 data can't be rectified; it's based on a user's email and
calendar activities. However, the organizational data that you have uploaded into Workplace Analytics to
generate the report can be rectified. To do this, you need to correct the source data, upload it, and rerun the
report to generate a new Workplace Analytics report.
Restrict
To restrict processing for a specific user, you can remove their Workplace Analytics license.
Delete
If a data subject would like to be removed from a Workplace Analytics report or set of reports, you can delete
the report. It is your responsibility to delete users from any organizational data that you used to generate the
report, and reupload the data. All data about the user is removed when a user account is "hard-deleted" from
Azure Active Directory.
To remove the personal data of a data subject, a global administrator can take the following steps:
1. Remove the Workplace Analytics license from the data subject.
2. Delete the Azure Active Directory (AAD) entry for the data subject. (For more information, see Delete a user.)
3. Contact support and have support open a ticket for a Data Subject Rights (DSR) user-delete request. In this
ticket, identify the data subject by using their User Principal Name (UPN).
4. Export a copy of the HR data from the company's HR system (see Export data), remove the data subject's
information from that HR data file, and then upload the edited HR data file in .csv format into Workplace
Analytics (see Upload organizational data).
IMPORTANT
Because personal data can come from multiple systems, it's possible that the export process might take up to one month
to complete.
NOTE
When you export data from the Azure portal, system-generated data for a few applications will not be exported. To
export data for these applications, see Additional steps to export system-generated log data.
[{
"DateTime": "2017-04-28T12:09:29-07:00",
"AppName": "SharePoint",
"Action": "OpenFile",
"IP": "154.192.13.131",
"DevicePlatform": "Windows 1.0.1607"
}]
Product and service usage data for some of Microsoft’s most often-used services, such as Exchange Online,
SharePoint Online, Skype for Business, Yammer, and Office 365 Groups can also be retrieved by searching the
Office 365 audit log in the Security & Compliance Center. For more information, see Use the Office 365 audit log
search tool in DSR investigations in Appendix A. Using the audit log may be of interest to you because it's
possible to assign permissions to other people in your organization (such as your compliance officer) to search
the audit log to access this data.
Deleting system-generated logs
To delete system-generated logs retrieved through an access request, you must remove the user from the
service and permanently delete their Azure Active Directory account. For instructions about permanently delete
a user, see the Deleting a user section in this guide. It's important to note that permanently deleting a user
account is irreversible once initiated.
Permanently deleting a user account removes the user's data from system-generated logs, except for data that
may compromise the security or stability of the service, for nearly all Office 365 services within 30 days.
One exception to this 30-day period is that the permanent deletion of the user account in Exchange Online takes
longer than 30 days. This is due to the critical nature of Exchange Online content and to prevent accidental data
loss. Exchange Online has been engineered to intentionally place data in a holding state for up to 60 days after a
user account has been permanently deleted. To permanently delete a user's Exchange Online data in a 30-day
time frame, permanently delete the user account in Azure Active Directory and then contact Microsoft Support
and request that the user's Exchange Online data be manually removed outside the scheduled delete process.
For more information, see Removing Exchange Online data, which was previously explained in this guide
Deleting a user's account will not remove system-generated logs for Yammer and Kaizala. To remove the data
from these applications, see one of the following:
Yammer - Manage GDPR data subject requests in Yammer Enterprise
Kaizala - Export or delete a user's organizational data in Kaizala
National clouds
A global IT admin needs to do the following to export system-generated log data in the following national
clouds:
Office 365 Germany : Follow the steps above.
Office 365 US Government : Go to the Office 365 admin portal and submit a request to Microsoft
Support.
Office 365 operated by 21Vianet (China) : Go to the Office 365 operated by 21Vianet admin portal and
then go to Commerce > Subscription > Privacy > GDPR and enter the required information.
IMPORTANT
If you delete a user as enabled via Azure Active Directory, your (former) user will lose the ability to sign in to any products
or services for which he or she formerly relied upon for a work or school account. Additionally, Microsoft will no longer be
able to authenticate the user in connection with a DSR request for products or services for which Microsoft is a data
controller. If you wish to enable a user to initiate DSRs against such services, it is important you instruct your user to do
so before you delete the user's AAD account.
Personal accounts
If your users have used Microsoft accounts (that is, personal accounts) to acquire products and services from
Microsoft for their own use and for which Microsoft is a data controller, they may initiate DSR requests by using
the Microsoft privacy dashboard.
Third-party products
If your organization, or your users acting in their individual capacity, have acquired products or services from
third parties and use their Microsoft work or school account for authentication, any data subject requests should
be directed to the applicable third party.
IMPORTANT
An eDiscovery Administrator can view and manage all DSR cases in your organization. For more information about the
different roles related to eDiscovery, see Assign eDiscovery permissions to potential case members.
NOTE
Currently, you must perform an additional step for OneDrive for Business and file a Microsoft Support request to
have the attribute synchronized to OneDrive for Business accounts.
3. Create an admin role group in the Security & Compliance Center for each compliance boundary. We
recommend that you create these role groups by copying the built-in eDiscovery Manager role group
and then removing any roles as necessary.
4. Add members to each of the specific role groups as eDiscovery Mangers. Members are the people
responsible for investigating and responding to DSRs, and will typically consist of IT admins, data privacy
officers, compliance managers, and human resource representatives.
5. Create a search permissions filter for each compliance boundary so that the members of the
corresponding admin role group can only search mailboxes and sites for users within that
agency/compliance boundary. The search permissions filter allows members of the corresponding role
group to search only the content locations with user object attribute value that corresponds to the
agency/compliance boundary.
For step-by-step instructions, see Set up compliance boundaries for eDiscovery investigations in Office 365.
Use the audit log search tool in DSR investigations
IT admins can use the audit log search tool in the Security & Compliance Center to identity documents, files, and
other Office 365 resources that users have created, accessed, changed, or deleted. Searching for this kind activity
can be useful in DSR investigations. For example, in SharePoint Online and OneDrive for Business, auditing
events are logged when users perform these activities:
Accessed a file
Modified a file
Moved a file
Uploaded or downloaded a file
You can search the audit log for specific activities, types of activities, activities performed by a specific user, and
other search criteria. In addition to SharePoint Online and OneDrive for Business activities, you can also search
for activities in Flow, Power BI, and Microsoft Teams. Auditing records are retained for 90 days. Therefore, you
won't be able to search for user activities that occurred more than 90 days ago. For a complete list of audited
activities and how to search the audit log, see Search the audit log in the Security & Compliance Center.
TIP
To work around the 90-day limitation discussed above and maintain a running history of your organization's auditing
records, you could export all activities on a recurring schedule (for example, every 30 days) to have a continuous record of
your organization's auditing records.
DAT E SEC T IO N / A P P C H A N GE
DAT E SEC T IO N / A P P C H A N GE
The European Union General Data Protection Regulation (GDPR) gives rights to people (known in the regulation
as data subjects) to manage their personal data. Personal data is defined very broadly under the GDPR as any
data that relates to an identified or identifiable natural person. The GDPR gives data subjects specific rights to
their personal data; these rights include obtaining copies of personal data, requesting corrections to it,
restricting the processing of it, deleting it, or receiving it in an electronic format. A formal request by a data
subject to a data controller (an employer or other type of agency or organization that has control over personal
data) to take an action on that data subject's personal data is called a data subject request or DSR.
Similarly, the California Consumer Privacy Act (CCPA), provides privacy rights and obligations to California
consumers, including rights similar to GDPR's Data Subject Rights, such as the right to delete, access and receive
(portability) their personal information. The CCPA also provides for certain disclosures, protections against
discrimination when electing exercise rights, and "opt-out/ opt-in" requirements for certain data transfers
classified as "sales". Sales are broadly defined to include the sharing of data for a valuable consideration. For
more information about the CCPA, see the California Consumer Privacy Act and the California Consumer Privacy
Act FAQ.
For general information about GDPR, see the GDPR section of the Service Trust portal.
Visual Studio, Visual Studio for Mac, and Visual Studio Code
Personal data we collect
As a data processor under the GDPR, Microsoft collects the data we need from users to provide experiences for
and improve Visual Studio and Visual Studio for Mac and Microsoft extensions to them and to Visual Studio
Code. There are two categories of data: customer data and system-generated logs. Customer data includes user-
identifiable transactional and interactional data that these products need to perform the service they provide.
For example, to provide users with personalized experiences such as roaming settings, we need to collect user
account information and settings data. System-generated logs are usage or diagnostic data that are used to help
identify and troubleshoot problems and improve our products and services, and may also contain identifiable
information about end users, such as a user name. System-generated logs are retained for no more than 18
months. As an example, system-generated logs are aggregated for each day of product usage and include the
usage date, the product used (for example, "Visual Studio 2017"), the action you took (for example,
"vs/core/packagecostsummary/solutionload"), and the number of times the action was taken, as shown in this
sample:
For Visual Studio 2013, the data we collect is anonymized. For Visual Studio 2012 and prior releases, we
immediately delete the data upon receipt. In both cases, there is nothing to view, export, or delete at a later time.
Export
You can export your feedback data as part of DSR. We will create one or more .zip archives that will include:
Your Developer Community profile information;
Preferences and notification settings;
Attachments you provided by reporting a problem in Visual Studio or through Developer Community.
NOTE
We will exclude the following public feedback you have provided from your archive: comments, solutions, reported
problems.
NOTE
We will not send email if you chose not to receive notifications in the Notifications tab.
If you request Export again, we will remove your old archive and create a new one.
Delete
Deleting will remove the following information about you from Developer Community:
Profile information;
Preferences and notification settings;
Attachments you provided by reporting a problem in Visual Studio or through Developer Community.
Your votes
NOTE
We will not delete, but will anonymize, the following public information: your comments, your solutions, problems that
you reported.
IMPORTANT
Delete of an AAD or MSA account triggers the Delete process for Developer Community.
Xamarin Forums
Personal Data We Collect
Through the Xamarin Forums user community, Microsoft collects data you provide to help us reproduce and
troubleshoot issues you may have with Microsoft products and services. This data includes personal data and
public feedback. The personal data we collect is user account data (for example, user names and email addresses
associated with your Xamarin Forums), and the public feedback we collect includes bugs, problems, comments,
and solutions you provide via the Xamarin Forums.
How You Can Control Your Data
Xamarin Forums
Vi e w
Users with active Xamarin Forums accounts may view their personal data and public feedback (for example, all
of their posted threads and posts) from their Xamarin Forums account page. Users may also edit their personal
data through their account page.
Ex p o r t
Xamarin Forums are hosted by a third party, Vanilla Forums. To request export of your public data, users should
contact [email protected] (monitored by the Xamarin team). We will then work directly with Vanilla Forums
to process this request.
Del et e
Xamarin Forums are hosted by a third party, Vanilla Forums. To request deletion of your personal and public
data, users should contact [email protected] (monitored by the Xamarin team). We will then manually
service the user's personal data deletion request.
NOTE
Bugzilla for Xamarin no longer accepts new issues. Former Xamarin Bugzilla accounts holders can view an archive of all
bugs they've reported and all comments they've added to bugs at https://xamarin.github.io/bugzilla-archives/. To request
deletion of personal data contained in the archive, users can file and issue at https://github.com/xamarin/bugzilla-
archives/issues/new/choose. Public feedback (for example, bugs, problems, comments, and solutions) that users have
posted to the Xamarin Bugzilla will not be deleted after receipt of a delete request. Public feedback will instead be
anonymized by removing the name and email address associated with any public feedback created by the user submitting
the delete request.
NuGet
For more information on DSR for NuGet.org, see NuGet User Data Requests.
ASP.NET
For information on DSR for the ASP.NET website, see The ASP.NET Website and GDPR Data Subject Request
processing.
IIS.NET
For information on DSR for the IIS.NET website, see The IIS.NET Website and GDPR Data Subject Request
processing.
NOTE
This topic is intended for participants in the data processor service for Windows Enterprise preview program and requires
acceptance of specific terms of use. To learn more about the program and agree to the terms of use, see
https://aka.ms/WindowsEnterprisePublicPreview.
IMPORTANT
The ability to rectify Windows Diagnostic Data is not supported. Windows Diagnostic Data constitutes factual actions
conducted within Windows, and modifications to such data would compromise the historical record of actions, increasing
security risks and harming reliability. All data covered in this document is considered Windows Diagnostic Data.
IMPORTANT
Deleting collected data does not stop further collection. To turn off data collection follow the procedure described in the
respective service's reference documentation.
Additionally, user-based delete requests require deleting the user account itself.
Step 3: Export
The tenant admin is the only person within your organization who can access Windows diagnostic data
associated with a particular user's use of a data processor service for Windows Enterprise enrolled device. The
data retrieved for an export request will be provided in a machine-readable format and will be provided in files
that will allow the user to know which devices and services the data is associated with. As noted previously, the
data retrieved will not include data that may compromise the security or stability of the Windows device. Azure
DSR, Part 2, Step 3: Export, describes how to execute a DSR export request through the Azure portal.
Microsoft provides the ability to export Customer Data directly via a pre-existing application programming
interface (API). Details are described in the API reference documentation.
The General Data Protection Regulation (GDPR) introduces new rules for organizations that offer goods and
services to people in the European Union (EU), or that collect and analyze data for EU residents no matter where
you or your enterprise are located. Additional details can be found in the GDPR Summary topic. This document
leads you to information on the completion of Breach Notifications under the GDPR using Microsoft products
and services.
Terminology
Helpful definitions for GDPR terms used in this document:
Data Controller (Controller): A legal person, public authority, agency or other body which, alone or jointly
with others, determines the purposes and means of the processing of personal data.
Personal data and data subject: Any information relating to an identified or identifiable natural person (data
subject); an identifiable natural person is one who can be identified, directly or indirectly.
Processor: A natural or legal person, public authority, agency, or other body, which processes personal data
on behalf of the controller.
Customer Data: Data produced and stored in the day-to-day operations of running your business.
Learn more
Microsoft Trust Center
Azure and Dynamics 365 breach notification under
the GDPR
2/9/2021 • 9 minutes to read • Edit Online
Microsoft takes its obligations under the General Data Protection Regulation (GDPR) seriously. Microsoft takes
extensive security measures within its online services to protect against data breaches. These measures include
both physical and logical security controls, as well as automated security processes, comprehensive information
security and privacy policies, and security and privacy training for all personnel.
Security is built into Microsoft Azure from the ground up, starting with the Security Development Lifecycle, a
mandatory development process that incorporates privacy-by-design and privacy-by-default methodologies.
The guiding principle of Microsoft's security strategy is to 'assume breach,' which is an extension of the defense-
in-depth strategy. By constantly challenging the security capabilities of Azure, Microsoft can stay ahead of
emerging threats. For more information on Azure security, review these resources.
Microsoft has a dedicated global, 24x7 incident response service that works to mitigate the effects of attacks
against Microsoft Azure. Attested by multiple security and compliance audits (for example, ISO/IEC 27018),
Microsoft employs rigorous operations and processes at its data centers to prevent unauthorized access,
including 24x7 video monitoring, trained security personnel, smart cards, and biometric controls.
4: Stabilize and Recover The incident response team creates a recovery plan to
mitigate the issue. Crisis containment steps such as
quarantining impacted systems may occur immediately and
in parallel with diagnosis. Longer term mitigations may be
planned which occur after the immediate risk has passed.
5: Close and Post-mor tem The incident response team creates a post-mortem that
outlines the details of the incident, with the intention to
revise policies, procedures, and processes to prevent a
recurrence of the event.
The Microsoft Azure Security Response in the Cloud white paper further details how Microsoft investigates,
manages, and responds to security incidents within Azure.
The detection processes used by Microsoft Azure are designed to discover events that risk the confidentiality,
integrity, and availability of Azure services. Several events can trigger an investigation:
Automated system alerts via internal monitoring and alerting frameworks. These alerts could come in the
way of signature-based alarms such as anti-malware, intrusion detection or via algorithms designed to
profile expected activity and alert upon anomalies.
First party reports from Microsoft Services running on Microsoft Azure and Azure Government.
Security vulnerabilities are reported to the Microsoft Security Response Center (MSRC) via
[email protected]. MSRC works with partners and security researchers around the world to help
prevent security incidents and to advance Microsoft product security.
Customer reports via the Customer Support Portal or Microsoft Azure and Azure Government Management
Portal, that describe suspicious activity attributed to the Azure infrastructure (as opposed to activity occurring
within the customer's scope of responsibility).
Security Red Team and Blue Team activity. This strategy uses a highly skilled Red Team of offensive Microsoft
security experts to uncover and attack potential weaknesses in Azure. The security response Blue Team must
detect and defend against the Red Team's activity. Both Red and Blue Team actions are used to verify that
Azure security response efforts are effectively managing security incidents. Security Red Team and Blue Team
activities are operated under rules of engagement to help ensure the protection of customer data.
Escalations by operators of Azure Services. Microsoft employees are trained to identify and escalate potential
security issues.
The Security Response Team works with Microsoft Azure Security Engineers and SMEs to classify the event
based on factual data from the evidence. A security event may be classified as:
False Positive : An event that meets detection criteria but is found to be part of a normal business practice
and may need to be filtered. The service team identifies the root cause for false positives and will address
them in a systematic way using detection sources and fine-tuning them as needed.
Security Incident : An incident when unlawful access to any Customer Data or Support Data stored on
Microsoft's equipment or in Microsoft's facilities, or unauthorized access to such equipment or facilities
resulting in loss, disclosure, or alteration of Customer Data or Support Data has occurred.
Customer Repor table Security/Privacy Incident (CRSPI) : An unlawful or unauthorized access to or use
of Microsoft's systems, equipment, or facilities resulting in disclosure, modification, or loss of customer data.
Privacy Breach : A subtype of Security Incident involving personal data. Handling procedures are no
different than a security incident.
For a CRSPI to be declared, Microsoft must determine that unauthorized access to customer data has or has
likely occurred and/or that there is a legal or contractual commitment that notification must occur. It is desired,
but not required, that specific customer impact, resource access, and repair steps be known. An incident is
generally declared a CRSPI after the conclusion of the Diagnose stage of a security incident. However, the
declaration may happen at any point that all pertinent information is available. The security incident manager
must establish evidence beyond reasonable doubt that a reportable event has occurred to begin execution of
the Customer Incident Notification Process.
Microsoft verifies that customer and business risk is successfully contained, and that corrective measures are
implemented. If necessary, emergency mitigation steps to resolve immediate security risks associated with the
event are taken.
Microsoft also completes an internal post-mortem for data breaches. As a part of this exercise, sufficiency of
response and operating procedures are evaluated, and any updates that may be necessary to the Security
Incident Response SOP or related processes are identified and implemented. Internal postmortems for data
breaches are highly confidential records not available to customers. Postmortems may, however, be summarized
and included in other customer event notifications. These reports are provided to external auditors for review as
part of Azure's routine audit cycle.
Customer notification
Microsoft notifies impacted customers and regulatory authorities of data breaches as required. Microsoft relies
on heavy internal compartmentalization in the operation of Azure. Data flow logs are also robust. As a benefit of
this design, most incidents can be scoped to specific customers. The goal is to provide impacted customers with
an accurate, actionable, and timely notice when their data has been breached.
After the declaration of a CRSPI, the notification process takes place as expeditiously as possible while still
considering the security risks of moving quickly. Generally, the process of drafting notifications occurs as the
incident investigation is ongoing. Customer notices are delivered in no more than 72 hours from the time we
declared a breach except in the following circumstances:
Microsoft believes that the act of performing a notification increases the risk to other customers. For
example, the act of notifying may tip off an adversary causing an inability to remediate.
Other unusual or extreme circumstances vetted by Microsoft's legal department and the Executive Incident
Manager.
The 72-hour timeline may leave some incident details available. These details are provided to customers and
regulatory authorities as the investigation proceeds.
Microsoft provides impacted customers with detailed information enabling them to perform internal
investigations and assisting them in meeting end-user commitments, while not unduly delaying the notification
process.
Notification of a personal data breach will be delivered to the impacted customer by any means Microsoft
selects, including via email. Notification of a data breach will be delivered to the list of security contacts provided
in Azure Security Center, which can be configured by following the implementation guidelines. If contact
information is not provided in Azure Security Center, the notification is sent to one or more administrators in an
Azure subscription. To ensure that notification can be successfully delivered, it is the customer's responsibility to
ensure that the administrative contact information on each applicable subscription and online services portal is
correct.
The Microsoft Azure or Azure Government team may also elect to notify other Microsoft personnel such as
members of Microsoft's Customer Support Service (CSS) team and the customer's Account Manager(s) (AM) or
Technical Account Manager(s) (TAM). These individuals often have close relationships with the customer and can
facilitate faster remediation
Learn more
Microsoft Trust Center
Microsoft Support and Professional Services and
Breach Notification Under the GDPR
11/30/2020 • 7 minutes to read • Edit Online
Microsoft Support and Professional Services take its obligations under the General Data Protection Regulation
(GDPR) seriously.
Microsoft Professional Services includes a diverse group of technical architects, engineers, consultants, and
support professionals dedicated to delivering on the Microsoft mission of empowering customers to do more
and achieve more. Our Professional Services team includes more than 21,000+ total consultants, Digital
Advisors, Premier Support, engineers, and sales professionals working across 191 countries, supporting 46
different languages, managing several million engagements per month, and engaging in customer and partner
interactions through on-premise, phone, web, community, and automated tools. The organization brings broad
expertise across the Microsoft portfolio, leveraging an extensive network of partners, technical communities,
tools, diagnostics, and channels that connect us with our enterprise customers.
The drive for Microsoft Professional Services' global data protection incident response team is to (a) employ
rigorous operations and processes to prevent data protection incidents from occurring, (b) manage them
professionally and efficiently when they do occur, and (c) learn from these data protection incidents through
regular post-mortem and program improvements. Microsoft's Professional Services data protection incident
response team's processes and results are reviewed and attested to by multiple security and compliance audits
(for example, ISO/IEC 27001).
As a data processor, Office 365 will ensure that our customers are able to meet the GDPR's breach notification
requirements as data controllers. To that end, we are committed to the following actions:
Providing customers with an ability to specify a dedicated privacy contact who will be notified in the event of
a breach. Customers can specify this contact using the Privacy reader role settings for Message Center.
Notifying customers of a personal data breach within 72 hours of a breach being declared. Notifications will
be published to the Message Center, which is accessible through the Microsoft 365 admin center. Secondarily,
email notifications are sent to specified contacts indicating a new Message Center post has been published.
Initial notification will include, at the least, a description of the nature of the breach, approximation of user
impact, and mitigation steps (if applicable). If our investigation is not complete at the time of initial
notification, we will indicate next steps and timelines for subsequent communication in our initial notification
Microsoft recognizes that data controllers are responsible for conducting risk assessments and determining
whether a breach requires notification of the customer's DPA, and our notification to customers will provide the
information needed to make that assessment. Microsoft will therefore notify customers of any personal data
breach, except for those cases where personal data is confirmed to be unintelligible (for example, encrypted data
where integrity of the keys is confirmed).
Contacting Microsoft
In some scenarios, a customer may become aware of a breach and may wish to notify Microsoft. The current
protocol is for customers to notify Microsoft Support, which will then interface with engineering teams for more
information. In this scenario, Microsoft engineering teams are similarly committed to providing the information
customers need, through their support contact, in a timely fashion.
NOTE
This topic is intended for participants in the data processor service for Windows Enterprise preview program and requires
acceptance of specific terms of use. To learn more about the program and agree to the terms of use, see
https://aka.ms/WindowsEnterprisePublicPreview.
Microsoft data processor service for Windows Enterprise takes its obligations under the General Data Protection
Regulation (GDPR) seriously. Microsoft data processor service for Windows Enterprise takes extensive security
measures to protect against data breaches. These include dedicated threat management teams that proactively
anticipate, prevent, and mitigate malicious access. Internal security measures such as port scanning, perimeter
vulnerability scanning, and intrusion detection detect and prevent malicious access, as well as automated
security processes, comprehensive information security and privacy policies, and security and privacy training
for all personnel.
Security is built into the Microsoft data processor service for Windows Enterprise from the ground up, starting
with the Security Development Lifecycle, a mandatory development process that incorporates privacy-by-design
and privacy-by-default methodologies. The guiding principle of Microsoft's security strategy is to 'assume
breach', which is an extension of the defense-in-depth strategy. By constantly challenging the security
capabilities of the data processor service for Windows Enterprise, Microsoft can stay ahead of emerging threats.
For more information on the data processor service for Windows Enterprise security, please review these
resources the data processor service for Windows Enterprise responds to a potential data breach according to
the security incident response process. The data processor service for Windows Enterprise security incident
response is implemented using a five-stage process: Detect, Assess, Diagnose, Stabilize, and Close. The Security
Incident Response Team may alternate between the diagnose and stabilize stages as the investigation
progresses. An overview of the security incident response process is below:
4: Stabilize and Recover The incident response team creates a recovery plan to
mitigate the issue. Crisis containment steps such as
quarantining impacted systems may occur immediately and
in parallel with diagnosis. Longer term mitigations may be
planned which occur after the immediate risk has passed.
5: Close and Post-mor tem The incident response team creates a post-mortem that
outlines the details of the incident, with the intention to
revise policies, procedures, and processes to prevent a
reoccurrence of the event.
The detection processes used by Microsoft data processor service for Windows Enterprise are designed to
discover events that risk the confidentiality, integrity, and availability of the data processor service for Windows
Enterprise. Several events can trigger an investigation:
Automated system alerts via internal monitoring and alerting frameworks. These alerts could come in the
way of signature-based alarms such as anti-malware, intrusion detection or via algorithms designed to
profile expected activity and alert upon anomalies.
First party reports from Microsoft Services running on Microsoft Azure and Azure Government.
Security vulnerabilities are reported to the Microsoft Security Response Center (MSRC) via
[[email protected]] ([email protected]). MSRC works with partners and security researchers
around the world to help prevent security incidents and to advance Microsoft product security.
Customer reports via the Customer Support Portal or Microsoft Azure and Azure Government Management
Portal, that describe suspicious activity attributed to the Azure infrastructure (as opposed to activity occurring
within the customer's scope of responsibility).
Security Red Team and Blue Team activity. This strategy uses a highly skilled Red Team of offensive Microsoft
security experts to uncover and attack potential weaknesses in Azure. The security response Blue Team must
detect and defend against the Red Team's activity. Both Red and Blue Team actions are used to verify that
Azure security response efforts are effectively managing security incidents. Security Red Team and Blue Team
activities are operated under rules of engagement to help ensure the protection of customer data.
Escalations by operators of Azure Services. Microsoft employees are trained to identify and escalate potential
security issues.
C AT EGO RY DEF IN IT IO N
The Security Response Team works with Microsoft data processor service for Windows Enterprise Security
Engineers and SMEs to classify the event based on factual data from the evidence. A security event may be
classified as:
False Positive : An event that meets detection criteria but is found to be part of a normal business practice
and may need to be filtered. The service team will identify the root cause for false positives and will address
them in a systematic way using detection sources and fine-tuning them as needed.
Security Incident : An incident where unlawful access to any Customer Data or Support Data stored on
Microsoft's equipment or in Microsoft's facilities, or unauthorized access to such equipment or facilities
resulting in loss, disclosure, or alteration of Customer Data or Support Data has occurred.
Customer-Repor table Security Incident (CRSI) : An unlawful or unauthorized access to or use of
Microsoft's systems, equipment, or facilities resulting in disclosure, modification, or loss of customer data.
Privacy Breach : A subtype of Security Incident involving personal data. Handling procedures are no
different than a security incident.
For a CRSI to be declared, Microsoft must determine that unauthorized access to customer data has or has likely
occurred and/or that there is a legal or contractual commitment that notification must occur. It is desired, but not
required, that specific customer impact, resource access, and repair steps be known. An incident is generally
declared a CRSI after the conclusion of the Diagnose stage of a security incident; however, the declaration may
happen at any point that all pertinent information is available. The security incident manager must establish
evidence beyond reasonable doubt that a reportable event has occurred to begin execution of the Customer
Incident Notification Process.
Throughout the investigation, the security response team works closely with global legal advisors to help ensure
that forensics are performed in accordance with legal obligations and commitments to customers. There are
also significant restrictions on system and customer data viewing and handling in various operating
environments. Sensitive or confidential data, and Customer Data, are not transferred out of the production
environment without explicit written approval from the Incident Manager recorded in the corresponding
incident ticket.
Microsoft verifies that customer and business risk is successfully contained, and that corrective measures are
implemented. If necessary, emergency mitigation steps to resolve immediate security risks associated with the
event are taken.
Microsoft also completes an internal post-mortem for data breaches. As a part of this exercise, sufficiency of
response and operating procedures are evaluated, and any updates that may be necessary to the Security
Incident Response SOP or related processes are identified and implemented. Internal postmortems for data
breaches are highly confidential records not available to customers. Postmortems may, however, be summarized
and included in other customer event notifications. These reports are provided to external auditors for review as
part of the data processor service for Windows Enterprise routine audit cycle.
Customer notice
Microsoft data processor service for Windows Enterprise notifies customers and regulatory authorities of data
breaches as required. Microsoft relies on heavy internal compartmentalization in the operation of the data
processor service for Windows Enterprise. Data flow logs are also robust. As a benefit of this design, most
incidents can be scoped to specific customers. The goal is to provide impacted customers with an accurate,
actionable, and timely notice when their data has been breached.
After the declaration of a CRSI, the notification process takes place as expeditiously as possible while still
considering the security risks of moving quickly. Generally, the process of drafting notifications occurs as the
incident investigation is ongoing. Customer notices are delivered in no more than 72 hours from the time we
declared a breach except for the following circumstances:
Microsoft believes the act of performing a notification will increase the risk to other customers. For example,
the act of notifying may tip off an adversary causing an inability to remediate.
Other unusual or extreme circumstances vetted by Microsoft's legal department Corporate External and
Legal Affairs (CELA) and the Executive Incident Manager.
Microsoft data processor service for Windows Enterprise provides customers with detailed information enabling
them to perform internal investigations and assisting them in meeting end-user commitments, while not unduly
delaying the notification process.
Notification of a personal data breach will be delivered to the customer by any means Microsoft selects,
including via email. Notification of a data breach will be delivered to the list of security contacts provided in
Azure Security center, which can be configured by following the implementation guidelines. If contact
information is not provided in Azure Security Center, the notification is sent to one or more administrators in an
Azure subscription. To ensure that notification can be successfully delivered, it is the customer's responsibility to
ensure that the administrative contact information on each applicable subscription and online services portal is
correct.
The data processor service for Windows Enterprise team may also elect to notify additional Microsoft personnel
such as Customer Service (CSS) and the customer's Account Manager(s) (AM) or Technical Account Manager(s)
(TAM). These individuals often have close relationships with the customer and can facilitate faster remediation.
For more information about how Microsoft detects and responds to a breach of personal data, see Data Breach
Notification Under the GDPR in the Service Trust Portal.
Data Protection Impact Assessment for the GDPR
2/5/2021 • 3 minutes to read • Edit Online
The General Data Protection Regulation (GDPR) introduces new rules for organizations that offer goods and
services to people in the European Union (EU), or that collect and analyze data for EU residents no matter where
you or your enterprise are located. Additional details can be found in the GDPR Summary topic. This document
guides you to information regarding Data Protection Impact Assessments (DPIAs) under the GDPR when using
Microsoft products and services.
Terminology
Helpful definitions for GDPR terms used in this document:
Data Controller (Controller): A legal person, public authority, agency or other body which, alone or jointly
with others, determines the purposes and means of the processing of personal data.
Personal data and data subject: Any information relating to an identified or identifiable natural person (data
subject); an identifiable natural person is one who can be identified, directly or indirectly.
Processor: A natural or legal person, public authority, agency, or other body, which processes personal data
on behalf of the controller.
Customer Data: Data produced and stored in the day-to-day operations of running your business.
What is a DPIA?
The GDPR requires controllers to prepare a Data Protection Impact Assessment (DPIA) for operations that are
'likely to result in a high risk to the rights and freedoms of natural persons.' There is nothing inherent in
Microsoft products and services that need the creation of a DPIA. However, because Microsoft products and
services are highly customizable, a DPIA may be needed depending on the details of your Microsoft
configuration. Microsoft has no control over, and little or no insight into such information. You, as a data
controller must determine appropriate uses of their data.
DPIA in Action
The DPIA guidance applies to Office 365, Azure, Dynamics 365, and Microsoft Support and Professional
Services. That guidance includes consideration of:
When is a DPIA needed?
The risk factors listed below should be addressed when considering whether to complete a DPIA. Other potential
factors and further details are found in Part 1 of each of the guidelines.
A systematic and extensive evaluation of data based on automated processing.
Processing on a large scale of special categories of data (data revealing information uniquely identifying a
natural person), or of personal data relating to criminal convictions and offenses.
Systematic monitoring of a publicly accessible area on a large scale.
The GDPR clarifies 'The processing of personal data should not be considered to be on a large scale if the
processing concerns personal data from patients or clients by an individual physician, other health care
professional, or lawyer. In such cases, a data protection impact assessment should not be mandatory.'
What is required to complete a DPIA?
A DPIA should provide specific information about the intended processing, which is detailed in Part 2 of the
guidance. That information includes:
Assessment of the necessity, and proportionality of data processing in relation to the purpose of the DPIA.
Assessment of the risks to the rights and freedoms of natural persons.
Intended measures to address the risks, including safeguards, security measures, and mechanisms to ensure
the protection of personal data and demonstrate compliance with the GDPR.
Purposes of processing
Categories of personal data processed
Data retention
Location and transfers of personal data
Data sharing with third-party subprocessors
Data sharing with independent third-parties
Data subject rights
Additional Considerations
Specific details that may be relevant to your Microsoft implementation are below.
Office 365: This document applies to Office 365 applications and services, including but not limited to
Exchange Online, SharePoint Online, Yammer, Skype for Business, and Power BI. Refer to Tables 1 and 2 for
more details.
Azure: Customers are encouraged to work with their privacy officers and legal counsel to determine the
necessity and content of any DPIAs related to their use of Microsoft Azure.
Dynamics 365: The contents of a DPIA may vary according to which Dynamics 365 tools you are employing.
For specific details refer to Part 2 Contents of a DPIA.
Microsoft Support and Professional Services: Professional Services does not conduct certain routine or
automated data processing, nor is it intended to process special categories or perform tasks that facilitate or
require monitoring of publicly accessible data. For details see Part 1 — Determining Whether a DPIA is
needed. Controllers must consider the DPIA elements outlined above, along with any other relevant factors,
in the context of the controller's specific implementations and uses of Professional Services. For Professional
Services information, see Part 2 — Contents of a DPIA.
Learn more
Microsoft Trust Center
Data Protection Impact Assessments: Guidance for
Data Controllers Using Microsoft Azure
2/9/2021 • 11 minutes to read • Edit Online
Under the General Data Protection Regulation (GDPR), data controllers are required to prepare a Data Protection
Impact Assessment (DPIA) for processing operations that are "likely to result in a high risk to the rights and
freedoms of natural persons." There is nothing inherent in Microsoft Azure itself that would necessarily require
the creation of a DPIA by a data controller using it. Rather, whether a DPIA is required will be dependent on the
details and context of how the data controller deploys, configures, and uses Microsoft Azure.
The purpose of this document is to provide data controllers with information about Microsoft Azure that will
help them to determine whether a DPIA is needed and, if so, what details to include.
NOTE
Microsoft is not providing any legal advice in this document. This document is being provided for informational purposes
only. Customers are encouraged to work with their privacy officers and legal counsel to determine the necessity and
content of any DPIAs related to their use of Microsoft Azure or any other Microsoft online service.
A systematic and extensive evaluation of personal aspects Microsoft Azure does not provide capabilities to perform
relating to natural persons that is based on automated certain automated processing of data.
processing, including profiling and on which decisions are
based that produce legal effects concerning the natural However, because Azure is a highly customizable service, a
person or similarly significantly affect the natural person. data controller could potentially configure it to be used for
such processing. Controllers should make this determination
based on their usage of Azure.
Processing on a large scale of special categories of data Microsoft Azure is not designed to process special categories
(personal data revealing racial or ethnic origin, political of personal data and the usage of Azure does not increase
opinions, religious or philosophical beliefs, or trade union the inherent risk of a controller's processing.
membership, and the processing of genetic data, biometric
data for uniquely identifying a natural person, data However, a data controller could use Microsoft Azure to
concerning health or data concerning a natural person's sex process the enumerated special categories of data. Microsoft
life or sexual orientation), or of personal data relating to Azure is a highly customizable service that enables the
criminal convictions and offenses. customer to track or otherwise process any type of data,
including special categories of personal data. But as the data
processor, Microsoft has no control over such use and has
little or no insight into such use. It is incumbent upon the
data controller to determine appropriate uses of the data
controller's data.
H IGH RISK FA C TO R REL EVA N T IN F O RM AT IO N A B O UT M IC RO SO F T A Z URE
A systematic monitoring of a publicly accessible area on a Microsoft Azure is not designed to conduct or facilitate such
large scale. monitoring.
Categories of personal data processed *Customer Data—All data, including all text, sound, video, or
image files, and software, that is provided to Microsoft by, or
on behalf of, a customer through use of the enterprise
service. Customer Data includes both (1) identifiable
information of end users (for example, user names and
contact information in Azure Active Directory) and customer
content that a customer uploads into or creates in specific
services (for example, customer content in an Azure Storage
account, customer content of an Azure SQL Database, or a
customer's virtual machine image in Azure Virtual Machines).
Data retention Microsoft will retain and process Customer Data during the
Customer's right to use the Online Service and until all
Customer Data is retrieved by Customer or deleted in
accordance with the terms of the OST. During the term of
Customer's subscription, the Customer will have the ability
to access and extract Customer Data stored in each Online
Service. Except for free trials and LinkedIn services, Microsoft
will retain Customer Data stored in the Online Service in a
limited function account for 90 days after expiration or
termination of Customer's subscription so that Customer
may extract the data. After the 90-day retention period
ends, Microsoft will disable Customer's account and delete
the Customer Data. The customer can delete personal data
pursuant to a Data Subject Request using the capabilities
described in the Azure Data Subject Request GDPR
Documentation.
EL EM EN T O F A DP IA REL EVA N T IN F O RM AT IO N A B O UT M IC RO SO F T A Z URE
Location and transfers of personal data Customers have the ability to provision Customer Data at
rest within specified geographic regions, subject to certain
exceptions as set out in the OST. Additional details regarding
service deployments and data residency can also be found in
the Microsoft Data Protection Addendum (DPA) to the
Online Services Terms (OST) and on the Azure Global
Infrastructure webpage.
Data sharing with third-party subprocessors Microsoft shares data with third parties acting as our
subprocessors to support functions such as customer and
technical support, service maintenance, and other
operations. Any subcontractors to which Microsoft transfers
Customer Data, Support Data, or Personal Data will have
entered into written agreements with Microsoft that are no
less protective than the Data Protection Terms of the Online
Services Terms. All third-party subprocessors with which
Customer Data from Microsoft's Core Online Services is
shared are included in the Online Services Subcontractor list.
All third-party subprocessors that may access Support Data
(including Customer Data that customers choose to share
during their support interactions) are included in the
Microsoft Commercial Support Contractors list.
EL EM EN T O F A DP IA REL EVA N T IN F O RM AT IO N A B O UT M IC RO SO F T A Z URE
An assessment of the necessity and proportionality of the Such an assessment will depend on the data controller's
processing operations in relation to the purposes needs and purposes of processing.
An assessment of the risks to the rights and freedoms of The key risks to the rights and freedoms of data subjects
data subjects from the use of Microsoft Azure will be a function of how
and in what context the data controller implements,
configures, and uses Microsoft Azure.
The measures envisaged to address the risks, including Microsoft is committed to helping protect the security of
safeguards, security measures, and mechanisms to ensure Customer Data. The security measures Microsoft takes are
the protection of personal data and to demonstrate described in detail in the OST.
compliance with the GDPR taking into account the rights
and legitimate interests of data subjects and other persons Microsoft complies with strict security standards and
concerned industry-leading data protection methodology. Microsoft is
continually improving its systems to deal with new threats.
More information regarding cloud governance and privacy
practices is available at Trust Center's Cloud Governance &
Privacy page.
Learn more
Microsoft Trust Center
Data Protection Impact Assessments: Guidance for
Data Controllers Using Dynamics 365
2/18/2021 • 13 minutes to read • Edit Online
Under the General Data Protection Regulation (GDPR), data controllers are required to prepare a Data Protection
Impact Assessment (DPIA) for processing operations that are 'likely to result in a high risk to the rights and
freedoms of natural persons.' There is nothing inherent in Dynamics 365 that would necessarily require the
creation of a DPIA by a Data Controller using it. Rather, whether a DPIA is required will be dependent on the
details and context of how the data controller deploys, configures, and uses Dynamics 365
The purpose of this document is to provide data controllers with information about Dynamics 365 that will help
them to determine whether a DPIA is needed and, if so, what details to include.
A systematic and extensive evaluation of personal aspects Dynamics 365 does perform certain automated processing
relating to natural persons, which is based on automated of data, such as lead or opportunity scoring (for example,
processing, including profiling, and on which decisions are predicting how likely a sale is to occur). But it is not designed
based that produce legal effects concerning the natural to perform processing on which decisions are based that
person or similarly significantly affect the natural person; produce legal or similarly significant effects on individuals.
Processing on a large scale 1 of special categories of data Dynamics 365 is not specifically designed to process special
(personal data revealing racial or ethnic origin, political categories of personal data.
opinions, religious or philosophical beliefs, or trade union
membership, and the processing of genetic data, biometric However, a data controller could use Dynamics 365 to
data for the purpose of uniquely identifying a natural process the enumerated special categories of data. For
person, data concerning health, or data concerning a natural instance, Dynamics 365 offers healthcare industry templates
person's sex life or sexual orientation), or of personal data which could be used to process personal data associated
relating to criminal convictions and offenses; with a health condition. Further, Dynamics 365 is a highly
customizable service that enables the customer to track or
otherwise process any type of personal data, including
special categories of personal data. But as the data
processor, Microsoft has no control over such use and
typically would have little or no insight into such use.
RISK FA C TO R REL EVA N T IN F O RM AT IO N A B O UT DY N A M IC S 365
A systematic monitoring of a publicly accessible area on a Dynamics 365 is not designed to conduct or facilitate such
large scale monitoring.
NOTE
1 With respect to the criteria that the processing be on a 'large scale,' Recital 91 of the GDPR clarifies that: 'The processing
of personal data should not be considered to be on a large scale if the processing concerns personal data from patients or
clients by an individual physician, other health care professional, or lawyer. In such cases, a data protection impact
assessment should not be mandatory.'
Categories of personal data processed Customer Data : This is all data, including text, sound,
video, or image files and software, that customers provide to
Microsoft or that is provided on customers' behalf through
their use of Microsoft online services. It includes data that
customers upload for storage or processing, as well as
customizations. Examples of Customer Data processed in
Office 365 include email content in Exchange Online, and
documents or files stored in SharePoint Online or OneDrive
for Business.
Data retention Microsoft will retain Customer Data for the duration of the
customer's right to use the service and until all Customer
Data is deleted or returned in accordance with the
customer's instructions or the terms of the Online Services
Terms. At all times during the term of the customer's
subscription, the customer will have the ability to access and
extract Customer Data stored in the service. Microsoft will
retain Customer Data stored in the Online Service in a
limited function account for 90 days after expiration or
termination of the customer's subscription so that the
customer may extract the data. After the 90-day retention
period ends, Microsoft will disable the customer's account
and delete the Customer Data.
Location and transfers of personal data If Customer provisions its instance of Dynamics 365 Core
Services in Australia, Canada, the European Union, India,
Japan, the United Kingdom, or the United States, Microsoft
will store Customer Data at rest within the specified
geographic area, subject to certain exceptions as set out in
the Online Services Terms. Detailed information about
Customer Data storage can be found in the Trust Center.
An assessment of the necessity and proportionality of the Such an assessment will depend on the controller's needs
processing operations in relation to the purposes and purposes of processing.
An assessment of the risks to the rights and freedoms of The key risks to the rights and freedoms of data subjects
data subjects from the use of Dynamics 365 will be a function of how and
in what context the data controller implements, configures,
and uses it.
Data sharing with third-party subprocessors Microsoft shares data with third parties acting as our
subprocessors to support functions such as customer and
technical support, service maintenance, and other
operations. Any subcontractors to which Microsoft transfers
Customer Data, Support Data or Personal Data will have
entered into written agreements with Microsoft that are no
less protective than the Data Protection Terms of the Online
Services Terms. All third-party subprocessors with which
Customer Data from Microsoft's Core Online Services is
shared are included in the Online Services Subcontractor list.
All third-party subprocessors that may access Support Data
(including Customer Data that customers choose to share
during their support interactions) are included in the
Microsoft Commercial Support Contractors list.
The measures envisaged to address the risks, including Microsoft is committed to helping protect the security of
safeguards, security measures, and mechanisms to ensure Customer's information. In compliance with the provisions of
the protection of personal data and to demonstrate Article 32 of the GDPR, Microsoft has implemented and will
compliance with the GDPR taking into account the rights maintain and follow appropriate technical and organizational
and legitimate interests of data subjects and other persons measures intended to protect Customer Data and Support
concerned Data against accidental, unauthorized, or unlawful access,
disclosure, alteration, loss, or destruction.
Learn more
Microsoft Trust Center
Data Protection Impact Assessments: Guidance for
Data Controllers Using Microsoft Professional
Services
2/18/2021 • 11 minutes to read • Edit Online
A systematic and extensive evaluation of personal aspects Professional Services does perform certain routine or
relating to natural persons, which is based on automated automated processing of data, such as break/fix support (for
processing, including profiling, and on which decisions are example, assisting customers when their computer breaks),
based that produce legal effects concerning the natural account migration, and analysis of system vulnerabilities.
person or similarly significantly affect the natural person; Professional Services solutions, excluding customer
development covered under the note later in this table, are
not intended to perform processing on which decisions are
based that produce legal or similarly significant effects on
individuals.
RISK FA C TO R REL EVA N T IN F O RM AT IO N A B O UT P RO F ESSIO N A L SERVIC ES
Processing on a large scale 1 of special categories of data Professional Services are not intended to be utilized in work
(personal data revealing racial or ethnic origin, political that requires the processing of special categories of personal
opinions, religious or philosophical beliefs, or trade union data, excluding customer development covered under the
membership, and the processing of genetic data, biometric note later in this table.
data for the purpose of uniquely identifying a natural
person, data concerning health, or data concerning a natural However, a data controller could use Professional Services
person's sex life or sexual orientation), or of personal data consulting solutions to process the enumerated special
relating to criminal convictions and offenses; categories of data. For instance, Professional Services offers
healthcare industry database development that could be
used by a data controller to process personal data
associated with a health condition. It is the responsibility of
the controller to assess and either restrict or document this
usage as appropriate.
A systematic monitoring of a publicly accessible area on a Professional Services are not intended to be utilized in work
large scale that requires or facilitates such monitoring, excluding
customer development covered under the note later in this
table.
NOTE
1 With respect to the criteria that the processing be on a “large scale,” Recital 91 of the GDPR clarifies that: “The
processing of personal data should not be considered to be on a large scale if the processing concerns personal data from
patients or clients by an individual physician, other health care professional, or lawyer. In such cases, a data protection
impact assessment should not be mandatory.”
[Custom Development Note] Professional Services offers a wide variety of consulting solutions. A data
controller could potentially request a solution that, in accordance with the above criteria, would be a high-risk
solution. For instance, a data controller may request that Professional Services create a solution to develop a
business intelligence engine for employment decisions or credit applications or a solution that involves user
tracking, specialized use of Artificial Intelligence (AI)/Analytics, or processing of special categories of personal
data.
At the start of an engagement, Professional Services has processes to evaluate and address high-risk solutions it
may be asked to work on. As part of this, Professional Services may require assurances from the data controller
on GDPR compliance (for example, contractual terms), a plan for development of a DPIA, or other criteria (for
example, agreed operating guidelines) as required of a data processor under the GDPR. However, regardless of
Microsoft’s actions it is the responsibility of the data controller to develop the DPIA with input where applicable
from the processor of the customer’s data.
The purpose(s) of processing data using Professional As specified by the Microsoft Professional Services Data
Services is determined by the controller that implements, Protection Addendum (MPSDPA), Microsoft, as a data
configures, and uses it. processor, processes Support and Consulting Data only to
provide the requested services to our customer, the data
controller. Microsoft will not use Support and Consulting
Data or information derived from it for any advertising or
similar commercial purposes.
Categories of personal data processed Support and Consulting data means all data, including all
text, sound, video, image files, or software, that are provided
to Microsoft by, or on behalf of, Customer (or that Customer
authorizes Microsoft to obtain from an Online Service)
through an engagement with Microsoft to obtain
Professional Services or Support. This may include
information collected over phone, chat, e-mail, or web form.
It may include description of problems, files transferred to
Microsoft to resolve support issues, automated
troubleshooters, or by accessing customer systems remotely
with customer permission.
Data retention Microsoft will retain Support and Consulting Data for the
duration of the customer engagement plus a retention
period after the engagement ends as necessary to ensure
quality and continuity of service. As an example, after a
support case is closed the data is normally retained for a
period to ensure the ability to reference it if the issue re-
emerges and the case is reopened.
Location and transfers of personal data Due to the nature of Professional Services, including the
need to provide round-the-clock support, data may be
transferred worldwide. A list of locations Microsoft operates
in is available on request. For consulting services, data may
be held in-country if agreed to within the work order.
Data sharing with third parties Microsoft shares data with third parties acting as our sub-
processors to support functions such as customer and
technical support, service maintenance, and other
operations. Any subcontractors to which Microsoft transfers
Support and Consulting Data will have entered into written
agreements with Microsoft that are no less protective than
the data protection terms of the MPSDPA. All third-party
sub-processors with which Support and Consulting Data is
shared under the MPSDPA are included in the Microsoft
Commercial Support Contractors List.
An assessment of the necessity and proportionality of the Such an assessment will depend on the controller’s needs
processing operations in relation to the purposes and purposes of processing.
An assessment of the risks to the rights and freedoms of The key risks to the rights and freedoms of data subjects
data subjects from the use of Professional Services will be a function of
how and in what context the data controller implements,
configures, and uses the professional services and any
solutions provided by Professional Services.
The measures envisaged to address the risks, including Microsoft is committed to helping protect the security of
safeguards, security measures, and mechanisms to ensure customer information. In compliance with the provisions of
the protection of personal data and to demonstrate Article 32 of the GDPR, Microsoft has implemented and will
compliance with the GDPR taking into account the rights maintain and follow appropriate technical and organizational
and legitimate interests of data subjects and other persons measures intended to protect Support and Consulting Data
concerned. against accidental, unauthorized, or unlawful access,
disclosure, alteration, loss, or destruction.
Learn more
Microsoft Professional Services Trust
Data Protection Impact Assessments: Guidance for
Data Controllers Using Microsoft Office 365
2/18/2021 • 14 minutes to read • Edit Online
Under the General Data Protection Regulation (GDPR), data controllers are required to prepare a Data Protection
Impact Assessment (DPIA) for processing operations that are 'likely to result in a high risk to the rights and
freedoms of natural persons'. There is nothing inherent in Microsoft Office 365 that would necessarily require
the creation of a DPIA by a data controller using it. Rather, whether a DPIA is required will be dependent on the
details and context of how you, as the data controller, deploy, configure, and use Office 365.
Part 1 of this document provides information about Office 365 to help you, as a data controller, determine
whether a DPIA is needed. If the answer is 'yes,' Parts 2 and 3 of this document provide key information from
Microsoft that can help draft it. Specifically, Part 2 provides answers applicable to all Office 365 services for each
of the required elements of a DPIA. Part 3 provides additional product-specific information for a number of the
most relevant information needs of our customers for purposes of drafting their own DPIAs. Part 3 also includes
an illustrative DPIA document that you can download and modify to make drafting DPIAs easier for you.
Office 365 applications and services, include, but are not limited to, Exchange Online, SharePoint Online,
OneDrive for Business, Yammer, and Microsoft Teams. A more complete list of services available through Office
365 can be seen in Tables 1 and 2 of the Office 365 Data Subject Request Guide.
A systematic and extensive evaluation of personal aspects Depending upon the data controller's configuration, Office
relating to natural persons that is based on automated 365 may perform certain automated processing of data,
processing, including profiling, and on which decisions are such as the analysis performed by Workplace Analytics that
based that produce legal effects concerning the natural allows the data controller to derive insights on how people
person or similarly significantly affect the natural person collaborate within an organization based on email and
calendar header information from user's mailboxes.
Processing on a large scale 1 of special categories of data Office 365 is not designed to process special categories of
(personal data revealing racial or ethnic origin, political personal data.
opinions, religious or philosophical beliefs, or trade union
membership, and the processing of genetic data, biometric However, a data controller could use Office 365 to process
data for the purpose of uniquely identifying a natural the enumerated special categories of data. Office 365 is a
person, data concerning health or data concerning a natural highly customizable service that enables the customer to
person's sex life or sexual orientation), or of personal data track or otherwise process any type of personal data,
relating to criminal convictions and offenses including special categories of personal data. Any such use is
relevant to a controller's determination of whether a DPIA is
needed. But as the data processor, Microsoft has no control
over such use and typically would have little or no insight
into such use.
A systematic monitoring of a publicly accessible area on a Office 365 is not designed to conduct or facilitate such
large scale monitoring.
NOTE
1 With respect to the criteria that the processing be on a "large scale," Recital 91 of the GDPR clarifies that: "The
processing of personal data should not be considered to be on a large scale if the processing concerns personal data from
patients or clients by an individual physician, other health care professional, or lawyer. In such cases, a data protection
impact assessment should not be mandatory."
Categories of personal data processed Customer Data: This is all data, including text, sound,
video, or image files and software, that customers provide to
Microsoft or that is provided on customers' behalf through
their use of Microsoft online services. It includes data that
customers upload for storage or processing, as well as
customizations. Examples of Customer Data processed in
Office 365 include email content in Exchange Online, and
documents or files stored in SharePoint Online or OneDrive
for Business.
Data retention Customer Data: As set out in the Data Protection Terms in
the Online Services Terms, Microsoft will retain Customer
Data for the duration of the customer's right to use the
service and until all Customer Data is deleted or returned in
accordance with the customer's instructions or the terms of
the Online Services Terms.
Location and transfers of personal data As described in Attachment 1 of the Online Services Terms, if
Customer provisions its instance of Office 365 in Australia,
Canada, the European Union, France, India, Japan, South
Korea, the United Kingdom, or the United States, Microsoft
will store the following Customer Data at rest only within
that location: (1) Exchange Online mailbox content (e-mail
body, calendar entries, and the content of e-mail
attachments), (2) SharePoint Online site content and the files
stored within that site, (3) files uploaded to OneDrive for
Business, and (4) project content uploaded to Project Online.
Data sharing with third-party subprocessors Microsoft shares data with third parties acting as our
subprocessors to support functions such as customer and
technical support, service maintenance, and other
operations. Any subcontractors to which Microsoft transfers
Customer Data, Support Data, or Personal Data will have
entered into written agreements with Microsoft that are no
less protective than the Data Protection Terms of the Online
Services Terms. All third-party subprocessors with which
Customer Data from Microsoft's Core Online Services is
shared are included in the Online Services Subcontractor list.
All third-party subprocessors that may access Support Data
(including Customer Data that customers choose to share
during their support interactions) are included in the
Microsoft Commercial Support Contractors list.
Data sharing with independent third-parties Some Office 365 products include extensibility options that
enable, at the controller's election, sharing of data with
independent third parties. For example, Exchange Online is
an extensible platform that allows third-party add-ins or
connectors to integrate with Outlook and extend Outlook's
feature sets. These third-party providers of add-ins or
connectors act independently of Microsoft, and their add-ins
or connectors must be enabled by the users or enterprise
administrators, who authenticate with their add-in or
connector account.
An assessment of the necessity and proportionality of the Such an assessment will depend on the controller's needs
processing operations in relation to the purposes and purposes of processing.
An assessment of the risks to the rights and freedoms of The key risks to the rights and freedoms of data subjects
data subjects from the use of Office 365 will be a function of how and in
what context the data controller implements, configures, and
uses it.
The measures envisaged to address the risks, including Microsoft is committed to helping protect the security of
safeguards, security measures, and mechanisms to ensure Customer's information. In compliance with the provisions of
the protection of personal data and to demonstrate Article 32 of the GDPR, Microsoft has implemented and will
compliance with the GDPR taking into account the rights maintain and follow appropriate technical and organizational
and legitimate interests of data subjects and other persons measures intended to protect Customer Data and Support
concerned Data against accidental, unauthorized, or unlawful access,
disclosure, alteration, loss, or destruction.
Learn more
Microsoft Trust Center
Data Protection Impact Assessments: Guidance for
Data Controllers Using Microsoft data processor
service for Windows Enterprise
12/7/2020 • 9 minutes to read • Edit Online
NOTE
This topic is intended for participants in the data processor service for Windows Enterprise preview program and requires
acceptance of specific terms of use. To learn more about the program and agree to the terms of use, see
https://aka.ms/WindowsEnterprisePublicPreview.
Under the General Data Protection Regulation (GDPR), data controllers are required to prepare a Data Protection
Impact Assessment (DPIA) for processing operations that are 'likely to result in a high risk to the rights and
freedoms of natural persons'. There is nothing inherent in the data processor service for Windows Enterprise
itself that would necessarily require the creation of a DPIA by a data controller using it. Rather, whether a DPIA is
required will be dependent on the details and context of how the data controller deploys, configures, and uses
the data processor service for Windows Enterprise.
The purpose of this document is to provide data controllers with information about the data processor service
for Windows Enterprise that will help them to determine whether a DPIA is needed and, if so, what details to
include.
NOTE
Microsoft is not providing any legal advice in this document. This document is being provided for informational purposes
only. Customers are encouraged to work with their privacy officers and legal counsel to determine the necessity and
content of any DPIAs related to their use of the data processor service for Windows Enterprise or any other Microsoft
online service.
A systematic and extensive evaluation of personal aspects The data processor service for Windows Enterprise does not
relating to natural persons that is based on automated provide capabilities to perform certain automated processing
processing, including profiling and on which decisions are of data.
based that produce legal effects concerning the natural
person or similarly significantly affect the natural person. However, because other services use the data processor
service for Windows Enterprise as a data source, a data
controller could potentially configure those services to be
used for such processing. Controllers should make this
determination based on their usage of services connected to
the data processor service for Windows Enterprise.
Processing on a large scale of special categories of data The data processor service for Windows Enterprise is not
(personal data revealing racial or ethnic origin, political specifically designed to process special categories of personal
opinions, religious or philosophical beliefs, or trade union data and the usage of the data processor service for
membership, and the processing of genetic data, biometric Windows Enterprise does not increase the inherent risk of a
data for the purpose of uniquely identifying a natural controller's processing.
person, data concerning health or data concerning a natural
person's sex life or sexual orientation), or of personal data However, a data controller could use services connected to
relating to criminal convictions and offenses. the data processor service for Windows Enterprise to
process the enumerated special categories of data. Services
that use the data processor service for Windows Enterprise
as a data source may enable the customer to track or
otherwise process any type of data, including special
categories of personal data. But as the data processor,
Microsoft has no control over such use and has little or no
insight into such use. It is incumbent upon the data
controller to determine appropriate uses of the data
controller's data.
Purpose(s) of processing The purpose(s) of processing diagnostic data using the data
processor service for Windows Enterprise is determined by
the controller that implements, configures, and uses it.
Categories of personal data processed Customer Data - All data, including all text, sound, video,
or image files, and software, that are provided to Microsoft
by, or on behalf of, a customer through use of the enterprise
service. Customer Data includes identifiable information of
end users (for example, user names and contact information
in Azure Active Directory or device information through
Windows Diagnostic Data).
Data retention Microsoft will retain and process Customer Data for the
duration of the Customer's right to use the Online Service
and until all Customer Data is retrieved by Customer or
deleted in accordance with the terms of the OST. At all times
during the term of Customer's subscription, the Customer
will have the ability to export Customer Data stored in the
data processor service for Windows Enterprise. The customer
can delete personal data pursuant to a Data Subject Request
using the capabilities described in the data processor service
for Windows Enterprise Data Subject Request GDPR
Documentation.
Location and transfers of personal data Data processor service for Windows Enterprise customers'
data resides in Microsoft data centers in the United States.
REL EVA N T IN F O RM AT IO N A B O UT DATA P RO C ESSO R
EL EM EN T O F A DP IA SERVIC E F O R W IN DO W S EN T ERP RISE
Data sharing with third parties Microsoft shares data with third parties acting as our
subprocessors (that is, subcontractors which process
personal data) to support functions such as customer and
technical support, service maintenance, and other
operations. Any subcontractors to which Microsoft transfers
Customer Data or Support Data will have entered into
written agreements with Microsoft that are no less
protective than the Data Protection Terms of the Online
Services Terms. All third-party subcontractors with which
Customer Data or Support Data is shared are included in the
Lists of subcontractors (see 'We limit access by
subprocessors').
An assessment of the necessity and proportionality of the Such an assessment will depend on the data controller's
processing operations in relation to the purposes needs and purposes of processing.
An assessment of the risks to the rights and freedoms of The key risks to the rights and freedoms of data subjects
data subjects from the use of the data processor service for Windows
Enterprise will be a function of how and in what context the
controller implements, configures, and uses the data
processor service for Windows Enterprise.
The measures envisaged to address the risks, including Microsoft is committed to helping protect the security of
safeguards, security measures, and mechanisms to ensure Customer Data. The security measures Microsoft takes are
the protection of personal data and to demonstrate described in detail in the OST.
compliance with the GDPR taking into account the rights
and legitimate interests of data subjects and other persons Microsoft takes reasonable and appropriate technical and
concerned organizational measures to safeguard the personal data that
it processes. These measures include, but are not limited to,
internal privacy policies and practices, contractual
commitments, and international and regional standard
certifications. More information is available at Trust Center's
Privacy Standards page.
The General Data Protection Regulation (GDPR) introduces requirements for organizations to protect personal
data and respond appropriately to data subject requests. This series of articles provides recommended
approaches for on-premises workloads:
SharePoint Server
Exchange Server
Skype for Business Server
Project Server
Office Web Apps Server and Office Online Server
On-premises file shares
For more information about the GDPR and how Microsoft can help you, see the Microsoft Trust Center.
Before doing any work with on-premises data, consult with your legal and compliance teams to seek guidance
and to learn about existing classification schemas and approaches to working with personal data. Microsoft
provides recommendations for developing and extending classifications schemas in the Microsoft GDPR Data
Discovery Toolkit at https://aka.ms/gdprpartners. This toolkit also describes approaches for moving on-premises
data to the cloud where you can use more sophisticated data governance capabilities, if this is desired. The
articles in this section provide recommendations for data that is intended to remain on premises.
The following illustration lists recommended capabilities to use across each of these workloads to discover,
classify, protect, and monitor personal data. See the articles in this section for more information.
Illustration description
For accessibility, the following table provides the same examples in the illustration.
W IN DO W S
SERVER F IL E SH A REP O IN T EXC H A N GE SK Y P E F O R
A C T IO N SH A RES SERVER SERVER B USIN ESS P RO JEC T SERVER
Monitor Integrate logs Integrate logs Integrate logs Integrate logs Integrate logs
with SIEM tools with SIEM tools with SIEM tools with SIEM tools with SIEM tools
* Note that protection encrypts the file. Consequently, SharePoint Server can't find the sensitive information
types in protected files.
GDPR for SharePoint Server
2/5/2021 • 9 minutes to read • Edit Online
Applies to:
SharePoint Server 2013
SharePoint Server 2016
SharePoint Server 2019
As part of safeguarding personal information, we recommend the following:
Classify your data, using Azure Information Protection.
Run SharePoint Server in a least-privileged configuration. See Plan for least-privileged administration in
SharePoint Server and Security for SharePoint Server for more information.
Enable BitLocker encryption on your servers.
[In dbo].[LinkStore_<ID>]:
CREATE PROCEDURE proc_MSS_GetQueryTermsForUser
(
@UserName nvarchar(256),
@StartTime datetime
)
AS
BEGIN
SET NOCOUNT ON;
SELECT searchTime, queryString
FROM
dbo.MSSQLogPageImpressionQuery
WITH
(NOLOCK)
WHERE
userName = @UserName AND
searchTime > @StartTime
END
GO
In [dbo].[Search_<ID>]:
CREATE PROCEDURE proc_MSS_GetPersonalFavoriteQueries
(
@UserName nvarchar(256),
@SearchTime datetime
)
AS
BEGIN
SET NOCOUNT ON;
SELECT max(queries.SearchTime) as SearchTime,
max(queries.querystring) as queryString,
max(url.url) as URL
FROM MSSQLogOwner owners WITH(NOLOCK)
JOIN MSSQLogPersonalResults results WITH(NOLOCK) on owners.OwnerId = results.OwnerId
JOIN MSSQLogUrl url WITH(NOLOCK) on results.ClickedUrlId = url.urlId
JOIN MSSQLogPersonalQueries queries WITH(NOLOCK) on results.OwnerId = queries.OwnerId
WHEREqueries.SearchTime > @SearchTime
AND queries.UserName = @UserName
GROUP BY queries.QueryString,url.url
END
GO
In [dbo].[LinksStore_<ID>]:
CREATE PROCEDURE proc_MSS_QLog_Cleanup_Users
(
@LastCleanupTime datetime,
@Days int
)
AS
BEGIN
DECLARE @TooOld datetime
SET @TooOld = DATEADD(day, -@Days, GETUTCDATE())
DECLARE @FromLast datetime
SET @FromLast = DATEADD(day, -@Days, @LastCleanupTime)
BEGIN TRANSACTION
UPDATE MSSQLogPageImpressionQuery
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld
UPDATE MSSQLogO14PageClick
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld
COMMIT TRANSACTION
END
GO
Remove references to a specific user name that's more than X days old
Use the following procedure to remove references to a specific user name from the Links Store query log tables,
where the references are more than @Days old. The procedure only removes references backwards in time until
it reaches the @LastCleanupTime.
In [dbo].[LinksStore_<ID>]:
CREATE PROCEDURE proc_MSS_QLog_Cleanup_Users
(
@UserName nvarchar(256),
@LastCleanupTime datetime,
@Days int
)
AS
BEGIN
DECLARE @TooOld datetime
SET @TooOld = DATEADD(day, -@Days, GETUTCDATE())
DECLARE @FromLast datetime
SET @FromLast = DATEADD(day, -@Days, @LastCleanupTime)
BEGIN TRANSACTION
UPDATE MSSQLogPageImpressionQuery
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld AND userName = @UserName
UPDATE MSSQLogO14PageClick
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld AND userName = @UserName
COMMIT TRANSACTION
END
GO
Remove references to all user names in the query history from a date and up to the past 30 days
$username = "<[email protected]>"
$password = "password"
$url = "<https://site.sharepoint.com>"
$securePassword = ConvertTo-SecureString $Password -AsPlainText -Force
# the path here may need to change if you used e.g. C:Lib.
Add-Type -Path "c:\Program Files\Common Files\microsoft shared\Web Server
Extensions\16ISAPIMicrosoft.SharePoint.Client.dll"
Add-Type -Path "c:\Program Files\Common Files\microsoft shared\Web Server
Extensions\16ISAPIMicrosoft.SharePoint.Client.Runtime.dll"
# Get user
$user = $clientContext.Web.SiteUsers.GetByLoginName("i:0#.f|membership|[email protected]")
# Redact user
$user.Email = "Redacted"
$user.Title = "Redacted"
$user.Update()
$clientContext.Load($user)
$clientContext.ExecuteQuery()
# Get users
$users = $clientContext.Web.SiteUsers
IMPORTANT
Use the Remove-StoreMailbox cmdlet with caution as it results in an unrecoverable loss of data for the target mailbox.
Most Skype for Business Server and Lync Server data is stored in Exchange Server. This includes:
Conversation history
Voicemail notifications and transcriptions
Meeting invites
Use the procedures outlined for GDPR for Exchange Server to find, export, or delete these types of data for
GDPR requests.
Contact lists are stored in the SQL Server database. They can be exported in the following ways:
End users themselves can export the contacts by right clicking the group header and selecting Copy. This
will copy all the contacts in that group into the clipboard, which can then be pasted into any app.
You can use the Export-CsUserData cmdlet to export this data.
Content uploaded into meetings (such as PowerPoint files or handouts) or content generated in a meeting (such
as whiteboard, polls, or Q/A) is stored in the filer. This can also be exported if end users log back into any
meeting that has not expired and download any uploaded content or take screenshots in the case of generated
content.
MeetNow meetings that are not in the Exchange Calendar and Contact List and contact rights (family, co-worker,
etc.) are in the User Database. In Lync Server 2013 and later, you can use the Export-CsUserData cmdlet to
export this data.
GDPR for Project Server
11/30/2020 • 2 minutes to read • Edit Online
Project Server uses custom scripts to export and redact user data in Project Web App. The basic process is:
1. Find the Project Web App sites in your farm.
2. Find the projects in each site that contain the user.
3. Export and review the types of data that you want to review.
4. Redact data as needed.
These steps are covered in detail in the following articles:
Export user data from Project Server
Delete user data from Project Server
Note that Project Server is built on top of SharePoint Server and logs events to the SharePoint ULS logs and
Usage database. See GDPR for SharePoint Server for more information.
GDPR for Office Web Apps Server and Office
Online Server
11/30/2020 • 2 minutes to read • Edit Online
Office Online Server and Office Web Apps Server telemetry data is stored in the form of ULS logs. You can use
ULS Viewer to view ULS logs from your on-premises tenant.
Every log line contains a CorrelationID. Related log lines share the same CorrelationID. Each CorrelationID is tied
to a single SessionID, and one SessionID may be related to many CorrelationIDs. Each SessionID may be related
to a single UserID, although some sessions can be anonymous and therefore not have an associated UserID. In
order to determine what data is associated with a particular user, it is therefore possible to map from a single
UserID to the SessionIDs associated with that user, from those SessionIDs to the associated CorrelationIDs, and
from those CorrelationIDs to all the logs in those correlations. See the below diagram for the relationship
between the different IDs.
Gathering Logs
In order to gather all logs associated with UserID 1, for example, the first step would be to gather all sessions
associated with UserID 1 (i.e. SessionID 1 and SessionID2). The next step would be to gather all correlations
associated with SessionID 1 (i.e. CorrelationIDs 1, 2, and 3) and with SessionID 2 (i.e. CorrelationID 4). Finally,
gather all logs associated with each of the correlations in the list.
1. Launch UlsViewer
2. Open up the uls log corresponding to the intended timeframe; ULS logs are stored in
%PROGRAMDATA%\Microsoft\OfficeWebApps\Data\Logs\ULS
3. Edit | Modify Filter
4. Apply a filter that is:
EventID equals apr3y
Or
EventID equals bp2d6
5. Hashed UserIds will be in the Message of either one of these two events
6. For apr3y, the Message will contain a UserID value and a PUID value
7. For bp2d6, the Message will contain quite a bit of information. The LoggableUserId Value field is the
hashed UserID.
8. Once the hashed UserId is obtained from either of these two tags, the WacSessionId value of that row in
ULSViewer will contain the WacSessionId associated with that user
9. Collect all of the WacSessionId values associated with the user in question
10. Filter for all EventId equals "xmnv", Message equals "UserSessionId=<WacSessionId>" for the first
WacSessionId in the list (replacing the <WacSessionId> part of the filter with your WacSessionId)
11. Collect all values of Correlation that match that WacSessionId
12. Repeat steps 10-11 for all values of WacSessionId in your list for the user in question
13. Filter for all Correlation equals the first Correlation in your list
14. Collect all logs matching that Correlation
15. Repeat steps 13-14 for all values of Correlation in your list for the user in question
Types of Data
Office logs contain a variety of different types of data. The following are examples of the data that ULS logs may
contain:
Error codes for issues encountered during use of the product
Button clicks and other pieces of data about app usage
Performance data about the app and/or particular features within the app
General location information about where the user’s computer is (e.g. country / region, state, and city,
derived from the IP address), but not precise geo location.
Basic metadata about the browser, e.g. browser name and version, and the computer, e.g. OS type and
version
Error messages from the document host (e.g. OneDrive, SharePoint, Exchange)
Information about processes internal to the app, unrelated to any action the user has taken
GDPR for on-premises Windows Server file shares
2/5/2021 • 2 minutes to read • Edit Online
Kaizala : The Kaizala management portal lets you export an organization’s product and service usage data and
then use Excel functionality to filter that data for a specific user. For detailed instructions, see Export or delete a
user's organizational data in Kaizala.
Office Roaming Ser vice : Office Roaming is a service that stores Office-related settings, such as Office theme,
custom dictionary, language settings, developer mode, and auto correct. For instructions on how to export this
data, see Manage GDPR data subject requests with the DSR case tool in the Security & Compliance Center.
Workplace Analytics : The data log export tool provides usage data for those users in your organization who
have permission to run Workplace Analytics reports. Workplace Analytics also computes and stores
pseudonymized data derived from Office 365 data to improve performance. If you would like to make this
pseudonymized data available to a user and need assistance, contact Microsoft Support.
Yammer : The Yammer admin center lets you export a user’s account activity data. When you export the user’s
data, you receive an email message containing the user’s account activity data. You can provide this information
to the user if you choose. For detailed instructions, see Manage GDPR data subject requests in Yammer
Enterprise.
Learn more
Office 365 Data Subject Requests for the GDPR and CCPA
GDPR discovery, protection, and reporting in the
dev/test environment
2/5/2021 • 8 minutes to read • Edit Online
N UM B ER C O UN T RY C O DE IB A N
Note:- This sample data set is derived from publicly available information and is intended to be used for
test purposes only.
3. In a new tab of your browser, type: https:// <YourTenantName>.sharepoint.com
4. Click Documents to open the document library for this site. If you're prompted for a new list experience
tour, click Next until it's finished.
5. Click Upload > Files and select the IBANs.docx you created in step 2.
3. Run the following PowerShell commands and copy the generated GUIDs to an open instance of Notepad
on your computer in the order in which they are listed.
4. On your local computer, open another instance of Notepad and paste in the following content:
<?xml version="1.0" encoding="utf-8"?>
<RulePackage xmlns="https://schemas.microsoft.com/office/2011/mce">
<RulePack id="GUID1">
<Version major="1" minor="0" build="0" revision="0" />
<Publisher id="GUID2" />
<Details defaultLangCode="en">
<LocalizedDetails langcode="en">
<PublisherName>Contoso Ltd.</PublisherName>
<Name>Contoso Rule Package</Name>
<Description>Defines Contoso's custom set of classification rules</Description>
</LocalizedDetails>
</Details>
</RulePack>
<Rules>
<!-- Contoso Customer Number (CCN) -->
<Entity id="GUID3" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_contoso_ccn" />
<Match idRef="Keyword_contoso_ccn" />
<Match idRef="Regex_eu_date" />
</Pattern>
</Entity>
<Regex id="Regex_contoso_ccn">[0-1][0-9][0-9]{3}[A-Za-z][0-9]{4}</Regex>
<Keyword id="Keyword_contoso_ccn">
<Group matchStyle="word">
<Term caseSensitive="false">customer number</Term>
<Term caseSensitive="false">customer no</Term>
<Term caseSensitive="false">customer #</Term>
<Term caseSensitive="false">customer#</Term>
<Term caseSensitive="false">Contoso customer</Term>
</Group>
</Keyword>
<Regex id="Regex_eu_date"> (0?[1-9]|[12][0-9]|3[0-1])[\/-](0?[1-9]|1[0-2]|j\x00e4n(uar)?
|jan(uary|uari|uar|eiro|vier|v)?|ene(ro)?|genn(aio)? |feb(ruary|ruari|rero|braio|ruar|br)?
|f\x00e9vr(ier)?|fev(ereiro)?|mar(zo|o|ch|s)?|m\x00e4rz|maart|apr(ile|il)?|abr(il)?|avril |may(o)?
|magg(io)?|mai|mei|mai(o)?|jun(io|i|e|ho)?|giugno|juin|jul(y|io|i|ho)?|lu(glio)?|juil(let)?
|ag(o|osto)?|aug(ustus|ust)?|ao\x00fbt|sep|sept(ember|iembre|embre)?|sett(embre)?|set(embro)?
|oct(ober|ubre|obre)?|ott(obre)?|okt(ober)?|out(ubro)? |nov(ember|iembre|embre|embro)?|dec(ember)?
|dic(iembre|embre)?|dez(ember|embro)?|d\x00e9c(embre)?)[ \/-](19|20)?[0-9]{2}</Regex>
<LocalizedStrings>
<Resource idRef="GUID3">
<Name default="true" langcode="en-us">Contoso Customer Number (CCN)</Name>
<Description default="true" langcode="en-us">Contoso Customer Number (CCN) that looks for additional
keywords and EU formatted date</Description>
</Resource>
</LocalizedStrings>
</Rules>
</RulePackage>
5. Replace the values of GUID1, GUID2, and GUID3 in the XML text of step 4 with their values from step 3,
and then save the contents on your local computer with the name ContosoCCN.xml.
6. Fill in the path to your ContosoCCN.xml file and run the following commands.
7. From the Security & Compliance tab, click Classifications > Sensitive information types . You should
see the Contoso Customer Number (CCN) in the list.
N UM B ER C O UN T RY C O DE IB A N
Note:- This sample data set is derived from publicly available information and is intended to be used for
test purposes only.
23. You will see that the DLP policy recognized that body of the email contains IBANs and provides you with
the policy tip at the top of the message window.
24. Close the private instance of your browser.
NOTE
This topic is provided "as-is." Information and views expressed in this topic, including URL and other Internet Web site
references, may change without notice. You bear the risk of using it. This topic has been created as a guide and should not
be construed as legal advice. You should consult with your own legal professionals. This topic does not provide you with
any legal rights to any intellectual property in any Microsoft product. You may copy and use this topic for your internal,
reference purposes.
Fast FAQs
What is the CCPA?
The California Consumer Privacy Act (CCPA) is the first comprehensive privacy law in United States. It was signed
into law at the end of June 2018 and provides a variety of privacy rights to California consumers. Businesses
regulated by the CCPA will have a number of obligations to those consumers, including disclosures, General
Data Protection Regulation (GDPR)-like rights for consumers, an “opt-out” for certain data transfers and an “opt-
in” requirement for minors.
Who needs to know about the CCPA?
The CCPA only applies to companies doing business in California, which annually satisfy one or more of the
following: (1) have a gross revenue of more than $25 million, (2) derive 50% or more of its annual revenue from
the sale of consumer personal information, or (3) buys, sells, or shares the personal information of more than
50,000 consumers.
When will the CCPA come into effect?
The CCPA goes into effect on January 1, 2020. However, enforcement by the Attorney General (AG) will not
begin until July 1, 2020.
How will the CCPA affect my company?
Many of the CCPA’s rights afforded to Californians are similar to the rights the GDPR provides, including the
disclosure and consumer requests similar to data subject right (DSR) requests, such as access, deletion, and
portability. As such, customer can look to our existing GDPR solutions to help them with their CCPA compliance.
To begin your CCPA journey, you should focus on five key steps:
Discover : Identify what Personal Information you have and where it resides.
Map : Determine how you are sharing Personal Information with third parties and identify if the third party is
subject to an exception from the CCPA opt-out requirements.
Manage : Govern how the data is used and accessed.
Protect : Establish security controls to prevent, detect, and respond to vulnerabilities and data breaches.
Document : Document a data breach response program and ensure your contracts with applicable third
parties are able to take advantage of the opt-out exceptions.
You need to understand what your organization’s specific obligations are under the CCPA and how you meet
them, though Microsoft is here to help you on your journey.
Comprehensive FAQs
What rights must companies enable under the CCPA?
The CCPA requires regulated businesses that collect, use, transfer, and sell personal information to, among other
things:
Provide disclosures to consumers, prior to collection, regarding the categories and purposes of collection.
Provide detailed disclosures in a privacy policy regarding the sources, business purposes, and categories of
personal information that is collected, including how those categories are sold or transferred to other
entities.
Enable Consumer rights relating to access, deletion, and portability of the specific pieces of personal
information that has been collected by you.
Enable a control that will permit consumers to opt out of the “sale” of the consumer’s data. However, certain
transfers, like transfers to service providers, remain permitted.
For minors, under 16, enable an opt-in process so that no sale of the minor’s personal information can occur
without actively opting in to the sale.
Ensure that consumers are not discriminated against for exercising any of their rights under CCPA.
What are the CCPA required disclosures?
The CCPA requires disclosure of the following:
Categories of personal information of the consumer that have been collected.
Categories of sources used in collection.
The business or commercial purposes for collecting.
The categories of third parties with whom the personal information is “shared”.
Categories of personal information that has been “sold” and the categories of “third parties” to whom each
category of personal information was sold.
Categories of personal information that has been “disclosed for a business purpose” (that is, transferred but
not a “sale”) and the categories of “third parties” to whom each category of personal information was
transferred.
The specific pieces of personal information that has been collected about that consumer.
How is data “sold” under the CCPA?
The definition of “sell” in the CCPA is incredibly broad, including “making personal information available to” a
third party for monetary or other valuable consideration. Where a consumer has elected to “opt-out”, the
business will be required to turn off the flow of personal information to any third party.
The CCPA does provide a number of carve-outs to this “sale” opt-out control. The three primary carve-outs are
transfers (i) to a Service Provider, (ii) to an “exempted entity” or “contractor”, and (iii) at the direction of the
consumer. Even if a consumer has elected to “opt-out”, personal information can continue to transfer to third
parties who fit into those carve-outs.
To take advantage of the first two exemptions, businesses will have to ensure that the transfers are governed by
written contracts containing the specific terms required by the CCPA.
What do Businesses and Ser vice Providers mean in the context of CCPA?
In the context of CCPA, Businesses are individuals or entities that determine the purposes and means of the
processing of consumer’s personal data, and Service Providers are individuals or entities that process
information on behalf of a business. These are broadly synonymous with the terms Controllers and Processors
used in GDPR.
How much can companies be fined for noncompliance?
The private right of action in the CCPA is limited to data breaches. Under the private right of action, damages can
come in between $100 and $750 per incident per consumer. The California AG also can enforce the CCPA in its
entirety with the ability to levy a civil penalty of not more than $2,500 per violation or $7,500 per intentional
violation.
What is Microsoft doing to achieve CCPA compliance?
As Microsoft has implemented GDPR-related DSRs globally, we are currently in an excellent position to meet the
related CCPA requirements. We have also reviewed our third-party data sharing agreements and taken steps to
establish that the necessary contractual terms are in place to ensure that we do not “sell” personal information.
What are some tools that can help my organization to star t preparing for CCPA?
Start leveraging the GDPR assessment in Compliance Manager as part of your CCPA privacy program.
Establish a process to efficiently respond to Consumer Requests.
Set up label and policies to discover, classify & label, and protect sensitive data with Microsoft Information
Protection.
Use email encryption capabilities to further control sensitive information.
Learn more in this blog post.
What are the differences between GDPR and CCPA?
There are many differences. It’s easier to focus on the similarities, including:
Transparency/disclosure obligations.
Consumer rights to access, delete, and receive a copy of data.
Definition of “service providers” that is similar to how GDPR defines “processors” with a similar contractual
obligation.
Definition of “businesses” that encompasses the GDPR definition of “controllers”.
The biggest difference in CCPA is the core requirement to enable an opt-out from sales of data to third parties
(with “sale” broadly defined to include sharing of data for valuable consideration). This is a narrower and more
specific obligation than the broad GDPR right to object to processing, which encompasses this type of “sale,” but
is not specifically limited to covering this type of sharing.
What are Processors and Controllers ?
A controller is a natural or legal person, public authority, agency or other body which, alone or jointly with
others, determines the purposes and means of the processing of personal data. A processor is a natural or legal
person, public authority, agency, or other body that processes personal data on behalf of the controller.
What specifically is deemed personal information?
Personal information is any information relating to an identified or identifiable person. There is no distinction
between a person’s private, public, or work roles. The defined term “personal information” roughly lines up with
“personal data” under GDPR. However, CCPA also includes family and household data.
Examples of personal data include:
Identity
Name
Home address
Work address
Telephone number
Mobile number
Email address
Passport number
National ID card
Social Security Number (or equivalent)
Driver's license
Physical, physiological, or genetic information
Medical information
Cultural identity
Finance
Bank details / account numbers
Tax file number
Credit/Debit card numbers
Social media posts
Online Artifacts
Social media posts
IP address (EU region)
Location / GPS data
Cookies
How does the CCPA apply to children?
CCPA introduces parental consent obligations consistent with The Children's Online Privacy Protection Act
(COPPA) for children under the age of 13.
For children between 13 and 16 years old, CCPA imposes a new obligation to obtain opt-in consent from the
child for any “sale” of their personal information.
What about personal data from my employees?
In October 2019, a number of amendments were passed to the CCPA. One amendment clarified that the CCPA
obligations do not apply to the personal information of employees of the business. However, legislators put a
one-year sunset on that exemption. We expect California to legislate a new data protection law for employees in
2020.
As a Microsoft customer, do I need to implement the opt-out control for transfers to Microsoft?
No. As a provider of online services, we are taking steps to ensure that we qualify as a “Service Provider” under
CCPA. As noted above, transfers of personal information to service providers are permitted, even where a
consumer has opted out.