Vista privacy issues




















Parents, Teachers, and Staff, We have received credible notification from the Vista Sheriff Detectives that there was an attempted kidnapping of a middle school student yesterday after school. An 8th grade student was approached and grabbed by two men in a white van at W.

This location was near a school bus stop. The student was successful in evading the attempted kidnapping. The student is safe now. Copyright Scripps Media, Inc. We encourage you to periodically review this statement to be informed of how Microsoft is protecting your information.

Microsoft welcomes your comments regarding this privacy statement. If you have questions about this statement or believe that we have not adhered to it, please contact us by using our web form. Program Properties — Compatibility Tab.

Windows Anytime Upgrade. Windows Collaboration Technologies. Windows Terminal Services Client. Windows Time Service. Note that this page is a supplement to the Windows Vista Privacy Statement. In order to understand the data collection and use practices relevant for a particular feature, site, or service, you should read the Windows Vista Privacy Statement and any applicable supplement.

Activation is aimed at reducing software counterfeiting, thereby helping to ensure that Microsoft customers receive the software quality that they expect. Once your software is activated, a specific product key becomes associated with the computer the hardware on which your software is installed. This association prevents the product key from being used to activate the same copy of the software on multiple computers as counterfeit software.

Some changes to your computer components or the software may require you to reactivate the software. During activation of this software, product key information is sent to Microsoft along with a hardware hash, which is a non-unique number generated from the computer's hardware configuration.

The hardware hash does not represent any personal information or information about the software. The hardware hash cannot be used to determine the make or model of the computer and it cannot be backward calculated to determine any additional information about your computer.

Along with standard computer information, some additional language settings are collected. Microsoft uses the information to confirm that you have a licensed copy of the software, and then it is aggregated for statistical analysis.

Microsoft does not use the information to identify you or contact you. Activation is mandatory and must be completed within a predefined grace period. If you choose not to activate the software, you cannot use it after the grace period expires. If the software is not correctly licensed, you will not be able to activate it. Auditing allows an administrator to configure Windows to record operating system activity in a security log, which can be accessed using the Event Viewer and other programs.

This log can help an administrator detect unauthorized access to the computer or resources on the computer, and to troubleshoot problems. Administrators determine what information is collected, how long it is retained, and whether it is transmitted to other parties.

The information can include personal information, such as user names or file names. For more information, contact your administrator. Administrators also determine how the audit information is used.

Generally, the security log is used by auditors and administrators to track computer activity or to identify unauthorized access to the computer or resources on the computer. Administrators determine whether this feature is enabled and how users are notified.

The security log cannot be viewed by other users unless specifically permitted by an administrator. Should your computer be lost or stolen, BitLocker protects your data by helping to prevent offline software attacks. Turning on BitLocker encrypts the hard drive where Windows is installed, including all information that is stored on that drive. When BitLocker is turned on, cryptographic keys in memory continually encrypt and decrypt data as it is read from or written to the protected hard drive.

During BitLocker setup, you can choose to print a recovery password or to save it to a USB flash drive or location on your network. In an enterprise environment, administrators can automatically save recovery information to Active Directory Domain Services. BitLocker associates one or more globally unique identifiers GUIDs with each protected hard drive to help manage each drive. On TPM-equipped computers, you can also set up a personal identification number PIN to add an extra layer of protection for your encrypted data.

BitLocker recovery information allows you to access your protected data in case of hardware failures and other problems. This recovery information allows BitLocker to distinguish between authorized and unauthorized users. Information collected by BitLocker is not sent to Microsoft. BitLocker is not turned on by default. Information is collected about the certificates that you use, or that are used by the operating system and applications installed on your computer.

Once this feature is enabled, the information is collected in an event log and can be viewed using Event Viewer. Administrators can use the information to identify and troubleshoot certificate trust issues.

Administrators can also export the information to a file, for example, that can be sent to technical experts, such as Microsoft Premier Support, for analysis. No information is automatically sent to Microsoft. The Crypto API Diagnostics feature is turned off by default, and it can be turned on or off only by an administrator. Unless you are experiencing a problem with certificates, you might not want to turn on this feature, which can decrease the performance of your computer.

Administrators can configure Crypto API Diagnostics to log different parts of the certificate trust process, and they can determine the amount of information collected. If you choose to participate, basic information about your computer and how you use Windows Vista is collected in CEIP reports. Some limited information about the software you run on Windows Vista might also be collected to help improve how our products interact with that software.

These reports are sent to Microsoft, where we use them to help improve the features our customers use most often and to create solutions to common problems. Configuration , such as how many processors are in your computer, the number of network connections in use, screen resolutions for display devices, and which version of Windows is running. Reports can also include configuration information, such as the strength of the signal between your computer and a wireless or Bluetooth enabled device, and if some features such as high-speed USB connections are turned on.

Performance and reliability , such as how quickly a program responds when you click a button, how many problems you experience with a program or a device, and how quickly information is sent or received over a network connection.

Program use , such as the features that you use the most often, how often you use Windows Help and Support, and how many folders you typically create on your desktop. CEIP reports also contain information about events event log data on your computer from up to seven days prior to the time you decide to participate in CEIP. Since most users decide to participate in CEIP within several days of setting up Windows, Microsoft uses this information to analyze and improve the Windows Vista setup experience.

This information is sent to Microsoft when you are connected to the Internet. CEIP reports do not contain personal information, such as your name, address, or phone number; however, some reports may unintentionally contain individual identifiers, such as a serial number for a device that is connected to your computer. Microsoft filters the information contained in CEIP reports to try to remove any individual identifiers that they might contain. To the extent that individual identifiers are received, Microsoft does not use them to identify you or contact you.

The GUID is a randomly generated number that does not contain personal information. Microsoft uses CEIP information to improve our software.

We use the GUID to distinguish how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem one hundred times and other customers experiencing the same problem once.

Microsoft does not use the information collected by CEIP reports to identify you or contact you. This feature is turned off by default. If you choose to participate, CEIP will collect the information described above for all users on your computer. For more information, see these frequently asked questions about the Microsoft Customer Experience Program online at the Microsoft website. Device Manager helps you install the latest drivers for your hardware devices. Using the Update Driver Software Wizard, you can update device drivers for hardware installed on your computer, modify hardware settings, and troubleshoot device and driver problems.

To determine which updates apply to your hardware, configuration information is collected from your computer and sent to Microsoft. To learn more about the information collected by Windows Update and how it is used, see the Windows Update Privacy Statement online at the Microsoft website. The information collected is used to determine which updates apply to your computer hardware and to devices that you've installed. Microsoft does not use the information collected about your computer configuration to identify you or contact you.

Device Manager is enabled by default, and cannot be disabled. However, Device Manager will only send configuration information to Microsoft and download updated drivers when you open the Update Driver Software Wizard and choose to update your driver software.

Dial-up Networking allows you to access the Internet using a dial-up modem and a broadband technology, such as a cable modem and digital subscriber line DSL. RAS is a component that connects a client computer typically your computer to a host computer also known as a remote access server using industry standard protocols.

VPN technologies allow users to connect to a private network, such as a corporate network, over the Internet. The dialer component collects information from your computer, such as user names, passwords, domain names, and phone numbers. This information is sent to the system to which you are attempting to connect.

The information is not sent to Microsoft. Security-related information, such as user names and passwords, is stored in an encrypted format on your computer. The Connection Manager Administration Kit CMAK is a server component that allows administrators to build a user interface and collect information from users.

Administrators determine which information is collected. Dialer information is used to make connections to the Internet. For CMAK, the information is used to create connection profiles, which help administrators deploy and manage connections across a network. For non-command line dialers, you can choose to save your password. This option is turned off by default, so you are prompted to provide your password to connect to the Internet or a network until the option is turned on and you choose to save your password.

For command line dialers like Rasdial, there is no option to save your password. Driver Protection helps prevent the operating system from starting drivers that are known to cause stability problems.

These drivers are listed in a Driver Protection List database that is stored on your computer. Driver Protection checks this database while the operating system is running. These checks are performed to determine whether to start a driver.

For more information, see the Driver Protection List article online at the Microsoft website. Updated versions of required drivers are downloaded to your computer if you've enabled Windows Update.

To learn more about the information collected by Windows Update and how it is used, see the Windows Update Privacy Statement. Administrators can also distribute updated versions of required drivers to computers on a network. Windows notifies you if a driver that is listed in the Driver Protection List starts. If you click the notification, Windows will ask if you want to report the problem to Microsoft so you can check for solutions or for more information. If you don't click the notification, Windows will automatically create a report and, depending on your problem reporting settings, ask you to send it later.

To view or change your problem reporting settings, or to manually send reports at any time, use the options provided in Problem Reports and Solutions in Control Panel. If a driver is listed in the Driver Protection List during Windows setup, you will be notified before the operating system finishes installing. You can cancel setup and find an alternate driver solution before installing the operating system, or you can continue the setup process and install an alternate driver later.

In this case, Windows might disable the driver in order to complete the installation. After the installation is complete and you log on, the operating system will notify you, as described above.

Dynamic Update enables Windows Vista to perform a one-time check with the Microsoft Update website to get the latest updates for your computer while your operating system is being installed. If updates are found, Dynamic Update automatically downloads and installs them so your computer is up to date the first time that you log on or use it.

Installation updates: Important updates for installation files to help ensure a successful installation. In-box driver updates: Important updates for the version of Windows that you are installing. To install compatible drivers, Dynamic Update works with Windows Update to send information to Microsoft about your computer's hardware. Dynamic Update software reports information about your computer's hardware to find compatible drivers. For more information about how information collected by Dynamic Update is used, see the Windows Update Privacy Statement.

The Ease of Access Center enables you to turn on accessibility options and settings that can help you more easily interact with the computer. The information collected is a list of impairments or difficulties that will be used to recommend settings on your computer to make it easier for you to use.

You can provide this information by selecting the appropriate statements from a series. This information is used to provide a set of configuration recommendations to you based on the statements that you chose. This information is saved in a non-human-readable format and stored locally on your computer. This information is not sent to Microsoft and is only available to you and to administrators on your computer, not to other users. You can choose which statements you would like to select, and you can alter your choices at any time.

You can also choose which recommendations you want to configure on your computer. Computer users, primarily administrators, can use Event Viewer to view and manage event logs. Event logs contain information about hardware and software problems and about security events on your computer. For example, application logs contain event information generated by all users and the programs that they use on the computer.

By default, all users can view application log entries; however, administrators can choose to restrict access to Event Viewer logs. You can access the event logs for your computer by opening Event Viewer. To view event details, you can preview the event or view the event properties. Unless you have previously consented to sending event information automatically, clicking the link will display a dialog box asking for your consent to send the information listed in the dialog box over the Internet.

If you consent, the information is sent to a website to see if more information about the event is available, including solutions to problems that are recorded as an event. For events associated with third-party applications, the information will be transmitted to the site specified by the third-party publisher or manufacturer in their provider manifest.

Administrators can use Group Policy to select or change the site to which event information is sent. Event information that is collected and sent to Microsoft when you click the Event Log Online Help link is used to locate and then provide you with additional information about the event. Microsoft does not use this information to contact you or identify you.

If you send information about events to third-party publishers or manufacturers, use of the information will be subject to the third party's privacy practices.

When you click Event Log Online Help, you are asked to confirm that the information presented to you can be sent over the Internet. No event log information will be sent over the Internet unless you consent to send it.

The fax feature allows you to create and save fax cover pages, and to send and receive faxes using your computer and an external or a built-in fax modem or a fax server. The public viewing setting allows all users to see all received faxes in the system. This setting is on by default, but it can be altered by an administrator.

If you send a fax, you are the only one who can see that sent fax; however, users with administrative privileges can manually locate and view all faxed documents on the computer. Information entered in the sender dialog box is presented on the cover page.

Identifiers such as the TSID and CSID might contain arbitrary text and are typically used by the receiving fax machine or computer to identify the sender. No information is sent to Microsoft. By default, fax access is determined by your user account privileges for the computer.

Unless a fax administrator changes access settings, all users can send and receive faxes. All users can view the documents that they send and any fax that is received on the computer. Administrators can see all faxed documents, sent or received, and can configure fax settings, including who has permissions to view or manage faxes. The file association web service helps users associate file types with specific applications.

If you try to open a file type that does not have program associated with it, Windows will ask if you want to use the file association web service to find a program to open the file with. If you choose to use the service, it will send the file type extension to Microsoft. Applications that are typically associated with the file name extension are displayed. If you choose to use the file association service, the file name extension is sent to Microsoft.

Your computer display language is also sent to Microsoft. When you submit a file name extension, the service returns a list of the programs Microsoft is aware of, using your display language, that can open files of that extension. Unless you choose to download and install a program, the associations for the file type are not changed. You choose whether to use the file association web service. No file association information is sent to Microsoft unless you decide to use the service.

Administrators have several options to prevent users from using this service. For more information about administrative options, see the Using Windows Vista: Controlling Communication with the Internet article online at the Microsoft TechNet website.

The Games folder lists all of the games installed on your computer, giving you a single place to view and launch all of your games. The Games folder can also download and provide you with additional information metadata about those games such as box art, publisher information, descriptions, and reviews. The Games folder optionally keeps track of the last time each game was played, to allow you to sort or filter the display of games.

Information about when games were played is stored on your computer and is not sent to Microsoft. To do this, information including the names of game files and shortcuts for the games will be sent to Microsoft.

The information sent to Microsoft is used to retrieve metadata for the games that you've installed. However, the information may be used to generate aggregate statistics. You can turn the metadata collection or the tracking features of the Games folder on or off.

When enabled, metadata will be retrieved each time that you open the Games folder, and the Games folder will track when games were last played. The first time that you open the Games folder, you can choose to retrieve and display game metadata and to track game playing times.

You can disable these features by using the options that are provided in the Games folder. In an enterprise environment, administrators can use Group Policy to disable these features. Automatic learning is a handwriting recognition feature that is available on Tablet PCs. This feature collects data about the words that you use and how you write them.

If you turn on automatic learning, the handwriting recognition software will attempt to recognize and improve its interpretation of your handwriting style and vocabulary. Information collected by automatic learning is stored in the user profile for each user on the Tablet PC. This information is not sent to Microsoft. The data is stored in a proprietary format that cannot be read by using a text viewing program, such as Notepad or WordPad and is only available to you and to administrators on your computer, not to other users.

Text from messages you compose and calendar entries you create by using e-mail programs such as Microsoft Office Outlook or Windows Mail, including any messages that you have already sent. Automatic learning for both your handwriting style and your vocabulary might not be available for all languages in which handwriting personalization is offered. For more information on the type of data that is used for different languages, search Windows Help and Support for the topic "Handwriting personalization on a Tablet PC.

The information collected is used to help improve handwriting recognition by creating a version of the recognition software that's personalized to your own style and vocabulary. The text samples are used to create an extended dictionary. The ink samples are used to help improve character recognition for each user on a Tablet PC. You can turn automatic learning on or off at any time by using the Tablet PC settings in Control Panel.

When you turn off automatic learning, any data that has been collected and stored by automatic learning is deleted. You can send reports to Microsoft about handwriting recognition errors that you encounter while using the Tablet PC Input Panel. A short list of recently corrected handwriting samples is stored in memory. These handwriting samples are not written to your hard drive or sent to Microsoft without your explicit permission.

No personal information is intentionally collected; however the samples you choose to send may include personal information. You can select which recognition errors you would like to report. These reports are used to improve future versions of the Microsoft handwriting recognition software.

You can initiate a report using the Handwriting Recognition Error Reporting Tool; no reports are sent automatically. You can select each handwriting sample to be included in the report and review the report before sending it to Microsoft. The learning feature of IME for Simplified Chinese, Traditional Chinese, and Japanese may record words or word pairs to improve the selection of the ideograms displayed.

The IME learning feature records a word or word pair and their associated scores as a result of user operations. IME does not send the information to Microsoft.

Learning data is used by IME on your system, and may also be referenced by Microsoft Office proofing tools. The learning feature can be disabled by turning off the IME feature.

The learning feature can also be enabled but configured not to write to the user dictionary. You can use word registration to report unsupported words words that might not be converted correctly to ideograms from keyboard input. Word registration reports can include the information you provide in the Add Word dialog box about the words being reported, and the software version number for IME.

Personal information might unintentionally be collected, but Microsoft does not use the information to identify you or contact you. You will have the opportunity to review the data being sent with each report before you choose to send it. Microsoft uses the information to help improve IME. Each time a word registration report is generated, you are asked if you want to send this report to Microsoft. You may view the information contained in the report before choosing whether to send it.

In an enterprise environment, administrators can use Group Policy to configure word registration reporting. Group Policy configuration options include the ability to completely turn off reporting, or to redirect reports to another server.

If you choose to participate in the Installation Improvement Program, the feature sends a single report to Microsoft.

The report contains basic information about your computer and how you installed Windows Vista. We use this information to help improve the installation experience and to create solutions to common installation problems.

The report generally includes information about your installation and setup experience, such as the date of installation, the time it took for each installation phase to complete, whether the installation was an upgrade or a new installation of the product, version details, operating system language, media type, computer configuration, and success or failure status, along with any error codes.

The report is sent to Microsoft when you are connected to the Internet. This report does not contain contact information, such as your name, address, or phone number. A globally unique identifier GUID is generated and sent with the report. The GUID is a randomly generated number that uniquely identifies your computer; it does not contain personal information.

Microsoft uses the report to improve our software installation experience. This GUID enables us to distinguish how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem times and customers experiencing the same problem once.

Microsoft will not use the information in the report to identify you or contact you. Internet printing makes it possible for computers running Windows Vista to use printers located anywhere in the world by sending print jobs using Hypertext Transfer Protocol HTTP.

When you print using this feature, you must first connect and authenticate yourself to an Internet print server. The information that you will need to submit to the print server will vary depending on the level of security that the print server supports for example, you might be asked to provide a user name and password.

Once you are connected, you are presented with a list of available printers. If your machine does not have a print driver for your selected printer, you may choose to download a driver from the print server. If you choose to use a print server hosted by Microsoft, Microsoft does not use the information that you provide to identify you or contact you.

The information collected enables you to print using remote printers. If you send information to third-party print servers, use of the information will be subject to the third party's privacy practices. You can enable or disable Internet printing by using the advanced options for Windows Features in Control Panel. IPv6 helps enable end-to-end connectivity that is often needed by peer-to-peer applications.

Each time you start up your computer, the NAT Traversal service will attempt to locate a public IPv6 Internet service by sending a query over the Internet. No additional information is sent to Microsoft. This query sends standard DNS information to determine if your computer is connected to the Internet and if it can locate a public IPv6 service. Using the netsh command line tool, you can change the query that the service sends over the Internet to use non-Microsoft servers instead, or you can turn off this feature.

This feature collects Internet and intranet network connectivity information such as the Domain Name Service DNS suffix of your computer, forest name, and gateway address of networks that your computer connects to. The Network Awareness feature makes the connectivity information available through an application programming interface API to applications on your computer that might require the information to function properly.

No personal information is intentionally transferred or stored by this feature. Network connectivity profiles are stored in the registry. Network connectivity profiles can include the Network List Service, which provides a history of all networks visited and the date and time of the last connection. The information is not sent to Microsoft, but it is made available to applications on your computer that require network connectivity information.

An administrator can disable them using the options provided in the Services snap-in in Administrative Tools. Disabling them is not recommended because that will prevent some Windows features from functioning correctly. The Online Print Ordering Wizard enables you send digital pictures stored on your computer or network drive to an online photo printing service of your choice. Depending on the service, you can have your pictures printed and then delivered using postal mail, or you can pick up the prints at a local store.

If you decide to place an order with an online photo printing service, your selected digital photos are sent over the Internet to the service that you selected.

The full path locations of the digital pictures that you select are also sent to the service in order to allow the service to display and upload the images. Digital picture files might contain data about the image that was stored with the file by the camera, such as the date and time that the picture was taken.

The files might also contain personal information such as captions that may have been associated with the file through the use of digital picture management applications and Windows Explorer. For more information, see the "Properties" section later in this document. The information stored in the digital picture files by the camera may be used by the online photo printing service during the printing process, for example, to adjust the color or sharpness of the image before it is printed.

Information stored by digital picture management applications may be used by the online photo printing service to print as captions on the front or back of the print copy. You should always consult the privacy statement of the online photo printing service you choose to use to determine how it uses this data.

You can use the Online Print Wizard to choose which pictures to send and which service to use to print your pictures. Some picture management applications might be able to help you remove stored personal information before sending pictures to be printed. You might also be able to edit the properties of the file to remove stored personal information. In a BYOD scenario these security and privacy risks are exaggerated for both the employer and the employee. In most cases, the line between business and personal is not clearly defined, and apps can easily blur that line and put both company and personal data at risk.

The problem is exacerbated by the fact that apps are impulse purchases for many users, thanks to low prices and easy installation. The mobile operating systems have improved in terms notifying users about the permissions an app is requesting and providing the user with more control to allow or block access to specific functions.



0コメント

  • 1000 / 1000