Microsoft Trust Center
Learn how Microsoft works to secure your data, protect privacy, and comply with global standards.
We take a comprehensive approach to deliver an enterprise-grade communication and collaboration experience.
Now more than ever, people need to know their virtual conversations are private and secure. At Microsoft, privacy and security are never an afterthought. It’s our commitment to you—not only during this challenging time, but always. Here’s how we’re working to earn your trust every day with Microsoft Teams.
Our approach to privacy is grounded in our commitment to giving you transparency over the collection, use, and distribution of your data.
Your data is protected from malware in attachments, accidental sharing via chat or files, and suspicious user activity. Information is secure with encryption, Multi-Factor Authentication, and device management.
Administrators control what happens with business data. Easily address conflicts of interest, harassment, and legal inquiries with capabilities like information barriers, communication compliance, e-discovery, and legal hold.
Microsoft Teams is designed with IT in mind, providing management capabilities for collaboration, messaging, meetings, calling and apps in one place with simple administration.
Decide who from outside your organization can join your meetings directly, and who should wait in the lobby for someone to let them in. PSTN callers will join via lobby. Meeting organizers can also remove participants during the meeting. Learn more
All recordings of meetings are accompanied by a notice that a recording is taking place. The notice also links to the privacy notice for online participants, and the meeting organizer controls which attendees have permission to record. Learn more
Channel owners can moderate a channel conversation and control who is and isn’t allowed to share content in channel conversations. This helps ensure only appropriate content is viewed by others. Learn more
Require users to provide additional forms of verification to prove their identity, helping protect their accounts from attacks that take advantage of weak or stolen passwords. Learn more
Manage devices and apps and enforce conditional access on any device. Learn more
This provides an authenticated connection to another organization, enabling collaboration between organizations. Learn more
Prevent sensitive information from accidentally being shared with others. Learn more
Protect users from malicious software hidden in files, including files stored in OneDrive or SharePoint. Learn more
Control communication between users and groups in Teams to protect business information in cases of conflict of interest or policy. Learn more
Manage content in the organization by deleting or preserving information to meet organizational policies, industry regulations, and legal requirements. Learn more
Data in Teams resides in Microsoft’s secure network of data centers to help you meet compliance requirements. Learn more
Meet organizational requirements with org-wide settings and tailor experiences to your users with policies for teams, messaging, meetings, calling, and more. Learn more
A meeting organizer can define roles in a meeting that designate “presenters” and “attendees,” and control which meeting participants are allowed to present content in the meeting. Learn more
Access to the recording is limited to people on the call, or those invited to the meeting, unless the meeting organizer authorizes others to access it. Recordings are uploaded to Microsoft Stream and may be shared and downloaded according to permissions enabled by account administrators. Learn more
This enables organizations to foster a culture of inclusion and safety by identifying and preventing negative behaviors like bullying and harassment. Learn more
Set risk-based policies for access specific to user context, device health, location, and more. Learn more
Allows users to collaborate with individuals outside the organization while still controlling their access to organizational data. Learn more
Teams encrypts data in transit and at rest and uses Secure Real-time Transport Protocol (SRTP) for video, audio, files, chat, and desktop sharing. Learn more
Regulate who can access a team by controlling the privacy and guest settings. Learn more
Identify and mitigate suspicious or malicious activity, including the large-scale deletion of teams or addition of unauthorized users. Learn more
Easily identify, hold, and manage information that may be relevant in legal cases. Learn more
Access your data any time, for any reason. It’s never used for advertising and is deleted after the termination or expiration of your subscription. Learn more
Access reports from the Transparency Hub, detailing how we have responded to requests for data. Learn more
Confidently manage apps with detailed information of all apps available in your tenant and the ability to streamline the process of testing and distributing line-of-business applications. Learn more