Data management at Microsoft
How we manage and protect customer data
Who can access your data and on what terms
Microsoft business cloud services take strong measures to help protect your customer data from inappropriate access or use by unauthorized persons. This includes restricting access by Microsoft personnel and subcontractors, and carefully defining requirements for responding to government requests for customer data. However, you can access your own customer data at any time and for any reason.
The information on this page applies to Windows Defender Advanced Threat Protection but does not apply to other Windows services and to Bing Search Services.
During the term of your subscription to Microsoft business services, you can access and extract your customer data. Customers of Azure, Dynamics 365, Intune, and Office 365 in-scope services can retrieve a copy of their customer data at any time and for any reason without the need to notify Microsoft or ask for assistance. Also, you can take your customer data with you if you end your subscription.
We take strong measures to help protect customer data from inappropriate access or use by unauthorized persons, either external or internal, and to prevent customers from gaining access to one another’s data.
- The operational processes that govern access to customer data in Microsoft business cloud services are protected by strong controls and authentication, which fall into two categories: physical and logical.
- Access to physical datacenter facilities is guarded by outer and inner perimeters with increasing security at each level, including perimeter fencing, security officers, locked server racks, multifactor access control, integrated alarm systems, and around-the-clock video surveillance by the operations center.
- Virtual access to customer data is restricted based on business need by role-based access control, multifactor authentication, minimizing standing access to production data, and other controls. Access to customer data is also strictly logged, and both Microsoft and third parties perform regular audits (as well as sample audits) to attest that any access is appropriate.
In addition, Microsoft uses encryption to safeguard customer data and help you maintain control over it. When data moves over a network—between user devices and Microsoft datacenters or within datacenters themselves—Microsoft products and services use industry-standard secure transport protocols. To help protect data at rest, Microsoft offers a range of built-in encryption capabilities.
- Most Microsoft business cloud services are multitenant services, meaning that your data, deployments, and virtual machines may be stored on the same physical hardware as that of other customers. Microsoft uses logical isolation to segregate storage and processing for different customers through specialized technology engineered to help ensure that your customer data is not combined with anyone else’s.
- Business cloud services with audited certifications such as ISO 27001 are regularly verified by Microsoft and accredited audit firms, which perform sample audits to attest that access is only for legitimate business purposes.
Microsoft operations and support personnel are located around the globe to help ensure that appropriate personnel are available 24 hours a day, 365 days a year. We have automated a majority of our service operations so that only a small set requires human interaction.
- Microsoft engineers do not have default access to cloud customer data. Instead, they are granted access, under management oversight, only when necessary.
- Microsoft personnel will use customer data only for purposes compatible with providing you the contracted services, such as troubleshooting and improving features, such as protection from malware.
Microsoft’s enterprise online services process various categories of data, including customer data and personal data. Where Microsoft hires a subcontractor to perform work that may require access to such data, they are considered a subprocessor. Microsoft discloses these subprocessors below.
Many of the subprocessors provide contract staff that work alongside Microsoft employees to help deliver the online services. In such cases, the data is processed solely in Microsoft facilities, on Microsoft systems, and always subject to Microsoft policies and supervision.
Subprocessors may access data only to deliver the online services Microsoft has hired them to provide and are prohibited from using data for any other purpose. They are required to maintain the confidentiality of this data and are contractually obligated to meet strict privacy requirements that are equivalent to or stronger than the contractual commitments Microsoft makes to its customers. Subprocessors are also required to meet EU General Data Protection Regulation requirements, including those related to employing appropriate technical and organizational measures to protect personal data.
Microsoft requires subprocessors to join the Microsoft Supplier Security and Privacy Assurance Program. This program is designed to standardize and strengthen the handling of data, and to ensure supplier business processes and systems are consistent with those of Microsoft.
Subprocessors who handle customer data (including personal data therein) are subject to heightened requirements. Subprocessors of customer data must agree to the EU Model Clauses for services for which Microsoft offers its customers the EU Model Clauses.
Lists of subcontractors
- The Core Online Services Subcontractor List identifies the subprocessors authorized to access customer data (including personal data contained therein) in Microsoft’s Core Online Services, as defined in the Online Services Terms (Appendix A).
- Microsoft Personal Data Subprocessors is a list that covers those subprocessors authorized to process personal data in any form (including pseudonymous data) across all enterprise online services that are not already listed on the Core Online Services Subcontractor List above.
Microsoft publishes the names of any new subprocessors for its Core Online Services at least six months in advance of their authorization to perform services that may involve access to customer data. Microsoft publishes the names of any new subprocessors for personal data at least 14 days in advance of their authorization to perform services that may involve access to such data.
Note: For information about how subprocessors are used when Microsoft provides commercial support or other professional services, including in support of online services, please see the Microsoft Professional Services and suppliers section of the Trust Center.
In the case of government surveillance, Microsoft has taken steps to ensure that there are no “back doors” and no direct or unfettered government access to your data. We impose carefully defined requirements for government and law enforcement requests for customer data.
- We will not disclose data hosted in Microsoft business services to a government agency unless required by law.
- If we are compelled by law to disclose customer data, we will promptly notify the customer and provide a copy of the request, unless we are legally prohibited from doing so.