{"id":13343,"date":"2014-03-23T08:22:06","date_gmt":"2014-03-23T08:22:06","guid":{"rendered":"https:\/\/new.igihe.com\/microsoft-has-right-to-break-into-your-email\/"},"modified":"2014-03-23T08:19:40","modified_gmt":"2014-03-23T08:19:40","slug":"microsoft-has-right-to-break-into-your-email","status":"publish","type":"post","link":"https:\/\/new.igihe.com\/english\/microsoft-has-right-to-break-into-your-email\/","title":{"rendered":"Microsoft Has Right to Break into Your email"},"content":{"rendered":"<p>{{Microsoft is defending its right to break into customers&#8217; accounts and read their emails.}}<\/p>\n<p>The company&#8217;s ability &#8212; and willingness &#8212; to take such an approach became apparent this week. <\/p>\n<p>Microsoft admitted in federal court documents that it forced its way into a blogger&#8217;s Hotmail account to track down and stop a potentially catastrophic leak of sensitive software. The company says its decision is justified.<\/p>\n<p>From the company&#8217;s point of view, desperate times call for desperate measures.<\/p>\n<p>&#8220;In this case, we took extraordinary actions based on the specific circumstances,&#8221; said John Frank, one of the company&#8217;s top lawyers, in a blog post Thursday night.<\/p>\n<p>According to an FBI complaint, Microsoft in 2012 discovered that an ex-employee had leaked proprietary software to an anonymous blogger. Fearing that could empower hackers, Microsoft&#8217;s lawyers approved emergency &#8220;content pulls&#8221; of the blogger&#8217;s accounts to track it down. <\/p>\n<p>Company investigators entered the blogger&#8217;s Hotmail account, then pored over emails and instant messages on Windows Live. The internal investigation led to the arrest on Wednesday of Alex Kibkalo, a former Microsoft employee based in Lebanon.<\/p>\n<p>Although the move could be perceived as a breach of trust, Microsoft says it&#8217;s allowed to make such unilateral decisions. It pointed to its terms of service: When you use Microsoft communication products &#8212; Outlook, Hotmail, Windows Live &#8212; you agree to &#8220;this type of review &#8230; in the most exceptional circumstances,&#8221; Frank wrote.<\/p>\n<p>Microsoft&#8217;s legal team thought there was enough evidence suggesting the blogger would try selling the illegally obtained intellectual property. <\/p>\n<p>In such instances, law enforcement agents would typically seek a warrant, but Microsoft said it didn&#8217;t need one. The servers storing the information are on its own property.<\/p>\n<p>Ginger McCall, a director at the Electronic Privacy Information Center, said those actions are deeply troubling, because they show &#8220;Microsoft clearly believes that the users&#8217; personal data belongs to Microsoft, not the users themselves.&#8221;<\/p>\n<p>&#8220;This is part of the broader problem with privacy policies,&#8221; she said. &#8220;There are hidden terms that the users don&#8217;t actually know are there. If the terms were out in the open, people would be horrified by them.&#8221;<\/p>\n<p>Microsoft recognizes that it&#8217;s a sensitive topic, especially as the nation grapples with revelations about the extent of warrantless surveillance on Americans by their own government &#8212; spying that Microsoft and other major tech companies have loudly criticized.<\/p>\n<p>That&#8217;s why Microsoft is instituting a new policy: In the future, it&#8217;ll loop in an outside lawyer who&#8217;s a former federal judge and seek his or her approval.<\/p>\n<p>In a move that might be deemed ironic, Microsoft will now add its own internal searches to its biannual transparency reports on government surveillance.<\/p>\n<p>{agencies}<\/p>\n","protected":false},"excerpt":{"rendered":"<p>{{Microsoft is defending its right to break into customers&#8217; accounts and read their emails.}} The company&#8217;s ability &#8212; and willingness &#8212; to take such an approach became apparent this week. Microsoft admitted in federal court documents that it forced its way into a blogger&#8217;s Hotmail account to track down and stop a potentially catastrophic leak [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2000051135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[75],"byline":[170],"hashtag":[],"class_list":["post-13343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-science-technology","tag-homenews","byline-igihe"],"bylines":[{"id":170,"name":"IGIHE","slug":"igihe","description":"","image":{"id":0,"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&f=y&r=g","alt":"Default avatar","title":"Default avatar","caption":"","mime_type":"image\/jpeg","sizes":[]},"user_id":8}],"contributors":[{"id":170,"name":"IGIHE","slug":"igihe","description":"","image":{"id":0,"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&f=y&r=g","alt":"Default avatar","title":"Default avatar","caption":"","mime_type":"image\/jpeg","sizes":[]},"user_id":8}],"featured_image":{"id":2000051135,"url":"https:\/\/en-images.igihe.com\/IMG\/logo\/arton13343.jpg","alt":"","caption":"","mime_type":"image\/jpeg","width":0,"height":0,"sizes":{"thumbnail":{"url":"https:\/\/en-images.igihe.com\/IMG\/logo\/arton13343.jpg","width":1,"height":1},"medium":{"url":"https:\/\/en-images.igihe.com\/IMG\/logo\/arton13343.jpg","width":1,"height":1},"medium_large":{"url":"https:\/\/en-images.igihe.com\/IMG\/logo\/arton13343.jpg","width":1,"height":1},"large":{"url":"https:\/\/en-images.igihe.com\/IMG\/logo\/arton13343.jpg","width":1,"height":1},"full":{"url":"https:\/\/en-images.igihe.com\/IMG\/logo\/arton13343.jpg","width":0,"height":0}}},"_links":{"self":[{"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/posts\/13343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/comments?post=13343"}],"version-history":[{"count":0,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/posts\/13343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/media\/2000051135"}],"wp:attachment":[{"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/media?parent=13343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/categories?post=13343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/tags?post=13343"},{"taxonomy":"byline","embeddable":true,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/byline?post=13343"},{"taxonomy":"hashtag","embeddable":true,"href":"https:\/\/new.igihe.com\/english\/wp-json\/wp\/v2\/hashtag?post=13343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}