mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 18:33:43 +00:00
review and acrolinx
This commit is contained in:
@ -9,7 +9,7 @@ ms.date: 09/06/2024
|
||||
|
||||
## Privacy dashboard and report
|
||||
|
||||
Customers can use the [Microsoft Privacy dashboard](https://account.microsoft.com/privacy) to view, export, and delete their information, giving them further transparency and control. They can also use the [Microsoft Privacy Report](https://privacy.microsoft.com/privacy-report) to learn more about Windows data collection and how to manage it. For enterprises we provide a guide for Windows Privacy Compliance that includes additional details on the available controls and transparency.
|
||||
Customers can use the [Microsoft Privacy dashboard](https://account.microsoft.com/privacy) to view, export, and delete their information, giving them further transparency and control. They can also use the [Microsoft Privacy Report](https://privacy.microsoft.com/privacy-report) to learn more about Windows data collection and how to manage it. For organizations, we provide a guide for Windows Privacy Compliance that includes more details on the available controls and transparency.
|
||||
|
||||
## Privacy transparency and controls
|
||||
|
||||
@ -17,7 +17,7 @@ Prominent system tray icons show users when resources and apps like microphones
|
||||
|
||||
## Privacy resource usage
|
||||
|
||||
Every Microsoft customer should be able to use our products secure in the knowledge that we will protect their privacy and give them the information and tools they need to easily make privacy decisions with confidence. Accessed in Settings, the new app usage history feature gives users a seven-day history of resource access for Location, Camera, Microphone, Phone Calls, Messaging, Contacts, Pictures, Videos, Music library, Screenshots, and other apps.
|
||||
Every Microsoft customer should be able to use our products secure in the knowledge that we protect their privacy, and give them the information and tools they need to easily make privacy decisions with confidence. From Settings, the app usage history feature provides users with a seven-day history of resource access for Location, Camera, Microphone, Phone Calls, Messaging, Contacts, Pictures, Videos, Music library, Screenshots, and other apps.
|
||||
|
||||
This information helps you determine if an app is behaving as expected so that you can change the app's access to resources as desired.
|
||||
|
||||
|
@ -13,4 +13,4 @@ ms.date: 09/06/2024
|
||||
|
||||
[Privacy: Your data, powering your experiences, controlled by you](https://privacy.microsoft.com/).
|
||||
|
||||
Privacy is becoming top of mind for organizations that want to know who is using their data and why. They also need to know how to control and manage the data that is being collected - so providing transparency and control over this personal data is essential. At Microsoft, we are focused on protecting the privacy and confidentiality of your data and will only use it in a way that is consistent with your expectations.
|
||||
Privacy is becoming top of mind for organizations that want to know who is using their data and why. They also need to know how to control and manage the data that is being collected - so providing transparency and control over this personal data is essential. At Microsoft, we're focused on protecting the privacy and confidentiality of your data and only use it in a way that is consistent with your expectations.
|
||||
|
@ -24,7 +24,6 @@ Windows cryptographic modules provide low-level primitives such as:
|
||||
|
||||
These modules are natively exposed on Windows through the Crypto API (CAPI) and the Cryptography Next Generation API (CNG) which is powered by Microsoft's open-source cryptographic library SymCrypt. Application developers can use these APIs to perform low-level cryptographic operations (BCrypt), key storage operations (NCrypt), protect static data (DPAPI), and securely share secrets (DPAPI-NG).
|
||||
|
||||
|
||||
*With this release we added support for the SHA-3 family of hash functions and SHA-3 derived functions (SHAKE, cSHAKE, and KMAC). These are the latest standardized hash functions by the National Institute of Standards and Technology (NIST) and can be leveraged through the Windows CNG library. Below is a list of the supported SHA-3 functions:
|
||||
|
||||
Supported SHA-3 hash functions: SHA3-256, SHA3-384, SHA3-512 (SHA3-224 is not supported)
|
||||
|
Reference in New Issue
Block a user