| Help secure and troubleshoot. We use data to help secure and troubleshoot our pr | | Help secure and troubleshoot. We use data to help secure and troubleshoot our pr |
| oducts. This includes using data to protect the security and safety of our produ | | oducts. This includes using data to protect the security and safety of our produ |
| cts and customers, detecting malware and malicious activities, troubleshooting p | | cts and customers, detecting malware and malicious activities, troubleshooting p |
| erformance and compatibility issues to help customers get the most out of their | | erformance and compatibility issues to help customers get the most out of their |
| experiences, and notifying customers of updates to our products. This may includ | | experiences, and notifying customers of updates to our products. This may includ |
| e using automated systems to detect security and safety issues. | | e using automated systems to detect security and safety issues. |
| Safety. We use data to protect the safety of our products and our customers. Our | | Safety. We use data to protect the safety of our products and our customers. Our |
| security features and products can disrupt the operation of malicious software | | security features and products can disrupt the operation of malicious software |
| and notify users if malicious software is found on their devices. For example, s | | and notify users if malicious software is found on their devices. For example, s |
| ome of our products, such as Outlook.com or OneDrive, systematically scan conten | | ome of our products, such as Outlook.com or OneDrive, systematically scan conten |
| t in an automated manner to identify suspected spam, viruses, abusive actions, o | | t in an automated manner to identify suspected spam, viruses, abusive actions, o |
| r URLs that have been flagged as fraud, phishing, or malware links; and we reser | | r URLs that have been flagged as fraud, phishing, or malware links; and we reser |
| ve the right to block delivery of a communication or remove content if it violat | | ve the right to block delivery of a communication or remove content if it violat |
| es our terms. In accordance with European Union Regulation (EU) 2021/1232, we ha | | es our terms. In accordance with European Union Regulation (EU) 2021/1232, we ha |
| ve invoked the derogation permitted by that Regulation from Articles 5(1) and 6( | | ve invoked the derogation permitted by that Regulation from Articles 5(1) and 6( |
| 1) of EU Directive 2002/58/EC. We use scanning technologies to create digital si | | 1) of EU Directive 2002/58/EC. We use scanning technologies to create digital si |
| gnatures (known as “hashes”) of certain images and video content on our systems. | | gnatures (known as “hashes”) of certain images and video content on our systems. |
| These technologies then compare the hashes they generate with hashes of reporte | | These technologies then compare the hashes they generate with hashes of reporte |
| d child sexual exploitation and abuse imagery (known as a “hash set”), in a proc | | d child sexual exploitation and abuse imagery (known as a “hash set”), in a proc |
| ess called “hash matching”. Microsoft obtains hash sets from organizations that | | ess called “hash matching”. Microsoft obtains hash sets from organizations that |
| act in the public interest against child sex abuse. This can result in sharing i | | act in the public interest against child sex abuse. This can result in sharing i |
| nformation with the National Center for Missing and Exploited Children (NCMEC) a | | nformation with the National Center for Missing and Exploited Children (NCMEC) a |
| nd law enforcement authorities. We also use tools to detect and disrupt the misu | | nd law enforcement authorities. We also use tools to detect and disrupt the misu |
| se of video-calling capabilities to produce and share child sexual exploitation | | se of video-calling capabilities to produce and share child sexual exploitation |
| and abuse imagery by high-risk users. Learn more about our efforts to prevent an | | and abuse imagery by high-risk users. Learn more about our efforts to prevent an |
| d detect child exploitation here. | | d detect child exploitation here. |
| Updates. We use data we collect to develop product updates and security patches. | | Updates. We use data we collect to develop product updates and security patches. |
| For example, we may use information about your device’s capabilities, such as a | | For example, we may use information about your device’s capabilities, such as a |
| vailable memory, to provide you a software update or security patch. Updates and | | vailable memory, to provide you a software update or security patch. Updates and |
| patches are intended to maximize your experience with our products, help you pr | | patches are intended to maximize your experience with our products, help you pr |
| otect the privacy and security of your data, provide new features, and evaluate | | otect the privacy and security of your data, provide new features, and evaluate |
| whether your device is ready to process such updates. | | whether your device is ready to process such updates. |
| t | Promotional communications. We use data we collect to deliver promotional commun | t | Promotional communications. We use data we collect to deliver promotional commun |
| ications. You can sign up for email subscriptions and choose whether you wish to | | ications. You can sign up for email subscriptions and choose whether you wish to |
| receive promotional communications from Microsoft by email, SMS, physical mail, | | receive promotional communications from Microsoft by email, SMS, physical mail, |
| and telephone. For information about managing your contact data, email subscrip | | and telephone. If you consent to receiving marketing communications to a phone |
| tions, and promotional communications, see the How to access and control your pe | | number you provide us, we may contact you for marketing purposes using an auto-d |
| rsonal data section of this privacy statement. | | ialer and/or artificial/prerecorded voice, which may be generated using artifici |
| | | al intelligence. For information about managing your contact data, email subscri |
| | | ptions, and promotional communications, see the How to access and control your p |
| | | ersonal data section of this privacy statement. |
| Relevant offers. Microsoft uses data to provide you with relevant and valuable i | | Relevant offers. Microsoft uses data to provide you with relevant and valuable i |
| nformation regarding our products. We analyze data from a variety of sources to | | nformation regarding our products. We analyze data from a variety of sources to |
| predict the information that will be most interesting and relevant to you and de | | predict the information that will be most interesting and relevant to you and de |
| liver such information to you in a variety of ways. For example, we may predict | | liver such information to you in a variety of ways. For example, we may predict |
| your interest in gaming and communicate with you about new games you may like. | | your interest in gaming and communicate with you about new games you may like. |
| Advertising. Microsoft does not use what you say in email, human-to-human chat, | | Advertising. Microsoft does not use what you say in email, human-to-human chat, |
| video calls, or voice mail, or your documents, photos, or other personal files t | | video calls, or voice mail, or your documents, photos, or other personal files t |
| o target ads to you. We use data we collect through our interactions with you, t | | o target ads to you. We use data we collect through our interactions with you, t |
| hrough some of our first-party products, services, apps, and web properties (Mic | | hrough some of our first-party products, services, apps, and web properties (Mic |
| rosoft properties), and on third-party web properties, for advertising on our Mi | | rosoft properties), and on third-party web properties, for advertising on our Mi |
| crosoft properties and on third-party properties. We may use automated processes | | crosoft properties and on third-party properties. We may use automated processes |
| to help make advertising more relevant to you. For more information about how y | | to help make advertising more relevant to you. For more information about how y |
| our data is used for advertising, see the Advertising section of this privacy st | | our data is used for advertising, see the Advertising section of this privacy st |
| atement. | | atement. |
| Prize promotions and events. We use your data to administer prize promotions and | | Prize promotions and events. We use your data to administer prize promotions and |
| events available in our physical Microsoft Stores. For example, if you enter in | | events available in our physical Microsoft Stores. For example, if you enter in |
| to a prize promotion, we may use your data to select a winner and provide the pr | | to a prize promotion, we may use your data to select a winner and provide the pr |
| ize to you if you win. Or, if you register for a coding workshop or gaming event | | ize to you if you win. Or, if you register for a coding workshop or gaming event |
| , we will add your name to the list of expected attendees. | | , we will add your name to the list of expected attendees. |