{"id":1123,"date":"2019-09-23T10:06:17","date_gmt":"2019-09-23T08:06:17","guid":{"rendered":"https:\/\/87adsf68asd7f6.tatooine.link\/?p=1123"},"modified":"2025-03-24T13:35:57","modified_gmt":"2025-03-24T12:35:57","slug":"data-protection-of-microsoft-office-365-in-the-criticism","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism","title":{"rendered":"Microsoft Office 365 data protection under criticism"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2yz6ub-a6bdc75fdba9597dad6e1b1885e024a9\">\n.flex_column.av-2yz6ub-a6bdc75fdba9597dad6e1b1885e024a9{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2yz6ub-a6bdc75fdba9597dad6e1b1885e024a9 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-krcek7qk-cf90e1ac28f35ed0ec3988b0f19d044d'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\">Data Protection News<\/a> \u00bb <strong>Microsoft Office 365 data protection under criticism<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9u6kxf-0e2f06416ee99af6a386a1005bcad8d1\">\n.avia-image-container.av-9u6kxf-0e2f06416ee99af6a386a1005bcad8d1 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-9u6kxf-0e2f06416ee99af6a386a1005bcad8d1 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-9u6kxf-0e2f06416ee99af6a386a1005bcad8d1 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  avia-builder-el-last'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14087 avia-img-lazy-loading-not-14087 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\" alt='Keyboard key with the Microsoft Office 365 logo' title='Keyboard-Microsoft'  height=\"341\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft-300x149.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a5l15v-b6e10f879c0cf0ca3b86236bc17c9b96\">\n.flex_column.av-a5l15v-b6e10f879c0cf0ca3b86236bc17c9b96{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-a5l15v-b6e10f879c0cf0ca3b86236bc17c9b96 av_one_full  avia-builder-el-3  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-k9y2nadm-7bc44d490d24f14dd0fb18b3c70ca90b'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span style=\"color: #303440;\">Microsoft Office 365 data protection under criticism<\/span><\/h1>\n<p>Microsoft is busily promoting the move to its cloud. Office 365 is replacing the classic, locally installed program package in many offices. Unfortunately, however, this cloud does not meet all European <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\">Data protection regulations<\/a> and so the data collection in Office and Windows 10 ignited a lot of criticism. And officially: The Hessian data protection commissioner prohibited the use of Office 365 in Hessian schools in July 2019. He was particularly annoyed by the fact that \"a wealth of telemetry data is transmitted to Microsoft\" via Office 365 and that its content left questions unanswered.<\/p>\n<\/div><\/section><br \/>\n<div  class='hr av-7qy17n-412611fba77fc67c8a65f755b17dff7c hr-default  avia-builder-el-5  el_after_av_textblock  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-k9y2n4cr-502ec30487531d7b55a3947c7aa16e81'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Use of Office 365 in schools tolerated under certain conditions<\/h2>\n<p>After Microsoft had praised improvements in talks and had been able to dispel some of the concerns, the data protection officer declared in August that he would tolerate the use of Office 365 in schools in Hesse for the time being, subject to certain conditions and the reservation of further checks. This applies to the use of Office 365 in the version from 1904 (Office365 ProPlus, Office365 Online and Office365 Apps), if schools have already purchased these and trusted their legitimate use. However, they must temporarily stop the transmission of diagnostic data.<\/p>\n<h2>Data protection risks in Microsoft Office 365<\/h2>\n<p>A Dutch supervisory authority also criticised data protection risks. Between 23,000 and 25,000 events are transmitted to Microsoft for the Office applications. Not even Microsoft knows exactly what types of data are transmitted. The data collection frenzy of Office applications is therefore much higher than that under Windows 10. Administrators at the authorities were able to prove the transfer of file names, paths and mail meetings in logs. Other points of criticism include the use of Office data for Microsoft purposes and weaknesses in certificates. It is also not possible to delete data individually except by deleting the entire account.<\/p>\n<h2>Microsoft's privacy measures<\/h2>\n<p>Microsoft has taken some measures to respond to the criticism. New settings are to limit the transmission of telemetry data. The software giant is currently developing an analysis tool to better control the flow of data. However, Microsoft is not eliminating all the risks that have been warned. It has not yet given any assurance in this regard.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6hu0pf-70e110c721dd22224cc0139453fd6b1c\">\n.flex_column.av-6hu0pf-70e110c721dd22224cc0139453fd6b1c{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6hu0pf-70e110c721dd22224cc0139453fd6b1c av_one_full  avia-builder-el-7  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p><section  class='av_textblock_section av-k9y2mct8-89b54d5fa252e56e2953ceb4b5449f16'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Do you have questions about data protection and would like to exchange ideas with experts? In the Robin Data Community you will find answers to your questions.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-k9chhpx2-ae213c6ca5b7a5cbbd45478499c8b8bb-wrap avia-button-left  avia-builder-el-9  el_after_av_textblock  avia-builder-el-last'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-k9chhpx2-ae213c6ca5b7a5cbbd45478499c8b8bb\">\n#top #wrap_all .avia-button.av-k9chhpx2-ae213c6ca5b7a5cbbd45478499c8b8bb{\nbackground-color:#127db3;\nborder-color:#127db3;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-k9chhpx2-ae213c6ca5b7a5cbbd45478499c8b8bb .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/community.robin-data.io\/'  class='avia-button av-k9chhpx2-ae213c6ca5b7a5cbbd45478499c8b8bb av-link-btn avia-icon_select-no avia-size-medium avia-position-left'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"To the Community\"><span class='avia_iconbox_title' >To the Community<\/span><\/a><\/div><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3mxo83-f454ef2bdef44424389a812abaefd6c4\">\n.flex_column.av-3mxo83-f454ef2bdef44424389a812abaefd6c4{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3mxo83-f454ef2bdef44424389a812abaefd6c4 av_one_full  avia-builder-el-10  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-k9y2mrtu-345a2a510c911346f5373eeb83e1bc5a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Data processing in companies and schools<\/h2>\n<p>If you want to be on the safe side, you could now stop all data processing with Microsoft Office. But this is probably not a realistic option for most companies; after all, the Office programs have been standard in business life for a long time. The situation is similar for schools. Instead, they need better government support for the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-basics\">Data protection<\/a>. Currently, the state does not even provide its teachers with their own email address. The teachers communicate and send student data via their own provider, via USB stick or even with Whatsapp, which is the worst solution for data protection. They manage student data on their own computers, unencrypted hard drives and insecure passwords circulate. One may doubt whether the deletion management is operated correctly.<\/p>\n<h2>Tips for using Office 365 in practice<\/h2>\n<p>For the time being, companies and schools can continue to use the Office 365 applications after Microsoft has promised improvements in data protection. However, you should find out whether Microsoft is actually adhering to this and what the regulatory authorities are doing.<\/p>\n<h3>Opinion of the Hessian Data Protection Commissioner:<\/h3>\n<ul>\n<li><a href=\"https:\/\/datenschutz.hessen.de\/pressemitteilungen\/stellungnahme-des-hessischen-beauftragten-f%C3%BCr-datenschutz-und\" target=\"_blank\" rel=\"nofollow noopener\">Statement of the Hessian Commissioner for Data Protection and Freedom of Information on the use of Microsoft Office 365 in Hessian schools<\/a><\/li>\n<li><a href=\"https:\/\/datenschutz.hessen.de\/pressemitteilungen\/zweite-stellungnahme-zum-einsatz-von-microsoft-office-365-hessischen-schulen\" target=\"_blank\" rel=\"nofollow noopener\">Second statement on the use of Microsoft Office 365 in Hessian schools<\/a><\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-keu0713m-c470a86a49370b87cf1ba6615ea8643c\">\n.flex_column.av-keu0713m-c470a86a49370b87cf1ba6615ea8643c{\nborder-radius:0px 0px 0px 0px;\npadding:20px 20px 20px 20px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-keu0713m-c470a86a49370b87cf1ba6615ea8643c av_one_full  avia-builder-el-12  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-k9tnn8eq-0c157ab79723710c68f3029a0482123f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Data Protection Officer<\/strong><\/p>\n<p>You are welcome to contact us as\u00a0<strong>external data protection officer (DPO)\u00a0<\/strong>order. We also offer individual consulting services as well as audits and will be happy to provide you with a non-binding offer. You can find more information about our external data protection officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-k9chhpx2-1-091c8f9e7e9841bc1ef5a93d1ab1947f-wrap avia-button-left  avia-builder-el-14  el_after_av_textblock  avia-builder-el-last'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-k9chhpx2-1-091c8f9e7e9841bc1ef5a93d1ab1947f\">\n#top #wrap_all .avia-button.av-k9chhpx2-1-091c8f9e7e9841bc1ef5a93d1ab1947f{\nbackground-color:#127db3;\nborder-color:#127db3;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-k9chhpx2-1-091c8f9e7e9841bc1ef5a93d1ab1947f .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.robin-data.io\/en\/data-protection-officer-gdpr'  class='avia-button av-k9chhpx2-1-091c8f9e7e9841bc1ef5a93d1ab1947f av-link-btn avia-icon_select-no avia-size-medium avia-position-left'   aria-label=\"Discover DSB services\"><span class='avia_iconbox_title' >Discover DSB services<\/span><\/a><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-15  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-17  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism&#038;t=Datenschutz%20von%20Microsoft%20Office%20365%20in%20der%20Kritik' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Datenschutz%20von%20Microsoft%20Office%20365%20in%20der%20Kritik&#038;url=https:\/\/www.robin-data.io\/en\/?p=1123' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Datenschutz%20von%20Microsoft%20Office%20365%20in%20der%20Kritik&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Datenschutz%20von%20Microsoft%20Office%20365%20in%20der%20Kritik&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-18  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-20  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-21  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-9486 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company' data-rel='slide-1' class='slide-image' title='Microsoft 365: GDPR-compliant use in the company'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"341\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft-495x341.jpg\" class=\"wp-image-14087 avia-img-lazy-loading-not-14087 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Microsoft 365: GDPR-compliant use in the company\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company' title='Microsoft 365: GDPR-compliant use in the company'>Microsoft 365: GDPR-compliant use in the company<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Can Microsoft Office 365 be used in compliance with the GDPR? We show how the configuration complies with data protection.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-04-13T14:27:51+02:00\" >13 April 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>341<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-09-23T10:06:17+02:00\" >2021-04-13 14:27:51<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:38:51<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Microsoft 365: GDPR-compliant use in the company<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-8483 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server' data-rel='slide-1' class='slide-image' title='Attackers-attack-Microsoft-Exchange-Server'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attacker-attack-Microsoft-Exchange-Server\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server' title='Attackers-attack-Microsoft-Exchange-Server'>Attackers-attack-Microsoft-Exchange-Server<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Attackers are exploiting various vulnerabilities and attacking Microsoft Exchange Server. Read what companies need to do now!<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-03-16T21:40:40+01:00\" >16 March 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-09-23T10:06:17+02:00\" >2021-03-16 21:40:40<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:38:42<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attackers-attack-Microsoft-Exchange-Server<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-2827 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed' data-rel='slide-1' class='slide-image' title='Data breach Microsoft customer records leaked'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne-495x343.jpg\" class=\"wp-image-14081 avia-img-lazy-loading-not-14081 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data breach Microsoft customer data records leaked\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed' title='Data breach Microsoft customer records leaked'>Data breach Microsoft customer records leaked<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >In December 2019, 250 million support requests to Microsoft were available online for two days. Security researchers reported the data breach to Microsoft.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2020-01-24T14:20:26+01:00\" >January 24, 2020<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-09-23T10:06:17+02:00\" >2020-01-24 14:20:26<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-22 09:17:35<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data breach Microsoft customer records leaked<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Microsoft Office 365 is questionable from a data protection perspective. Recently, its use in schools has been under criticism. What you need to consider when using it to avoid high data protection risks can be found in the article.<\/p>","protected":false},"author":9,"featured_media":14087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[125,37,39,181],"class_list":["post-1123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-allgemein","tag-datenschutz","tag-dsgvo","tag-microsoft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Datenschutz von Microsoft Office 365 in der Kritik | News<\/title>\n<meta name=\"description\" content=\"Microsoft Office 365 ist aus Sicht des Datenschutzes bedenklich. Zuletzt stand die Verwendung in Schulen unter Kritik. Jetzt lesen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datenschutz von Microsoft Office 365 in der Kritik\" \/>\n<meta property=\"og:description\" content=\"Microsoft Office 365 ist aus Sicht des Datenschutzes bedenklich. Zuletzt stand die Verwendung in Schulen unter Kritik. Jetzt lesen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-23T08:06:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ulrich Hottelet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ulrich Hottelet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik\"},\"author\":{\"name\":\"Ulrich Hottelet\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"headline\":\"Datenschutz von Microsoft Office 365 in der Kritik\",\"datePublished\":\"2019-09-23T08:06:17+00:00\",\"dateModified\":\"2025-03-24T12:35:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik\"},\"wordCount\":2343,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"keywords\":[\"Allgemein\",\"Datenschutz\",\"DSGVO\",\"Microsoft\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik\",\"name\":\"Datenschutz von Microsoft Office 365 in der Kritik | News\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"datePublished\":\"2019-09-23T08:06:17+00:00\",\"dateModified\":\"2025-03-24T12:35:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"description\":\"Microsoft Office 365 ist aus Sicht des Datenschutzes bedenklich. Zuletzt stand die Verwendung in Schulen unter Kritik. Jetzt lesen!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"width\":685,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Datenschutz von Microsoft Office 365 in der Kritik\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\",\"name\":\"Ulrich Hottelet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"caption\":\"Ulrich Hottelet\"},\"description\":\"Freier IT-Journalist mit den Schwerpunkten Datenschutz, IT-Sicherheit und K\u00fcnstliche Intelligenz.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/support\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Microsoft Office 365 data protection under fire | News","description":"Microsoft Office 365 is questionable from a data protection perspective. Most recently, its use in schools has come under criticism. Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism","og_locale":"en_GB","og_type":"article","og_title":"Datenschutz von Microsoft Office 365 in der Kritik","og_description":"Microsoft Office 365 ist aus Sicht des Datenschutzes bedenklich. Zuletzt stand die Verwendung in Schulen unter Kritik. Jetzt lesen!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2019-09-23T08:06:17+00:00","article_modified_time":"2025-03-24T12:35:57+00:00","og_image":[{"width":685,"height":341,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","type":"image\/jpeg"}],"author":"Ulrich Hottelet","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Ulrich Hottelet","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik"},"author":{"name":"Ulrich Hottelet","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"headline":"Datenschutz von Microsoft Office 365 in der Kritik","datePublished":"2019-09-23T08:06:17+00:00","dateModified":"2025-03-24T12:35:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik"},"wordCount":2343,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","keywords":["Allgemein","Datenschutz","DSGVO","Microsoft"],"articleSection":["News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik","name":"Microsoft Office 365 data protection under fire | News","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","datePublished":"2019-09-23T08:06:17+00:00","dateModified":"2025-03-24T12:35:57+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"description":"Microsoft Office 365 is questionable from a data protection perspective. Most recently, its use in schools has come under criticism. Read now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","width":685,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/datenschutz-von-microsoft-office-365-in-der-kritik#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Datenschutz von Microsoft Office 365 in der Kritik"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515","name":"Ulrich Hottelet","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","caption":"Ulrich Hottelet"},"description":"Freelance IT journalist specialising in data protection, IT security and artificial intelligence.","url":"https:\/\/www.robin-data.io\/en\/author\/support"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=1123"}],"version-history":[{"count":15,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1123\/revisions"}],"predecessor-version":[{"id":14533,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1123\/revisions\/14533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14087"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=1123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=1123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=1123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}