{"id":9486,"date":"2021-04-13T14:27:51","date_gmt":"2021-04-13T12:27:51","guid":{"rendered":"https:\/\/www.robin-data.io\/?p=9486"},"modified":"2025-03-24T13:38:51","modified_gmt":"2025-03-24T12:38:51","slug":"data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company","title":{"rendered":"Microsoft 365: GDPR-compliant use in the company"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2sx6cu-6f1a568dd17a2ed95a746f07a62b1e73\">\n.flex_column.av-2sx6cu-6f1a568dd17a2ed95a746f07a62b1e73{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2sx6cu-6f1a568dd17a2ed95a746f07a62b1e73 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kr4n3gvo-b75020a9b90d55aabcb12aef78821eee'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>Data protection and Microsoft Office 365<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kna0ekib-1a5c330260e5c2f65b8985f3bfb6b76b\">\n.avia-image-container.av-kna0ekib-1a5c330260e5c2f65b8985f3bfb6b76b img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kna0ekib-1a5c330260e5c2f65b8985f3bfb6b76b .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kna0ekib-1a5c330260e5c2f65b8985f3bfb6b76b av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" loading=\"lazy\" class='wp-image-14087 avia-img-lazy-loading-14087 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\" alt='A button with the Microsoft Windows symbol' title='Keyboard-Microsoft'  height=\"341\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft-300x149.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft-18x9.jpg 18w\" sizes=\"auto, (max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kna0f9ug-2777e2f455c8387278f85c054ad4c2d9\">\n#top .hr.hr-invisible.av-kna0f9ug-2777e2f455c8387278f85c054ad4c2d9{\nheight:15px;\n}\n<\/style>\n<div  class='hr av-kna0f9ug-2777e2f455c8387278f85c054ad4c2d9 hr-invisible  avia-builder-el-3  el_after_av_image  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-45csf2-361645544951ca40566bb817d36ffaf8\">\n#top .av-special-heading.av-45csf2-361645544951ca40566bb817d36ffaf8{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-45csf2-361645544951ca40566bb817d36ffaf8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-45csf2-361645544951ca40566bb817d36ffaf8 .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-45csf2-361645544951ca40566bb817d36ffaf8 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-45csf2-361645544951ca40566bb817d36ffaf8 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-4  el_after_av_hr  el_before_av_textblock'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >Data protection and Microsoft Office 365: GDPR-compliant use for companies<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-67f4366981be460c987bb1fc6053b199'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The cloud-based version Office 365 from Microsoft is an established standard for office activities and contains products such as Outlook, Word, PowerPoint, Excel or OneDrive. <strong>Microsoft Office 365<\/strong> has, however, also been the subject of repeated criticism by data protection supervisory authorities. In the following article, we will show you which data protection challenges exist and how you can solve them in a <strong>GDPR compliant<\/strong> manner.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-or91by-04006c6367c6e633ed0ec8f01006ddef\">\n.flex_column.av-or91by-04006c6367c6e633ed0ec8f01006ddef{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-or91by-04006c6367c6e633ed0ec8f01006ddef av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yti0e-2f74ea98940984b4757725088b3357cf\">\n#top .av-special-heading.av-1yti0e-2f74ea98940984b4757725088b3357cf{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1yti0e-2f74ea98940984b4757725088b3357cf .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1yti0e-2f74ea98940984b4757725088b3357cf .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1yti0e-2f74ea98940984b4757725088b3357cf av-special-heading-h2 blockquote modern-quote  avia-builder-el-7  el_before_av_hr  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Most important information about the data protection classification of Office 365<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa\">\n#top .hr.hr-invisible.av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa hr-invisible  avia-builder-el-8  el_after_av_heading  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-kiipug5e-6ec9e3281d457feb855cf864dafa4398'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li style=\"font-size: 20px;\">Microsoft's cloud-based Office 365 is an established standard for office operations<\/li>\n<li style=\"font-size: 20px;\">From a data protection point of view, the processing by Microsoft is very controversial, but the data protection supervisory authorities have not currently issued a uniform ban.<\/li>\n<li style=\"font-size: 20px;\">Currently, there is no satisfactory recommendation from the supervisory authorities on the data protection-compliant use of Microsoft Office 365.<\/li>\n<li style=\"font-size: 20px;\">Despite this, data controllers in companies are required to implement risk-minimising measures and data protection-friendly default settings.<\/li>\n<li style=\"font-size: 20px;\">To minimise the risk of potential fines, these Office 365 configurations are required<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-27-ffe9d1945d020f09c47fb23fb5adfa25\">\n#top .hr.hr-invisible.av-kdu4eeyn-27-ffe9d1945d020f09c47fb23fb5adfa25{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-27-ffe9d1945d020f09c47fb23fb5adfa25 hr-invisible  avia-builder-el-10  el_after_av_textblock  el_before_av_notification'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div id='avia-messagebox-' class='avia_message_box av_notification av-kn9zobm6-90d9661efff57e9a46d9ca6b81b3222f avia-color-blue avia-size-large avia-icon_select-no avia-border-  avia-builder-el-11  el_after_av_hr  avia-builder-el-last  unterschied' ><span class='avia_message_box_title' >Note<\/span><div class=\"avia_message_box_content\"><p>Difference Office 365 and Microsoft 365:<\/p>\n<p>Microsoft officially announced the renaming of Office 365 to Microsoft 365 on 21 April 2020. Microsoft 365 includes all the familiar features from Office 365.<\/p>\n<\/div><\/div><\/p><\/div><\/p>\n<div class='flex_column_table av-lw9umk-33703d3362028b1aa2ff3515470fd277 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lw9umk-33703d3362028b1aa2ff3515470fd277\">\n.flex_column.av-lw9umk-33703d3362028b1aa2ff3515470fd277{\nborder-radius:0px 0px 0px 0px;\npadding:25px 25px 25px 25px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  id=\"uebersicht\"  class='flex_column av-lw9umk-33703d3362028b1aa2ff3515470fd277 av_one_full  avia-builder-el-12  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-top  column-top-margin'     ><section  class='av_textblock_section av-kiipug5e-26-83335085f4e3dc01e90882a683f49863'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Content about data protection and Microsoft 365:<\/h2>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8\">\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon{\ncolor:#127db3;\nfont-size:20px;\n}\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon svg:first-child{\nstroke:#127db3;\nfill:#127db3;\nheight:20px;\nwidth:20px;\n}\n#top #wrap_all .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .av_iconlist_title{\nfont-size:20px;\n}\n<\/style>\n<div  class='avia-icon-list-container av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8  avia-builder-el-14  el_after_av_textblock  el_before_av_hr'><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-small av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 avia-iconlist-animate'>\n<li><div class='iconlist_icon av-n4dp1a-34cb0cb867df985fec2dc1cf031b50d6 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#hintergrundinformationen&#039; title=&#039;Background information&#039;&gt;Background information&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#hintergrundinformationen' title='Background information'>Background information<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-25awse-6956d48edf50805844a20805e1b09126 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#Datenschutzrechtliche-Einordnung&#039; title=&#039;Classification: Office 365 GDPR&#039;&gt;Classification: Office 365 GDPR&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#Datenschutzrechtliche-Einordnung' title='Classification: Office 365 GDPR'>Classification: Office 365 GDPR<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-4kf20u-d71cc7889bcd7d2da8c71de95dead1b9 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#dsfa&#039; title=&#039;The need for a data protection impact assessment&#039;&gt;The need for a data protection impact assessment&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#dsfa' title='The need for a data protection impact assessment'>The need for a data protection impact assessment<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-hmgs4e-60ba2a3713c323de273cb878b9ba9def avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#einstellungen&#039; title=&#039;GDPR-compliant settings for Office 365&#039;&gt;GDPR-compliant settings for Office 365&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#einstellungen' title='GDPR-compliant settings for Office 365'>GDPR-compliant settings for Office 365<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-itkkbi-8182a8cfbced43692718d38f428a47bd avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#Sicherheitsfunktionen&#039; title=&#039;Lack of security features in Office 365&#039;&gt;Lack of security features in Office 365&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#Sicherheitsfunktionen' title='Lack of security features in Office 365'>Lack of security features in Office 365<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-1q6xge-473839f5982c999ba02bdccfde7be584 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#fazit&#039; title=&#039;Conclusion and recommendation for the use of Office 365&#039;&gt;Conclusion and recommendation for the use of Office 365&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#fazit' title='Conclusion and recommendation for the use of Office 365'>Conclusion and recommendation for the use of Office 365<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-25-db9bcb0a3480c4855cf751f70115101f\">\n#top .hr.hr-invisible.av-kdu4eeyn-25-db9bcb0a3480c4855cf751f70115101f{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-25-db9bcb0a3480c4855cf751f70115101f hr-invisible  avia-builder-el-15  el_after_av_iconlist  avia-builder-el-last'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1u9j8e-ed167956a7afaab1ff0dcc628c3e3279\">\n.flex_column.av-1u9j8e-ed167956a7afaab1ff0dcc628c3e3279{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"hintergrundinformationen\"  class='flex_column av-1u9j8e-ed167956a7afaab1ff0dcc628c3e3279 av_one_full  avia-builder-el-16  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-crn9ri-e659b7e56d15ce0aba02b4d165323422\">\n#top .av-special-heading.av-crn9ri-e659b7e56d15ce0aba02b4d165323422{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-crn9ri-e659b7e56d15ce0aba02b4d165323422 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-crn9ri-e659b7e56d15ce0aba02b4d165323422 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-crn9ri-e659b7e56d15ce0aba02b4d165323422 av-special-heading-h2 blockquote modern-quote  avia-builder-el-17  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Background information: What are the latest developments on Office 365 and GDPR-compliant deployment?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-28-2c3121a0a32424f26a5b6e92d82d3d4c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Microsoft's Office products set today's standard for contemporary office software. In addition to Microsoft Word for word processing and Microsoft Excel for spreadsheets, Microsoft PowerPoint is indispensable for professional presentations. Microsoft Exchange in conjunction with Microsoft Outlook represents a de facto standard for e-mailing, contact management and calendar management in the business context.<\/p>\n<p>The Corona crisis has shown that, in addition to the classic Microsoft Office applications, new applications accessible via the Internet are gaining in importance. These include Microsoft Teams for chatting and communicating via audio and video within the company and with customers and service providers. Microsoft SharePoint and Microsoft OneDrive are particularly suitable for sharing files and knowledge, as a document management system (DMS) and as a central knowledge management platform. In the past, Microsoft applications have repeatedly been criticised by data protection authorities. We provide an overview.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-aaee6m-5b8da5027e2b842b20c12fbb38da4069\">\n#top .av-special-heading.av-aaee6m-5b8da5027e2b842b20c12fbb38da4069{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-aaee6m-5b8da5027e2b842b20c12fbb38da4069 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-aaee6m-5b8da5027e2b842b20c12fbb38da4069 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-aaee6m-5b8da5027e2b842b20c12fbb38da4069 av-special-heading-h3 blockquote modern-quote  avia-builder-el-19  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >European Data Protection Supervisor<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-22-f36705d9b6477f4ab1401f2c73528ed5'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The European Data Protection Supervisor has taken a position on Microsoft's products in a detailed report. The EDPS recommends that companies, when selecting suitable service providers, ensure that they provide sufficient guarantees for the implementation of appropriate technical and organisational measures so that the processing of personal data meets the requirements of the GDPR.<\/p>\n<p>He advises responsible parties that have already licensed numerous Microsoft services to negotiate with the processor on instructions necessary to protect the rights and freedoms of the data subjects.  Even if it is a company of considerable size. According to the EDPS, Microsoft is ready to meet the EU's compliance requirements.<\/p>\n<p>The EDPB report lists the following five key issues that should be resolved through adjustments to Microsoft's services and through contractual arrangements:<\/p>\n<ol>\n<li>Under existing license agreements, Microsoft has extensive control powers and acts in part as a controller for the processing activities of personal data. In order to minimise these control powers, the EDPB recommends a contractual agreement that Microsoft should be designated from controller to processor.<\/li>\n<li>Microsoft's handling of sub-processors and the lack of meaningful audit rights were also found to be deficient. Therefore, the EDPB's recommendation is to implement a more transparent use of sub-processors and to contractually define their controls.<\/li>\n<li>Data transfer and the associated risk of unlawful disclosure of personal data were also considered critical. The EDPB criticised the lack of transparency regarding the location of personal data and the absence of measures to protect such data outside the EU. Therefore, it should be clarified where personal data are stored and how protection is ensured in third countries.<\/li>\n<li>The data transfer of Microsoft diagnostic data was also classified as unlawful by the EDPS. In order to reduce the transfer of diagnostic data to an appropriate level, we have developed concrete steps for the data protection-compliant use of Microsoft 365.<\/li>\n<li>Furthermore, the nature, scope and purposes of the processing and the risks for the data subjects to comply with their transparency obligations towards the data subjects were found to be deficient. The circumstances of the processing should therefore be precisely defined in the contract.<\/li>\n<\/ol>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8uq6la-3b7caf24ff520e3d8a706237ef1fd343\">\n#top .av-special-heading.av-8uq6la-3b7caf24ff520e3d8a706237ef1fd343{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-8uq6la-3b7caf24ff520e3d8a706237ef1fd343 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-8uq6la-3b7caf24ff520e3d8a706237ef1fd343 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-8uq6la-3b7caf24ff520e3d8a706237ef1fd343 av-special-heading-h3 blockquote modern-quote  avia-builder-el-21  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Data Protection Conference<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-21-0b41f9d2a2f23e186b13468fe5a05e58'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The Conference of Independent Data Protection Authorities of the Federal Government and the States (Data Protection Conference) had reviewed \"the Online Service Terms (OST) underlying the use of the product Microsoft Office 365 as well as the Data Protection Provisions for Microsoft Online Services (Data Processing Addendum \/ DPA) - in each case as of January 2020\". With the review, the DSK came to the conclusion that, at the time of the review, it was not possible to use Microsoft Office 365 in a way that complied with data protection requirements.<\/p>\n<p>However, the data protection supervisory authorities of Baden-W\u00fcrttemberg, Bavaria, Hesse and Saarland did not share the DSK's overall assessment and classified it as not yet ready for a decision. In particular, because the assessment would be too undifferentiated and Microsoft had revised the reviewed contractual provisions twice in the meantime.<\/p>\n<p>The data protection supervisory authorities therefore welcome all the more the fact that the Data Protection Conference has set up a working group which is to begin talks with Microsoft in the near future.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7ki36m-6512764b6d8572f6aa47ab2d37bb65d4\">\n#top .av-special-heading.av-7ki36m-6512764b6d8572f6aa47ab2d37bb65d4{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-7ki36m-6512764b6d8572f6aa47ab2d37bb65d4 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-7ki36m-6512764b6d8572f6aa47ab2d37bb65d4 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-7ki36m-6512764b6d8572f6aa47ab2d37bb65d4 av-special-heading-h3 blockquote modern-quote  avia-builder-el-23  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >German supervisory authorities<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-20-2409fcea2e02662fa1186f7d0f5cf42e'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In February 2021, the Berlin Commissioner for Data Protection and Freedom of Information, as the data protection supervisory authority, published a notice on the data protection-compliant use of video conferencing solutions against the background of the Corona pandemic. This included an assessment of Microsoft Teams via a traffic light system and a recommendation for use. The results of the short tests on various video conferencing systems can be found here: <a href=\"https:\/\/www.datenschutz-berlin.de\/themen\/telekommunikation\/videokonferenzen\/\" target=\"_blank\" rel=\"noopener\">Information on providers of videoconferencing services from the Berlin data protection supervisory authority<\/a><\/p>\n<p>The focus of the brief review of the design and implementation of the order processing relationship, in the case of Microsoft 365, however, this turned out to be deficient, so that there was no further review of the technical and organisational measures.<\/p>\n<p>The \"Annex to the Privacy Policy for Microsoft Online Services\" (in short: \"DPA\"), which was last revised by Microsoft in July 2020, was examined in detail. According to the assessment of the Berlin data protection supervisory authority, in particular the processing pursuant to the <a href=\"https:\/\/help.robin-data.io\/artikel-28-dsgvo\" target=\"_blank\" rel=\"noopener\">Art. 28 GDPR<\/a> insufficiently regulated. Furthermore, with regard to the transmission of data under <a href=\"https:\/\/help.robin-data.io\/artikel-44-dsgvo\" target=\"_blank\" rel=\"noopener\">Art. 44 GDPR<\/a> did not take sufficient measures to compensate for the level of data protection in the USA, in accordance with the case law of the ECJ in the \"Schrems II\" judgment.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ayfem-a8d02ee1b2ecec65d242d5c25012c042\">\n#top .av-special-heading.av-6ayfem-a8d02ee1b2ecec65d242d5c25012c042{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-6ayfem-a8d02ee1b2ecec65d242d5c25012c042 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-6ayfem-a8d02ee1b2ecec65d242d5c25012c042 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-6ayfem-a8d02ee1b2ecec65d242d5c25012c042 av-special-heading-h3 blockquote modern-quote  avia-builder-el-25  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Schrems II judgment<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-19-7c34796d2001baef2dfeed7867fd80a2'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The ECJ ruling of 16 July 2020, also referred to as \"Schrems II\", also prohibits the transfer of data to the USA to a large extent. Since Microsoft 365 also transfers personal data to the USA, Microsoft is directly affected by this ruling. However, only the data protection supervisory authority in Berlin has taken a position on the current status with a concrete ban on data transfer.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kn7i5i49-06a1dbaf6143bc5df3fd7ff3b05f31bf\">\n.flex_column.av-kn7i5i49-06a1dbaf6143bc5df3fd7ff3b05f31bf{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"Datenschutzrechtliche-Einordnung\"  class='flex_column av-kn7i5i49-06a1dbaf6143bc5df3fd7ff3b05f31bf av_one_full  avia-builder-el-27  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2th3y6-34d26c4fbfc9892b2989855e1a5516ee\">\n#top .av-special-heading.av-2th3y6-34d26c4fbfc9892b2989855e1a5516ee{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-2th3y6-34d26c4fbfc9892b2989855e1a5516ee .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2th3y6-34d26c4fbfc9892b2989855e1a5516ee .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-2th3y6-34d26c4fbfc9892b2989855e1a5516ee av-special-heading-h2 blockquote modern-quote  avia-builder-el-28  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Classification: Office 365 GDPR<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-18-17aadb7a903814e67a922328a4a8cfae'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Microsoft is a provider based in the USA. From the USA, Microsoft operates more than one hundred data centres worldwide on which the services of Office 365 are provided. For companies in the European Economic Area, the scope of the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/general-data-protection-regulation-eu-gdpr\">General Data Protection Regulation (GDPR)<\/a>Microsoft offers to operate the core of the above-mentioned central services in European data centres.<\/p>\n<p>However, this does not apply to all services that are <strong>Office 365 operation<\/strong> are necessary. In particular, the user identities created and the associated so-called meta-data flow from the EU to the USA. And here lies the problem of the German data protection authorities, who view the transfer of precisely this data as critical.<\/p>\n<p>Until July 2023, the problem with this transfer lay essentially in the fact that, from the EU's perspective, the USA is a so-called third country without adequate data protection guarantees. This problem was exacerbated by the fact that the previously applicable agreement between the USA and the EU, the so-called Privacy Shield, was declared invalid in 2020 by the so-called Schrems II ruling of the European Court of Justice. Since July 2023, the new adequacy decision between the EU and the USA, the so-called \"<a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/eu-us-data-privacy-framework\">EU-U.S. Data Privacy Shield<\/a>\", entered into force.<\/p>\n<p>The EU-U.S. Data Privacy Framework is the\u00a0<strong>third attempt<\/strong>\u00a0the EU Commission, after Safe Harbor and EU-U.S. Privacy Shield, the\u00a0<strong>Transfer of personal data to the USA<\/strong> without additional safeguards. The EU-US Data Privacy Framework follows the sectoral approach. This means that personal data may only be transferred to certified companies. This certification is carried out by the U.S. Department of Commerce. <a href=\"https:\/\/www.dataprivacyframework.gov\/\" target=\"_blank\" rel=\"noopener\">Click here for the list of certified companies<\/a><\/p>\n<p><strong>These conditions are at the core:<\/strong><\/p>\n<ul>\n<li>The use of so-called <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers\">EU standard contracts<\/a> or the <a href=\"https:\/\/www.dataprivacyframework.gov\/s\/participant-search\" target=\"_blank\" rel=\"noopener\">Microsoft self-certification with the U.S. Department of Commerce<\/a><\/li>\n<li>The establishment of internal corporate policies for the use of Office 365 within a company.<\/li>\n<li>The consent of the persons concerned as consent to the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-transmission-to-third-countries\">Transatlantic data transfer<\/a><\/li>\n<\/ul>\n<p>However, the second and third coats of paint have practically no relevance. At the latest, the use of Exchange and e-mails makes it de facto impossible to restrict the use of Office 365 to the company or to obtain consent before sending emails.<\/p>\n<p>For this reason, the EU standard contract clauses must currently be used. This is also actively proclaimed by Microsoft and is part of the license agreement. Nevertheless, some of the German supervisory authorities in data protection do not agree with this approach.<\/p>\n<p>Nevertheless, the GDPR always offers the possibility to justify processing operations on the basis of a risk assessment and to implement appropriate measures in order to increase the level of data protection as required. The method for this is called data protection impact assessment, the requirements of which are described in Article 35 of the GDPR.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kn7i5i49-17-9e0670db99480711ce3d2ff7e0dc4781\">\n.flex_column.av-kn7i5i49-17-9e0670db99480711ce3d2ff7e0dc4781{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"dsfa\"  class='flex_column av-kn7i5i49-17-9e0670db99480711ce3d2ff7e0dc4781 av_one_full  avia-builder-el-30  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kpcpn8oa-681ec074f69270b7796cdf23f1202f53\">\n#top .av-special-heading.av-kpcpn8oa-681ec074f69270b7796cdf23f1202f53{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-kpcpn8oa-681ec074f69270b7796cdf23f1202f53 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kpcpn8oa-681ec074f69270b7796cdf23f1202f53 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-kpcpn8oa-681ec074f69270b7796cdf23f1202f53 av-special-heading-h2 blockquote modern-quote  avia-builder-el-31  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Is a data protection impact assessment required when using Office 365 GDPR?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-16-bd82b9cee655fde8cb8c9844e34f0e8a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Due to some data protection risks when used in companies, the use of Office 365 must be subject to a <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-impact-assessment-2\">data protection impact assessment<\/a> (DPIA) carried out in accordance with Art. 35 GDPR . The assessment of the use of Office 365 in the context of a DPIA is always an individual case and depends on factors such as: number of employees, use of software products or the processing purposes.<\/p>\n<h4>What data is processed in Office 365?<\/h4>\n<ul>\n<li>Find out which Office 365 software products your company is using<\/li>\n<li>Investigate which people have access to them<\/li>\n<li>Record the types of data being processed: is it customer, telemetry, diagnostic, meta or functional data?<\/li>\n<li>Describe the purpose for which these types of data are processed<\/li>\n<\/ul>\n<h4>Risk analysis and remedial actions<\/h4>\n<ul>\n<li>Describe the <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-impact-assessment-2\">Risk as in the DPIA article<\/a> explains<\/li>\n<li>Check the possibility of remedial actions: Microsoft is primarily responsible for technical remediation; you, as the company, can perform remediation as described in item <a title=\"GDPR-compliant settings for Office 365\" href=\"https:\/\/www.robin-data.io\/en\/?p=9486&amp;preview=true#einstellungen\">GDPR-compliant settings for Office 365<\/a> Implement and document as described<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n<div id='avia-messagebox-' class='avia_message_box av_notification av-kn9zobm6-24-0f775f353b2aa7e7c4498cd358aa6b5c avia-color-blue avia-size-large avia-icon_select-no avia-border-  avia-builder-el-33  el_after_av_textblock  el_before_av_promobox' ><span class='avia_message_box_title' >Digression<\/span><div class=\"avia_message_box_content\"><p>In 2018, the Dutch Ministry of Justice and Security commissioned a private company to conduct a data protection impact assessment on the use of Office 365. However, only Office 365 ProPlus version 1905 was assessed as an installation. As a result, it was determined that the use of Office 365 ProPlus version 1905 is possible in a data protection compliant manner. The web accesses for Office 365 were classified as not compliant with data protection in a further assessment.<\/p>\n<\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kna0ba82-78e90b151c0c21a5fe4cd303956cd55c\">\n.av_promobox.av-kna0ba82-78e90b151c0c21a5fe4cd303956cd55c{\ncolor:#ffffff;\nbackground:#00b3bd;\n}\n<\/style>\n<div  class='av_promobox av-kna0ba82-78e90b151c0c21a5fe4cd303956cd55c avia-button-yes  avia-builder-el-34  el_after_av_notification  avia-builder-el-last'><div class='avia-promocontent'><p>\nUse Microsoft 365 securely with advice from Robin Data\u00ae and PowerBiT\u00ae. With our solution \"Microsoft\u00ae 365 managed DSGVO\", experts configure your Microsoft\u00ae 365 DSGVO compliant according to given standards. <span class=\"avia_iconbox_title\">Maximum data protection compliance. Minimal liability risk.<\/span><\/p>\n<\/div><div  class='avia-button-wrap av-kna0ba82-38bb9920fadc6cac9437fe5b54b64e24-wrap avia-button-right'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kna0ba82-38bb9920fadc6cac9437fe5b54b64e24\">\n#top #wrap_all .avia-button.av-kna0ba82-38bb9920fadc6cac9437fe5b54b64e24{\nbackground-color:#303440;\nborder-color:#303440;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-kna0ba82-38bb9920fadc6cac9437fe5b54b64e24 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.robin-data.io\/en\/microsoft-365-managed-dsgvo'  class='avia-button av-kna0ba82-38bb9920fadc6cac9437fe5b54b64e24 av-link-btn avia-icon_select-no avia-size-small avia-position-right'   aria-label=\"To the consultation \"><span class='avia_iconbox_title' >To the consultation <\/span><\/a><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kn7i6fd4-b8a0450c0e86b11508c22ea8b70b6cf5\">\n.flex_column.av-kn7i6fd4-b8a0450c0e86b11508c22ea8b70b6cf5{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"einstellungen\"  class='flex_column av-kn7i6fd4-b8a0450c0e86b11508c22ea8b70b6cf5 av_one_full  avia-builder-el-35  el_after_av_one_full  el_before_av_one_half  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3q3nwe-b7d77175c3cece861b0c702fb51fe454\">\n#top .av-special-heading.av-3q3nwe-b7d77175c3cece861b0c702fb51fe454{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-3q3nwe-b7d77175c3cece861b0c702fb51fe454 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-3q3nwe-b7d77175c3cece861b0c702fb51fe454 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-3q3nwe-b7d77175c3cece861b0c702fb51fe454 av-special-heading-h2  avia-builder-el-36  el_before_av_hr  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >GDPR-compliant use of Office 365: What are the necessary settings?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-23-41aa9521fc7459de28184ff6eb63251c\">\n#top .hr.hr-invisible.av-kdu4eeyn-23-41aa9521fc7459de28184ff6eb63251c{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-23-41aa9521fc7459de28184ff6eb63251c hr-invisible  avia-builder-el-37  el_after_av_heading  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-15-fe5c93dd0cb5006bf56baa7615b8212a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Many Microsoft products are installed, provided and kept up-to-date locally, i.e. on-premises, by an administrator. This is sometimes associated with high costs (hardware and personnel) and complex license models and licensing costs. Since very sensitive personal data (e.g. e-mails, personnel files, etc.) and business secrets that need to be protected (e.g. strategies, customer documents that are subject to confidentiality) are usually processed on locally operated Microsoft servers, there is the additional challenge of complying with the requirements of data protection, especially Article 32 GDPR, as well as the security requirements based on ISO \/ IEC 27001 or BSI basic protection or other security standards such as TISAX, ISIS 12 or vds3473.<\/p>\n<p>This poses significant challenges for many companies. But not least of all, the new regulations that came to light in March 2021. <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server\">Zero-Day Vulnerability (Zero-Day-Exploit) Hafnium in Microsoft Exchange Server<\/a> (Local versions) shows that keeping complex IT infrastructure local can be fraught with problems. Incidentally, the Office 365 cloud version of the Microsoft products described above was not affected by the vulnerability.<\/p>\n<p>In addition to aspects of security, the advantage of the Office 365 Suite over the local on-premise installation is that you have access to all Microsoft products in the Office 365 Suite on the basis of a simple user license. This applies to Office products such as Word, Excel, PowerPoint or OneNote, professional e-mailing via Exchange, as well as collaboration platforms such as SharePoint and OneDrive, the communication platform Teams, the appointment booking system Booking, the virtual whiteboard, the video streaming portal Stream or the workflow engine Flow.<\/p>\n<p>An installation of the Office 365 version is not required. In the first step, it is sufficient to connect your own domain and create the corresponding users, who then have access to all activated products, sharepoints or mailboxes. So even a \"layman\" can get started right away.<\/p>\n<p>The challenge, however, lies in setting the details in the Office 365 Admin Center so that Office 365 meets the requirements of the GDPR. Here, the detailed access and compliance settings play a role, as well as aspects of security such as backup and virus protection.<\/p>\n<p>The following configurations are based on the Dutch privacy impact assessment and require an update from older Office versions to version 1905 or higher. Only with this version were the corresponding setting options in Office 365 \/ Microsoft 365 enabled.<\/p>\n<p>GDPR-compliant use through configuration: After updating to a current version, the following GDPR-compliant configurations can be made.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2y6nce-6650d58a3a5416a47f5f9a543d726119\">\n#top .av-special-heading.av-2y6nce-6650d58a3a5416a47f5f9a543d726119{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-2y6nce-6650d58a3a5416a47f5f9a543d726119 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2y6nce-6650d58a3a5416a47f5f9a543d726119 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-2y6nce-6650d58a3a5416a47f5f9a543d726119 av-special-heading-h3 blockquote modern-quote  avia-builder-el-39  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Customer Experiences \/ Services<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-13-ad77fbf052d0f740634b3e64c5f4ea3c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Disable the use of <a href=\"https:\/\/www.robin-data.io\/en\/microsoft-365-managed-dsgvo\">Connected Experiences\/Services in Office 365, get professional advice now<\/a><strong>.<\/strong>\u00a0 Microsoft classifies itself as a controller, not just a processor, when providing these services. Whenever this is the case, the purpose of use is no longer limited and includes the use of processed data for personalisation or advertising. Disable the following Customer Experiences to limit the purpose of use. Note that functions such as the translator or the room search are no longer available:<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9dbjta-901d5a6f297128db4bf29adce305002a\">\n.flex_column.av-9dbjta-901d5a6f297128db4bf29adce305002a{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9dbjta-901d5a6f297128db4bf29adce305002a av_one_half  avia-builder-el-41  el_after_av_one_full  el_before_av_one_half  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kmw0krvz-12-7027ccfe001da77666664ff0566be6f8'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>3D Maps<\/li>\n<li>Insert online 3D Models<\/li>\n<li>Map Chart<\/li>\n<li>Office Store<\/li>\n<li>Insert Online Video<\/li>\n<li>Research<\/li>\n<li>Researcher<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-70p7lq-bde9d18b083d2a0a6e1b859209aebc99\">\n.flex_column.av-70p7lq-bde9d18b083d2a0a6e1b859209aebc99{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-70p7lq-bde9d18b083d2a0a6e1b859209aebc99 av_one_half  avia-builder-el-43  el_after_av_one_half  el_before_av_one_full  flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kmw0krvz-11-7af7a49cd49eba91127299b44b51ac93'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>Smart Lookup<\/li>\n<li>Insert Online Pictures<\/li>\n<li>LinkedIn Resume Assistant<\/li>\n<li>Weather Bar in Outlook<\/li>\n<li>PowerPoint QuickStarter<\/li>\n<li>Giving Feedback to Microsoft<\/li>\n<li>Suggest a Feature<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6arcry-4037c3bd99b98cafb1dc92b70df15e12\">\n.flex_column.av-6arcry-4037c3bd99b98cafb1dc92b70df15e12{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6arcry-4037c3bd99b98cafb1dc92b70df15e12 av_one_full  avia-builder-el-45  el_after_av_one_half  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-egfmmm-17f75f19287acecc56afb0032d8d781f\">\n#top .av-special-heading.av-egfmmm-17f75f19287acecc56afb0032d8d781f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-egfmmm-17f75f19287acecc56afb0032d8d781f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-egfmmm-17f75f19287acecc56afb0032d8d781f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-egfmmm-17f75f19287acecc56afb0032d8d781f av-special-heading-h3 blockquote modern-quote  avia-builder-el-46  el_before_av_textblock  avia-builder-el-first'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Diagnostic data<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-10-1d925317c33b93df3f0c1c74f8f8dd6b'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>When you use Office 365, Microsoft processes so-called diagnostic data to provide, improve and update services and their security. This diagnostic data is uniquely assigned to a user via an ID and is sent to Microsoft servers. Examples of data types are the user ID, program language, or duration of use of an Office service. This option can be deactivated without any direct disadvantage for the user by selecting \"neither\" in the diagnostic data settings.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bxqo1q-c27332827f2f0c9e527bda63d805f81d\">\n#top .av-special-heading.av-bxqo1q-c27332827f2f0c9e527bda63d805f81d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-bxqo1q-c27332827f2f0c9e527bda63d805f81d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-bxqo1q-c27332827f2f0c9e527bda63d805f81d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-bxqo1q-c27332827f2f0c9e527bda63d805f81d av-special-heading-h3 blockquote modern-quote  avia-builder-el-48  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Telemetry level and Windows settings<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-9-20852d7fc3f2f066067a608342da3613'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Set the telemetry level to \"neither\" via group policy or registry entry of Microsoft 365 and the settings of Windows 10 Enterprise to \"secure\".<strong><a href=\"https:\/\/www.robin-data.io\/en\/microsoft-365-managed-dsgvo\"> If you have any questions about the configuration, we will be happy to advise you<\/a>.<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bk5k0u-9e14cb318c616dd30869c567b939c297\">\n#top .av-special-heading.av-bk5k0u-9e14cb318c616dd30869c567b939c297{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-bk5k0u-9e14cb318c616dd30869c567b939c297 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-bk5k0u-9e14cb318c616dd30869c567b939c297 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-bk5k0u-9e14cb318c616dd30869c567b939c297 av-special-heading-h3 blockquote modern-quote  avia-builder-el-50  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >data protection impact assessment<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-8-270813f71854e9d64cd643835e98b8d0'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Discuss with your data protection officer whether the type and scope of data processing by Office 365 requires a data protection impact assessment. If a DPIA should be necessary, document it in your data protection documentation. <strong><a href=\"https:\/\/www.robin-data.io\/en\/microsoft-365-managed-dsgvo\">If you have any questions about the data protection impact assessment, we will be happy to advise you<\/a>.<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ujqni-3986e702ca3d8e99db6e4eb6e990ee2b\">\n#top .av-special-heading.av-ujqni-3986e702ca3d8e99db6e4eb6e990ee2b{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-ujqni-3986e702ca3d8e99db6e4eb6e990ee2b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-ujqni-3986e702ca3d8e99db6e4eb6e990ee2b .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-ujqni-3986e702ca3d8e99db6e4eb6e990ee2b av-special-heading-h3 blockquote modern-quote  avia-builder-el-52  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Customer Lockbox<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-7-ffd6c4c4e507e672245b14cba2a88b2c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>If you process sensitive personal data in Office 365, it is recommended to use a so-called customer lockbox or the customer key. The use of this function ensures a customer-side encryption of the documents, but is associated with additional costs.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q7x32-edb5337492522d77c4f14c3e0c01a10a\">\n#top .av-special-heading.av-q7x32-edb5337492522d77c4f14c3e0c01a10a{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-q7x32-edb5337492522d77c4f14c3e0c01a10a .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-q7x32-edb5337492522d77c4f14c3e0c01a10a .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-q7x32-edb5337492522d77c4f14c3e0c01a10a av-special-heading-h3 blockquote modern-quote  avia-builder-el-54  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >LinkedIn Integration<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-6-c9e49d45067f907d0055c533dbe248df'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In Office 365, it is generally possible to connect the LinkedIn accounts of employees; in Germany, this function is currently activated by default. Check your company's settings in the administrator interface and deactivate it manually if necessary.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-690rou-cb16f3ee3577856c57076799863c83d3\">\n#top .av-special-heading.av-690rou-cb16f3ee3577856c57076799863c83d3{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-690rou-cb16f3ee3577856c57076799863c83d3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-690rou-cb16f3ee3577856c57076799863c83d3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-690rou-cb16f3ee3577856c57076799863c83d3 av-special-heading-h3 blockquote modern-quote  avia-builder-el-56  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Workplace Analytics or Activity Reports<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-5-a251515c67860681373b9af294642d73'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The Workplace Analytics or Activity Reports functions involve the evaluation of performance data. This function should always be deactivated and must be discussed with the data protection officer and, if available, the works council before use. If necessary, a data protection impact assessment may even have to be carried out. Please also make sure not to install the \"Insights\" plugin.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-19n4e-ee6fe48479586287c25b800caed3a2d6\">\n#top .av-special-heading.av-19n4e-ee6fe48479586287c25b800caed3a2d6{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-19n4e-ee6fe48479586287c25b800caed3a2d6 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-19n4e-ee6fe48479586287c25b800caed3a2d6 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-19n4e-ee6fe48479586287c25b800caed3a2d6 av-special-heading-h3 blockquote modern-quote  avia-builder-el-58  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Office 365 mobile and web apps<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-4-85d488f3875a07d783af029b674114d6'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>As mentioned above, the use of Office 365 mobile and web applications is not compliant with the GDPR due to the classification of the Dutch supervisory authority. Managers need to raise awareness among their employees and have policies in place to prevent them from using these applications. Please note the further steps taken by Microsoft to adapt the level of data protection to the applicable EU requirements. <a href=\"https:\/\/www.robin-data.io\/en\/microsoft-365-managed-dsgvo\">If you have any questions about the configuration of mobile and web applications, we will be happy to advise you<\/a>.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3zngfy-19b63188d645b8e8e89586460a94a2af\">\n.av_promobox.av-3zngfy-19b63188d645b8e8e89586460a94a2af{\ncolor:#ffffff;\nbackground:#00b3bd;\n}\n<\/style>\n<div  class='av_promobox av-3zngfy-19b63188d645b8e8e89586460a94a2af avia-button-yes  avia-builder-el-60  el_after_av_textblock  avia-builder-el-last'><div class='avia-promocontent'><p>\nUse Microsoft 365 securely with advice from Robin Data\u00ae and PowerBiT\u00ae. With our solution \"Microsoft\u00ae 365 managed DSGVO\", experts configure your Microsoft\u00ae 365 DSGVO compliant according to given standards. <span class=\"avia_iconbox_title\">Maximum data protection compliance. Minimal liability risk.<\/span><\/p>\n<\/div><div  class='avia-button-wrap av-3zngfy-f416e03362e13d5da6c1558b97a5da58-wrap avia-button-right'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3zngfy-f416e03362e13d5da6c1558b97a5da58\">\n#top #wrap_all .avia-button.av-3zngfy-f416e03362e13d5da6c1558b97a5da58{\nbackground-color:#303440;\nborder-color:#303440;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-3zngfy-f416e03362e13d5da6c1558b97a5da58 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.robin-data.io\/en\/microsoft-365-managed-dsgvo'  class='avia-button av-3zngfy-f416e03362e13d5da6c1558b97a5da58 av-link-btn avia-icon_select-no avia-size-small avia-position-right'   aria-label=\"To the consultation \"><span class='avia_iconbox_title' >To the consultation <\/span><\/a><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kn7i9q8y-5364d438c40b7835f8b689f70612a696\">\n.flex_column.av-kn7i9q8y-5364d438c40b7835f8b689f70612a696{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"Sicherheitsfunktionen\"  class='flex_column av-kn7i9q8y-5364d438c40b7835f8b689f70612a696 av_one_full  avia-builder-el-61  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-284pwu-6316b03dc0629ad49b6fdf62bf7c12a9\">\n#top .av-special-heading.av-284pwu-6316b03dc0629ad49b6fdf62bf7c12a9{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-284pwu-6316b03dc0629ad49b6fdf62bf7c12a9 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-284pwu-6316b03dc0629ad49b6fdf62bf7c12a9 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-284pwu-6316b03dc0629ad49b6fdf62bf7c12a9 av-special-heading-h2 blockquote modern-quote  avia-builder-el-62  el_before_av_hr  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >What are missing security features in Office 365 deployment?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-14-5cefd282b76ec46b1af46acc9529adc7\">\n#top .hr.hr-invisible.av-kdu4eeyn-14-5cefd282b76ec46b1af46acc9529adc7{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-14-5cefd282b76ec46b1af46acc9529adc7 hr-invisible  avia-builder-el-63  el_after_av_heading  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-3-76dac8a68fc8615f39b7e91000bf6e0f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>While Office 365 runs in the cloud, it should not be assumed that all security issues are taken care of or that all information security protection goals such as confidentiality, integrity and availability are met. Furthermore, some building blocks need to be added to the Office 365 package to enable truly secure operation and ensure data protection compliance. <strong><a href=\"https:\/\/www.robin-data.io\/en\/microsoft-365-managed-dsgvo\">If you have any questions about the configuration of the safety functions, we will be happy to advise you<\/a>.<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kn7duylz-f3584442ad3236d57834dc777c4f05d3\">\n#top .togglecontainer.av-kn7duylz-f3584442ad3236d57834dc777c4f05d3 p.toggler{\nborder-color:#127db3;\n}\n#top .togglecontainer.av-kn7duylz-f3584442ad3236d57834dc777c4f05d3 p.toggler.activeTitle{\ncolor:#ffffff;\nborder-color:#ffffff;\nbackground-color:#127db3;\n}\n#top .togglecontainer.av-kn7duylz-f3584442ad3236d57834dc777c4f05d3 .toggle_wrap .toggle_content{\nborder-color:#127db3;\n}\n<\/style>\n<div  class='togglecontainer av-kn7duylz-f3584442ad3236d57834dc777c4f05d3 av-elegant-toggle  avia-builder-el-65  el_after_av_textblock  avia-builder-el-last  toggle_close_all hasCurrentStyle'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/FAQPage\" >\n<section class='av_toggle_section av-hxwqda-e00f5f53ccefdc5c19cf3e7dd7673b90'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-1' data-fake-id='#toggle-id-1' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-1' data-slide-speed=\"200\" data-title=\"E-Mail-Archivierung gem\u00e4\u00df DSGVO\/GoBD\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: E-Mail-Archivierung gem\u00e4\u00df DSGVO\/GoBD\" data-aria_expanded=\"Click to collapse: E-Mail-Archivierung gem\u00e4\u00df DSGVO\/GoBD\">Email archiving according to GDPR\/GoBD<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-1' aria-labelledby='toggle-toggle-id-1' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Tamper-proof archiving of all e-mail traffic in accordance with the current guidelines of the tax authorities (GoBD) and the GDPR.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-fjadke-1934ac5ed90dfa4b52b31d86b531e069'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-2' data-fake-id='#toggle-id-2' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-2' data-slide-speed=\"200\" data-title=\"E-Mail-Verschl\u00fcsselung\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: E-Mail-Verschl\u00fcsselung\" data-aria_expanded=\"Click to collapse: E-Mail-Verschl\u00fcsselung\">Email encryption<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-2' aria-labelledby='toggle-toggle-id-2' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Practicable, centrally managed transport encryption of e-mail traffic. Checking the transmission route from sender to recipient for valid transport encryption.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-erskum-07099b11652185b4aaed8680bbd81640'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-3' data-fake-id='#toggle-id-3' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-3' data-slide-speed=\"200\" data-title=\"E-Mail Anti-Spam und Virenscanne\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: E-Mail Anti-Spam und Virenscanne\" data-aria_expanded=\"Click to collapse: E-Mail Anti-Spam und Virenscanne\">Email Anti-Spam and Virus Scanning<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-3' aria-labelledby='toggle-toggle-id-3' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Centrally manageable anti-spam and anti-virus solution. Maximum detection performance through deep analysis and AI-based threat detection.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-cns61q-d0c061d79b222aeeeae3f8ac1a7d0df5'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-4' data-fake-id='#toggle-id-4' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-4' data-slide-speed=\"200\" data-title=\"DSGVO-konforme Echtzeit\u00fcberwachung des Mailverkehrs\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: DSGVO-konforme Echtzeit\u00fcberwachung des Mailverkehrs\" data-aria_expanded=\"Click to collapse: DSGVO-konforme Echtzeit\u00fcberwachung des Mailverkehrs\">DSGVO-compliant real-time monitoring of mail traffic<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-4' aria-labelledby='toggle-toggle-id-4' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Real-time monitoring of e-mail traffic. Detailed information about the encryption method and classification of incoming and outgoing emails, as well as the reason for the corresponding classification.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-at9mce-d483e4f9c3a8089810133908aa0ebf00'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-5' data-fake-id='#toggle-id-5' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-5' data-slide-speed=\"200\" data-title=\"E-Mail-Content Control und Compliance-Filter\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: E-Mail-Content Control und Compliance-Filter\" data-aria_expanded=\"Click to collapse: E-Mail-Content Control und Compliance-Filter\">Email content control and compliance filtering<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-5' aria-labelledby='toggle-toggle-id-5' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Setting options to categorise and filter attachments of received emails. Ability to enforce company-wide communication rain.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-9isiv2-6fe4d348512acc3ca94def49089634d3'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-6' data-fake-id='#toggle-id-6' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-6' data-slide-speed=\"200\" data-title=\"Zentrales Signatur-Management\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Zentrales Signatur-Management\" data-aria_expanded=\"Click to collapse: Zentrales Signatur-Management\">Central signature management<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-6' aria-labelledby='toggle-toggle-id-6' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Central signatures should be used, among other things, to comply with legal requirements. In this way, you ensure the company-wide integration of a legally compliant legal disclosure for all emails (also for mobile devices).<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-8155ji-de2722a16513cc6eb52345d26db2d5be'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-7' data-fake-id='#toggle-id-7' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-7' data-slide-speed=\"200\" data-title=\"Datensicherungs-Funktion f\u00fcr Exchange, Teams, SharePoint und OneDrive\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Datensicherungs-Funktion f\u00fcr Exchange, Teams, SharePoint und OneDrive\" data-aria_expanded=\"Click to collapse: Datensicherungs-Funktion f\u00fcr Exchange, Teams, SharePoint und OneDrive\">Data backup function for Exchange, Teams, SharePoint and OneDrive<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-7' aria-labelledby='toggle-toggle-id-7' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Office 365 (Microsoft 365) does not include a data backup function. Microsoft refers here to the backup responsibility of the user. A valid and regularly checked data backup is a fundamental criterion for the use of a software solution, both from the perspective of self-protection and the GDPR.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-6aqa72-d182907f0f800b29c120dff1b6cdd275'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-8' data-fake-id='#toggle-id-8' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-8' data-slide-speed=\"200\" data-title=\"Hosting in europ\u00e4ischem Raum\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Hosting in europ\u00e4ischem Raum\" data-aria_expanded=\"Click to collapse: Hosting in europ\u00e4ischem Raum\">Hosting in European area<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-8' aria-labelledby='toggle-toggle-id-8' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Microsoft's data storage for German customers is ostensibly in German data centers. However, this is not contractually guaranteed. Thus, from the perspective of the GDPR, it must be assumed that data is stored in Europe.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-42ymke-01d0045de46780d31f1f2ab4dabd9043'  itemscope=\"itemscope\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{All} \"  ><p id='toggle-toggle-id-9' data-fake-id='#toggle-id-9' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"name\"  role='tab' tabindex='0' aria-controls='toggle-id-9' data-slide-speed=\"200\" data-title=\"Professionelle Administration der Plattform\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Professionelle Administration der Plattform\" data-aria_expanded=\"Click to collapse: Professionelle Administration der Plattform\">Professional administration of the platform<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-9' aria-labelledby='toggle-toggle-id-9' role='region' class='toggle_wrap  av-title-above'   itemscope=\"itemscope\" itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>At first glance, Office 365 and Microsoft 365 solutions are not easy to put into operation. In everyday life, you are also confronted with issues such as integration into existing structures, enforcing legal requirements or solving daily problems. Ultimately, the administration of these cloud products means that all functions of a Windows client-server network must be completely under control.<\/p>\n<\/div><\/div><\/div><\/section>\n<\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kn7ib6r8-68101bcdf26ea6bcb023c80eacea611a\">\n.flex_column.av-kn7ib6r8-68101bcdf26ea6bcb023c80eacea611a{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"fazit\"  class='flex_column av-kn7ib6r8-68101bcdf26ea6bcb023c80eacea611a av_one_full  avia-builder-el-66  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2vrmmm-519f4346fd017546f58b0b14576baa93\">\n#top .av-special-heading.av-2vrmmm-519f4346fd017546f58b0b14576baa93{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-2vrmmm-519f4346fd017546f58b0b14576baa93 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2vrmmm-519f4346fd017546f58b0b14576baa93 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-2vrmmm-519f4346fd017546f58b0b14576baa93 av-special-heading-h2  avia-builder-el-67  el_before_av_hr  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Conclusion: GDPR-compliant use always depends on the individual case<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-2-18779ed42ead9a06b2e30c8fb3950e96\">\n#top .hr.hr-invisible.av-kdu4eeyn-2-18779ed42ead9a06b2e30c8fb3950e96{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-2-18779ed42ead9a06b2e30c8fb3950e96 hr-invisible  avia-builder-el-68  el_after_av_heading  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-kmw0krvz-1-891f8d857ad1ac4359d37540f7dbea52'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>At the current state of affairs, the fully GDPR-compliant use of Office 365 is not possible. It is only necessary to configure the Microsoft services to be as data protection-compliant as possible, which, however, cannot be fully covered by the Microsoft products. However, this realisation only helps a few companies, because the Microsoft services are not so easy to replace in many companies due to volume licenses and daily use. In addition, the German supervisory authorities and the European Data Protection Supervisor position themselves very differently and anything but clearly on this topic. So what can companies do to achieve a minimum level of GDPR compliance when using Office 365?<\/p>\n<p><strong>Our recommendations: <\/strong><\/p>\n<ol>\n<li>Follow the coverage of the upcoming talks with Microsoft and the further positioning of the regulators<\/li>\n<li>To the extent possible, adjust the settings of your Microsoft products to be as GDPR compliant as possible<\/li>\n<li>Document the measures taken in your data protection documentation in order to be meaningful in the event of a review by the competent supervisory authority<\/li>\n<\/ol>\n<p>For companies, the current situation means that not only the additional security features described above must be available for a more secure operation of Office 365 in compliance with data protection, but that a functioning data protection management system must be established in any case, which on the one hand fulfils the documentation and verification obligations of the GDPR and on the other hand documents the implementation of the risk assessments as part of a data protection impact assessment.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lmq8wxqa-f9994ff04d8dc4a8dbf33599fa237a08\">\n#top .av-special-heading.av-lmq8wxqa-f9994ff04d8dc4a8dbf33599fa237a08{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lmq8wxqa-f9994ff04d8dc4a8dbf33599fa237a08 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lmq8wxqa-f9994ff04d8dc4a8dbf33599fa237a08 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lmq8wxqa-f9994ff04d8dc4a8dbf33599fa237a08 av-special-heading-h3 blockquote modern-quote  avia-builder-el-70  el_after_av_textblock  el_before_av_codeblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Get in contact<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-72  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-74  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company&#038;t=Microsoft%20365%3A%20DSGVO-konformer%20Einsatz%20im%20Unternehmen' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Microsoft%20365%3A%20DSGVO-konformer%20Einsatz%20im%20Unternehmen&#038;url=https:\/\/www.robin-data.io\/en\/?p=9486' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Microsoft%20365%3A%20DSGVO-konformer%20Einsatz%20im%20Unternehmen&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Microsoft%20365%3A%20DSGVO-konformer%20Einsatz%20im%20Unternehmen&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-75  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">This might interest you too:<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-77  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-78  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-8483 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server' data-rel='slide-1' class='slide-image' title='Attackers-attack-Microsoft-Exchange-Server'><img decoding=\"async\" loading=\"lazy\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attacker-attack-Microsoft-Exchange-Server\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server' title='Attackers-attack-Microsoft-Exchange-Server'>Attackers-attack-Microsoft-Exchange-Server<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Attackers are exploiting various vulnerabilities and attacking Microsoft Exchange Server. Read what companies need to do now!<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-03-16T21:40:40+01:00\" >16 March 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/hacker-attack-microsoft-exchange-server#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-04-13T14:27:51+02:00\" >2021-03-16 21:40:40<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:38:42<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attackers-attack-Microsoft-Exchange-Server<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-2827 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed' data-rel='slide-1' class='slide-image' title='Data breach Microsoft customer records leaked'><img decoding=\"async\" loading=\"lazy\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne-495x343.jpg\" class=\"wp-image-14081 avia-img-lazy-loading-14081 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data breach Microsoft customer data records leaked\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed' title='Data breach Microsoft customer records leaked'>Data breach Microsoft customer records leaked<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >In December 2019, 250 million support requests to Microsoft were available online for two days. Security researchers reported the data breach to Microsoft.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2020-01-24T14:20:26+01:00\" >January 24, 2020<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-04-13T14:27:51+02:00\" >2020-01-24 14:20:26<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-22 09:17:35<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data breach Microsoft customer records leaked<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-1123 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism' data-rel='slide-1' class='slide-image' title='Microsoft Office 365 data protection under criticism'><img decoding=\"async\" loading=\"lazy\" width=\"495\" height=\"341\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft-495x341.jpg\" class=\"wp-image-14087 avia-img-lazy-loading-14087 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Microsoft Office 365 data protection criticised\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism' title='Microsoft Office 365 data protection under criticism'>Microsoft Office 365 data protection under criticism<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Microsoft Office 365 is questionable from a data protection perspective. Recently, its use in schools has been under criticism. What you need to consider when using it to avoid high data protection risks can be found in the article.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2019-09-23T10:06:17+02:00\" >September 23, 2019<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-of-microsoft-office-365-in-the-criticism#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>341<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Ulrich Hottelet<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Ulrich Hottelet<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-04-13T14:27:51+02:00\" >2019-09-23 10:06:17<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:35:57<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Microsoft Office 365 data protection under criticism<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Can Microsoft Office 365 be used in compliance with the GDPR? We show how the configuration complies with data protection.<\/p>","protected":false},"author":3,"featured_media":14087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[123,181],"class_list":["post-9486","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-aufgaben","tag-microsoft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Office 365: DSGVO-konformer Einsatz im Unternehmen | Wiki<\/title>\n<meta name=\"description\" content=\"Kann Microsoft Office 365 DSGVO-konform eingesetzt werden? Wir zeigen wie die Konfiguration dem Datenschutz entspricht. Jetzt lesen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft 365: DSGVO-konformer Einsatz im Unternehmen\" \/>\n<meta property=\"og:description\" content=\"Kann Microsoft Office 365 DSGVO-konform eingesetzt werden? Wir zeigen wie die Konfiguration dem Datenschutz entspricht. Jetzt lesen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T12:27:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:38:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Caroline Schwabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline Schwabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen\"},\"author\":{\"name\":\"Caroline Schwabe\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"headline\":\"Microsoft 365: DSGVO-konformer Einsatz im Unternehmen\",\"datePublished\":\"2021-04-13T12:27:51+00:00\",\"dateModified\":\"2025-03-24T12:38:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen\"},\"wordCount\":8686,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"keywords\":[\"Aufgaben\",\"Microsoft\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen\",\"name\":\"Office 365: DSGVO-konformer Einsatz im Unternehmen | Wiki\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"datePublished\":\"2021-04-13T12:27:51+00:00\",\"dateModified\":\"2025-03-24T12:38:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"description\":\"Kann Microsoft Office 365 DSGVO-konform eingesetzt werden? Wir zeigen wie die Konfiguration dem Datenschutz entspricht. Jetzt lesen!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg\",\"width\":685,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft 365: DSGVO-konformer Einsatz im Unternehmen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\",\"name\":\"Caroline Schwabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"caption\":\"Caroline Schwabe\"},\"description\":\"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/csc\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Office 365: GDPR-compliant use in the company | Wiki","description":"Can Microsoft Office 365 be used in compliance with the GDPR? We show how the configuration complies with data protection. Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company","og_locale":"en_GB","og_type":"article","og_title":"Microsoft 365: DSGVO-konformer Einsatz im Unternehmen","og_description":"Kann Microsoft Office 365 DSGVO-konform eingesetzt werden? Wir zeigen wie die Konfiguration dem Datenschutz entspricht. Jetzt lesen!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-microsoft-365-office-365-gdpr-compliant-use-in-company","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2021-04-13T12:27:51+00:00","article_modified_time":"2025-03-24T12:38:51+00:00","og_image":[{"width":685,"height":341,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","type":"image\/jpeg"}],"author":"Caroline Schwabe","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Caroline Schwabe","Estimated reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen"},"author":{"name":"Caroline Schwabe","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"headline":"Microsoft 365: DSGVO-konformer Einsatz im Unternehmen","datePublished":"2021-04-13T12:27:51+00:00","dateModified":"2025-03-24T12:38:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen"},"wordCount":8686,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","keywords":["Aufgaben","Microsoft"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen","name":"Office 365: GDPR-compliant use in the company | Wiki","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","datePublished":"2021-04-13T12:27:51+00:00","dateModified":"2025-03-24T12:38:51+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"description":"Can Microsoft Office 365 be used in compliance with the GDPR? We show how the configuration complies with data protection. Read now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150646\/Tastatur-Microsoft.jpg","width":685,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-microsoft-365-office-365-dsgvo-konformer-einsatz-im-unternehmen#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Microsoft 365: DSGVO-konformer Einsatz im Unternehmen"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5","name":"Caroline Schwabe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","caption":"Caroline Schwabe"},"description":"Ms. Schwabe is an information designer and Data Protection Officer. The focus of her work is to help customers and interested parties with contributions to the Robin Data Privacy Academy.","url":"https:\/\/www.robin-data.io\/en\/author\/csc"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/9486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=9486"}],"version-history":[{"count":66,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/9486\/revisions"}],"predecessor-version":[{"id":11444,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/9486\/revisions\/11444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14087"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=9486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=9486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=9486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}