How can Microsoft legally read a blogger’s hotmail emails to find the source of a leak?

catamount

Microsoft apparently went through the hotmail account of the blogger who posted leaked Windows code to find the source of the leak. Can they just do this? Is it legal for them to just go through and read peoples' emails whenever they have what they think is a good reason to do so?

Topic: Security
Answer this Question

Answers

4 total
Vote Up (9)

CAN they do this?  Sure.  Is it ethical?  Maybe, maybe not.  I have not read the T's and C's from Hotmail since I created my account in 1989.  I am sure they have changed since then.  I would certainly be surprised if their agreement did not give them the ultimate right to do that.  The agreements are usually written for the protection of the company, not the user.

 

Bottom line, I would personally not send anything out on a public network like that, that I was not willing to have made public...  

Vote Up (8)

Jim, even with a private e-mail system, such as the one we have at work, we tell users in the Acceptable Use Policy that anything they send on it is to be for business use, and is the property of the agency.  As a former IT director for a K-12 school district, we had similar language there as well.

 

Regardless, once you "send it out", there is always the possibility that it can be intercepted and read by those other than the intended recipient.

jimlynch
Vote Up (8)

The best way to avoid this is to not use Hotmail, Gmail or any other free email service. Once you agree to their terms, they can do whatever they want with your mail.

Number6
Vote Up (8)

You know those very long, very small print TOS (Terms of Service) agreements that you scroll through without reading, then click “I agree” so you can use the software/service/website/whatever? Microsoft has those for hotmail (or outlook as they call it now) and everyone that uses it has agree to. So, yes, you have already given Microsoft permission to go through your emails if they want to do so, and yes, it is perfectly legal.

Ask a question

Join Now or Sign In to ask a question.
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.
University and vendor researchers are congregating in San Diego this week at USENIX Security '14 to share the latest findings in security and privacy, and here are 5 that jumped out to me as being particularly interesting.
Nearly all of Facebook's outbound notification emails are now encrypted while traveling the Internet, a collaborative feat that comes from the technology industry's push to thwart the NSA's spying programs.
Many former employees retain alarming levels of access to critical business applications after they've stopped working for a company, a survey for cloud services firm Intermedia has claimed.
Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices.
The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.
A senior U.S. senator is asking airlines about their data privacy practices, saying he's concerned about what information the companies are collecting and sharing with third parties.
GuardiCore developing "honeypot" approach to detecting and blocking stealthy attacks.
You use Google's security tools to protect your Gmail account in your browser. Here's how to use them with applications and devices.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness