How can Microsoft legally read a blogger’s hotmail emails to find the source of a leak?

catamount

Microsoft apparently went through the hotmail account of the blogger who posted leaked Windows code to find the source of the leak. Can they just do this? Is it legal for them to just go through and read peoples' emails whenever they have what they think is a good reason to do so?

Topic: Security
Answer this Question

Answers

4 total
Vote Up (11)

CAN they do this?  Sure.  Is it ethical?  Maybe, maybe not.  I have not read the T's and C's from Hotmail since I created my account in 1989.  I am sure they have changed since then.  I would certainly be surprised if their agreement did not give them the ultimate right to do that.  The agreements are usually written for the protection of the company, not the user.

 

Bottom line, I would personally not send anything out on a public network like that, that I was not willing to have made public...  

jimlynch
Vote Up (10)

The best way to avoid this is to not use Hotmail, Gmail or any other free email service. Once you agree to their terms, they can do whatever they want with your mail.

Vote Up (9)

Jim, even with a private e-mail system, such as the one we have at work, we tell users in the Acceptable Use Policy that anything they send on it is to be for business use, and is the property of the agency.  As a former IT director for a K-12 school district, we had similar language there as well.

 

Regardless, once you "send it out", there is always the possibility that it can be intercepted and read by those other than the intended recipient.

Number6
Vote Up (9)

You know those very long, very small print TOS (Terms of Service) agreements that you scroll through without reading, then click “I agree” so you can use the software/service/website/whatever? Microsoft has those for hotmail (or outlook as they call it now) and everyone that uses it has agree to. So, yes, you have already given Microsoft permission to go through your emails if they want to do so, and yes, it is perfectly legal.

Ask a question

Join Now or Sign In to ask a question.
Google, Dropbox and the Open Technology Fund are supporting a new organization focused on making open-source security and privacy tools more user-friendly.
Among six major U.S. cities, CSOs are paid the most in San Francisco and New York, but factoring in the cost of living makes Denver and Chicago the best bang-for-the-buck places.
Apple's iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless network authentication of Apple devices and gain access to enterprise networks.
Legislation introduced in the U.S. Senate on Thursday aims to place limits on access by U.S. law enforcement agencies to emails and other communications stored abroad.
Two online advertising networks, Google's DoubleClick and Zedo, have been delivering malicious advertisements that could install malware on a person's computer, according to the security vendor Malwarebytes.
Google is turning on data encryption by default in the next version of Android, a step that mirrors broad moves in the technology industry to ensure better data security.
CloudFlare said it has engineered a novel way to handle sensitive encryption keys that allows organizations such as financial institutions to still use its caching service to fend off cyberattacks.
Samsung on Thursday announced price reductions and updates for its Knox security and management software for IT shops and a free My Knox service that is directly available to professionals using ActiveSync.
The breach of Home Depot's payment systems may have compromised 56 million payment cards as a result of malware that has since been eliminated, the company said Thursday.
Apple outlined its new privacy policy and set up a site to explain what information it collects from users and how it handles it, as the company enters new areas like health tracking and mobile payments that have potential privacy implications.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness