Microsoft Suing Government for Secret Searches

Microsoft Suing Government for Secret Searches

Microsoft is taking a stand against the U.S. Department of Justice. On April 14, the company filed a lawsuit against the DOJ stating they were not comfortable with the way that federal agents routinely search customers’ personal information in secret.

Microsoft has accused the federal government of adopting a “widespread, unconstitutional policy” of looking through personal data on Microsoft’s network and forcing the company to be quiet about it.

The company explained that over the past 18 months, federal judges have approved 2,600 secret searches of Microsoft customers and in two-thirds of those cases, the company was told they could not notify their customers that they’ve been searched for. This clause usually last forever because there is no expiration data on the judicial orders. The company cannot even go back and tell a customer, “In 2014, the federal government used our resources to check up on you.”

The lawsuit states that Microsoft believes their customers have a right to know when the government obtains a warrant to read their emails, and because Microsoft has a right to tell them.

The issue with this case is the double standard that comes along with the 1986 Electronic Communications Privacy Act. Normally, a person must be told when police obtain warrant to search a home, but nowadays, people keep lots of emails, notes, contact lists, and pictures on computer servers at Microsoft and elsewhere. Under the 1986 law, police can get special permission to search those computers and keep the company from informing the customer when law enforcement has conducted the secret search.

The federal agents, however, argue that the secrecy of the search is what helps them in their investigation. Microsoft counted with the argument that they still aren’t able to inform a customer even long after the investigation is over.

Despite the fact the lawsuit comes as the encryption battle between the FBI and Apple finds a resting spot, it show that data privacy is still a large part of the conversation between tech companies and the government.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3