Serveur d'impression

Déclaration de confidentialité de Windows 8.1 et Windows Server 2012 R2 – Serveur d’impression

Le 4 mai 2019 - 142 minutes de lecture

Dernière mise à jour: avril 2014

Notez que cette page est un complément à la déclaration de confidentialité de Windows 8.1 et Windows Server 2012 R2 («déclaration de confidentialité de Windows»), qui comprend les sections suivantes:

  • Points forts

  • Statement, qui est la déclaration de confidentialité complète de Windows 8.1, inclut des liens vers des déclarations de confidentialité pour les fonctionnalités de Windows dotées de leurs propres déclarations autonomes.

  • Supplément de fonctionnalités (cette page), qui décrit les fonctionnalités qui ont un impact sur la confidentialité dans Windows 8.1 et Windows Server 2012 R2.

  • Supplément d'applications, qui décrit les applications ayant un impact sur la confidentialité dans Windows 8.1

  • Supplément de serveur, qui décrit les fonctionnalités supplémentaires qui ont une incidence sur la confidentialité dans Windows Server 2012 R2.

Pour comprendre la collecte de données et les pratiques d'utilisation pertinentes pour une fonctionnalité ou un service particulier de Windows, vous devez lire la déclaration de confidentialité complète ainsi que tout supplément applicable ou déclaration autonome applicable.

Sommaire

Activation

Que fait cette fonctionnalité?

L'activation réduit la contrefaçon de logiciels, ce qui permet aux clients de Microsoft de bénéficier de la qualité logicielle attendue. Une fois votre logiciel activé, une clé de produit spécifique est associée au PC (ou au matériel) sur lequel votre logiciel est installé. Cette association empêche l'utilisation de la clé de produit pour activer la même copie du logiciel sur plusieurs PC. Certaines modifications apportées au matériel ou aux logiciels de votre ordinateur peuvent vous obliger à réactiver Windows. L'activation peut détecter et désactiver les exploits d'activation (logiciels qui contournent ou contournent l'activation logicielle de Microsoft). Si un exploit d'activation est présent, un fournisseur de logiciel ou de matériel informatique peut avoir altéré le logiciel Microsoft authentique afin de créer des copies contrefaites du logiciel. Les exploits d’activation peuvent interférer avec le fonctionnement normal de votre système.

Informations collectées, traitées ou transmises

Lors de l'activation, les informations suivantes sont envoyées à Microsoft:

  • Le code produit Microsoft (code à cinq chiffres identifiant le produit Windows que vous activez).

  • Un identifiant de canal ou un code de site qui identifie comment le produit Windows a été obtenu à l'origine. Par exemple, un identifiant de canal ou un code de site identifie si le produit a été acheté à l'origine dans un magasin de vente au détail, obtenu sous forme de copie d'évaluation, obtenu via un programme de licence en volume ou préinstallé par un fabricant de PC.

  • La date d'installation et si l'installation a réussi.

  • Informations permettant de confirmer que votre clé de produit Windows n'a pas été modifiée.

  • Marque et modèle PC.

  • Informations de version pour le système d'exploitation et les logiciels.

  • Paramètres de région et de langue.

  • Un numéro unique appelé identificateur global unique (GUID) attribué à votre PC.

  • Clé de produit (hachée) et ID de produit.

  • Nom du BIOS, numéro de révision et date de révision.

  • Numéro de série du volume du disque dur (haché).

  • Le résultat de la vérification d'activation. Cela inclut les codes d’erreur et les informations sur les exploits d’activation et les logiciels malveillants ou non liés, détectés ou désactivés:

    • L'identifiant de l'exploit d'activation.

    • L'état actuel de l'exploit d'activation, tel que nettoyé ou mis en quarantaine.

    • Identification du fabricant du PC.

    • Le nom de fichier et le hachage de l'exploit d'activation, ainsi qu'un hachage de composants logiciels associés pouvant indiquer la présence d'un exploit d'activation.

  • Le nom et un hachage du contenu du fichier d’instructions de démarrage de votre PC. Si votre licence Windows est basée sur un abonnement, des informations seront également envoyées sur le fonctionnement de votre abonnement. Les informations informatiques standard sont également envoyées.

  • Si vous utilisez une copie sous licence en volume de Windows utilisant un serveur d'activation, l'adresse IP de ce serveur peut être envoyée à Microsoft.

Utilisation de l'information

Microsoft utilise ces informations pour confirmer que vous disposez d'une copie sous licence du logiciel. Microsoft n'utilise pas ces informations pour contacter des consommateurs individuels. Les informations du serveur de licences sont utilisées pour garantir que les serveurs de licences respectent leurs contrats de licence.

Choix et contrôle

L'activation est requise et se produit automatiquement lors de la configuration de Windows. Si vous ne possédez pas de licence valide pour le logiciel, vous ne pourrez pas activer Windows.

Haut de page

Client AD RMS (Active Directory Rights Management Services)

Que fait cette fonctionnalité?

Le client AD RMS (Active Directory Rights Management Services) est une technologie de protection des informations qui fonctionne avec les applications compatibles AD RMS afin de protéger les informations numériques contre toute utilisation non autorisée. Les propriétaires d'informations numériques peuvent définir la manière dont les destinataires utilisent les informations contenues dans un fichier, telles que les personnes pouvant ouvrir, modifier, imprimer ou effectuer d'autres actions avec le fichier. Pour créer ou afficher un fichier avec des autorisations restreintes, votre ordinateur doit exécuter une application compatible AD RMS et avoir accès à un serveur AD RMS.

Informations collectées, traitées ou transmises

AD RMS utilise votre adresse électronique pour vous identifier sur un serveur AD RMS. En conséquence, votre adresse électronique est stockée sur le serveur et sur votre ordinateur sous forme de licences et de certificats d’identité créés par le serveur. Les certificats d'identité et les licences sont transférés vers et depuis les serveurs AD RMS lorsque vous essayez d'ouvrir, d'imprimer ou d'effectuer d'autres actions sur un document protégé par la gestion des droits. Si votre PC est connecté à un réseau d'entreprise, le serveur AD RMS est généralement exploité par l'entreprise. Si vous utilisez les services Windows Live AD RMS, le serveur est exploité par Microsoft. Pour protéger votre confidentialité, les informations envoyées aux serveurs Microsoft AD RMS sont cryptées.

Utilisation de l'information

La licence vous permet d'accéder aux fichiers protégés. Les certificats d'identité servent à vous identifier sur un serveur AD RMS et à vous permettre de protéger des fichiers et d'accéder à des fichiers protégés.

Choix et contrôle

Les fonctionnalités AD RMS doivent être activées via une application compatible AD RMS. Par défaut, ils ne sont pas activés. Vous pouvez choisir de ne pas les activer ou de les utiliser. Cependant, si vous ne les activez pas, vous ne pourrez pas accéder aux fichiers protégés.

Haut de page

ID de publicité

Que fait cette fonctionnalité?

Pour fournir une publicité plus pertinente, Windows permet aux applications d'accéder à un identifiant unique pour chaque utilisateur d'un appareil. Vous pouvez réinitialiser ou désactiver l'accès à cet identifiant à tout moment.

Informations collectées, traitées ou transmises

Si vous autorisez les applications à accéder à l'ID de publicité, Windows le fournira à toutes les applications qui le demandent. Les applications peuvent stocker ou transmettre ces informations.

Utilisation de l'information

Votre identifiant publicitaire est utilisé par les développeurs d'applications et les réseaux publicitaires pour vous fournir des publicités plus pertinentes en comprenant quelles applications vous utilisez et comment vous les utilisez. Les développeurs d'applications peuvent également l'utiliser pour améliorer la qualité de service en leur permettant de déterminer la fréquence et l'efficacité des annonces et de détecter les problèmes de fraude et de sécurité.

Si vous autorisez les applications à accéder à l'ID de publicité, l'utilisation de cet identifiant par chaque application est soumise aux pratiques de confidentialité de cette application.

Choix et contrôle

Si vous choisissez les paramètres express lors de la configuration de Windows, Windows autorisera les applications à utiliser votre identifiant publicitaire. Si vous choisissez de personnaliser les paramètres, vous pouvez contrôler l'accès à votre identifiant publicitaire en sélectionnant Permettre aux applications d'utiliser mon identifiant publicitaire pour les expériences entre applications sous Partage d'informations avec Microsoft et d'autres services. Après avoir configuré Windows, vous pouvez modifier ce paramètre dans Intimité dans les paramètres du PC. Si vous désactivez ce paramètre, l'ID de publicité n'est pas envoyé aux applications qui le demandent. Si vous choisissez de réactiver le paramètre, un nouvel identifiant sera généré.

Haut de page

Vérification

Audit permet à un administrateur de configurer Windows pour enregistrer l'activité du système d'exploitation dans un journal de sécurité accessible à l'aide de l'observateur d'événements et d'autres applications. Ce journal peut aider un administrateur à détecter les accès non autorisés au PC ou aux ressources sur le PC. Par exemple, ce journal peut aider les administrateurs à résoudre les problèmes et à déterminer si une personne s'est connectée au PC, a créé un nouveau compte utilisateur, a modifié une politique de sécurité ou a ouvert un document.

Informations collectées, traitées ou transmises

Les administrateurs déterminent quelles informations sont collectées, combien de temps elles sont conservées et si elles sont transmises à d'autres parties. Les informations peuvent inclure des informations personnelles, telles que des noms d'utilisateur ou des noms de fichiers. Pour plus d'informations, contactez votre administrateur. Aucune information n'est envoyée à Microsoft.

Utilisation de l'information

Les administrateurs déterminent également comment les informations d'audit sont utilisées. En règle générale, le journal de sécurité est utilisé par les auditeurs et les administrateurs pour suivre l'activité du PC ou pour identifier les accès non autorisés au PC ou aux ressources sur le PC.

Choix et contrôle

Les administrateurs déterminent si cette fonctionnalité est activée et comment les utilisateurs sont avertis. Les autres utilisateurs ne peuvent pas consulter le journal de sécurité à moins que l'administrateur ne leur permette d'y accéder. Vous pouvez configurer Audit sur votre PC en ouvrant la stratégie de sécurité locale dans les outils d'administration.

Haut de page

Biométrie

Que fait cette fonctionnalité?

Si votre ordinateur est équipé d'un lecteur d'empreintes digitales, vous pouvez utiliser votre empreinte pour vous connecter à Windows et vous identifier auprès des applications qui le prennent en charge.

Informations collectées, traitées ou transmises

Lorsque vous configurez une nouvelle empreinte digitale, les lectures de votre empreinte digitale sont stockées localement sur votre PC. Aucune information n'est envoyée à Microsoft. Lorsque vous utilisez votre empreinte digitale pour vous identifier dans une application, Windows la compare à l'empreinte sauvegardée sur votre PC et indique à l'application si l'empreinte numérisée correspond à celle associée à votre compte. Windows ne fournit pas les données de l’empreinte digitale numérisée à l’application.

Utilisation de l'information

Windows utilise les informations d'empreinte digitale que vous choisissez de stocker sur votre PC pour vous connecter à Windows à l'aide de votre empreinte digitale.

Choix et contrôle

Vous pouvez ajouter ou supprimer des empreintes digitales dans Options de connexion dans Comptes dans les paramètres du PC.

Haut de page

Chiffrement de lecteur BitLocker

Que fait cette fonctionnalité?

Le chiffrement de lecteur BitLocker permet de protéger vos données en les cryptant, ce qui peut empêcher un utilisateur non autorisé d’accéder à vos données. Lorsque BitLocker est activé sur un lecteur pris en charge, Windows chiffre les données sur le lecteur.

Informations collectées, traitées ou transmises

Lorsque BitLocker est activé à l'aide du cryptage logiciel, les clés cryptographiques en mémoire cryptent et décryptent en permanence les données au fur et à mesure de leur lecture ou de leur écriture sur le lecteur protégé. Lorsque BitLocker est activé à l'aide du cryptage matériel, le cryptage et le décryptage des données sont effectués par le lecteur.

Lors de l'installation de BitLocker, vous pouvez choisir d'imprimer une clé de récupération ou de l'enregistrer à un emplacement du réseau. Si vous configurez BitLocker sur un lecteur non amovible, vous pouvez également enregistrer votre clé de récupération sur un lecteur flash USB.

Si votre PC n'est pas associé à un domaine, vous pouvez sauvegarder votre clé de récupération BitLocker, votre ID de clé de récupération et votre nom d'ordinateur sur Microsoft OneDrive. Pour protéger votre vie privée, les informations sont envoyées cryptées via SSL.

Vous pouvez configurer BitLocker pour chiffrer les données à l'aide d'un certificat stocké sur une carte à puce. Lorsque vous protégez un lecteur de données à l'aide d'une carte à puce, la clé publique et l'identificateur unique de la carte à puce sont stockés non chiffrés sur le lecteur. Ces informations peuvent être utilisées pour localiser le certificat utilisé à l’origine pour générer le certificat de cryptage de la carte à puce.

Si votre PC dispose d'un matériel de sécurité doté d'au moins la version 1.2 du module de plateforme sécurisée (TPM), BitLocker utilise ce dernier pour fournir une protection des données améliorée du matériel pour le lecteur sur lequel Windows est installé. Pour plus d'informations, voir la section Services du module de plateforme sécurisée (TPM). Sur les ordinateurs équipés de TPM, vous pouvez également configurer un numéro d'identification personnel (PIN) pour vous aider à ajouter une couche de protection supplémentaire à vos données cryptées. BitLocker stockera ce code confidentiel basé sur TPM sous une forme chiffrée et hachée sur le lecteur.

Les informations collectées par BitLocker ne sont envoyées à Microsoft que si vous choisissez de sauvegarder votre clé de récupération sur OneDrive.

Utilisation de l'information

Les clés cryptographiques et les identificateurs globaux uniques (GUID) sont stockés dans la mémoire de l'ordinateur pour prendre en charge les opérations BitLocker. Les informations de récupération BitLocker vous permettent d'accéder à vos données protégées en cas de panne matérielle ou autre. Ces informations de récupération permettent à BitLocker de faire la distinction entre les utilisateurs autorisés et non autorisés.

Microsoft n'utilise vos clés de récupération individuelles à aucune fin. Lorsque les clés de récupération sont envoyées à OneDrive, Microsoft peut utiliser des données agrégées à leur sujet pour analyser les tendances et contribuer à l'amélioration de nos produits et services.

Choix et contrôle

Par défaut, BitLocker est désactivé. Sur un lecteur amovible, tout utilisateur peut activer ou désactiver BitLocker à tout moment en ouvrant le chiffrement de lecteur BitLocker dans le Panneau de configuration. Un administrateur peut activer ou désactiver BitLocker pour tous les lecteurs.

Vous pouvez afficher et gérer les clés de récupération stockées dans votre compte OneDrive.

Haut de page

Contacts

Que fait cette fonctionnalité?

Si vous utilisez l'application Contacts ou une application tierce prise en charge pour gérer vos contacts, vous pouvez choisir de partager des contacts spécifiques avec d'autres applications sur votre PC, d'afficher les informations de contact dans une fiche de contact ou de partager des informations de contact spécifiques avec d'autres applications de votre ordinateur. PC pour effectuer une action, telle que passer un appel ou mapper une adresse.

Informations collectées, traitées, stockées et transmises

Lorsqu'une application demande des informations de contact, Windows vous permet de choisir des contacts spécifiques à partager avec l'application. Les contacts peuvent provenir de l'application Contacts ou d'une application de contact tierce prise en charge. Windows ne partage pas l'intégralité de votre liste de contacts avec l'application requérante.

Si une application a accès à des informations sur l'un de vos contacts, telles qu'un numéro de téléphone ou une adresse électronique, Windows peut afficher une fiche de contact avec les informations supplémentaires fournies par votre application de contacts pour ce contact. Windows ne partage pas les informations de contact supplémentaires avec l'application affichant la fiche de contact.

Si vous tapez ou cliquez sur une commande telle que Appel, Email, ou Carte sur la carte de contact, Windows ouvre l'application appropriée pour effectuer cette action et fournit à cette application les informations de contact nécessaires pour effectuer l'action, telles que la fourniture du numéro de téléphone pour effectuer un appel.

Utilisation de l'information

Windows utilise les informations de contact de votre application de contacts pour partager des contacts spécifiques que vous choisissez, pour afficher des cartes de contact, pour ouvrir des applications et pour partager des informations de contact, afin de mener à bien les actions répertoriées sur les cartes de contact et d'afficher vos contacts dans Windows Search. L’utilisation des informations relatives à vos contacts par l’application Contacts est décrite dans la déclaration de confidentialité des applications de communication.

Si vous partagez des informations de contact avec une application tierce, l'utilisation de ces informations par l'application dépend des pratiques de confidentialité de cette tierce partie. Si vous partagez des informations de contact avec une application Microsoft, les règles de confidentialité de l’application seront expliquées dans la déclaration de confidentialité de l’application.

Choix et contrôle

Windows affiche et partage uniquement les informations de contact lorsque vous choisissez de partager des contacts spécifiques avec une application, d'afficher une fiche de contact ou de sélectionner une action dans la fiche de contact.

Haut de page

Découverte et configuration de périphériques

Windows possède plusieurs fonctionnalités qui vous aident à découvrir et à configurer des périphériques sur votre PC, notamment l'installation d'un périphérique, l'installation d'un périphérique haut débit mobile, la découverte du réseau et le couplage de périphériques sans fil.

Installation de l'appareil

Que fait cette fonctionnalité?

Lorsqu'un nouveau périphérique est installé sur votre PC, Windows peut automatiquement rechercher, télécharger et installer le logiciel du pilote du périphérique. Windows peut également télécharger des informations sur le périphérique, telles qu'une description, une image et le logo du fabricant. Certains périphériques, notamment certaines imprimantes, les webcams, les périphériques haut débit mobiles et les périphériques portables synchronisés avec Windows, possèdent une application permettant de pleinement activer les fonctionnalités du périphérique et l'expérience utilisateur. Si le fabricant de l'appareil a fourni une application pour le périphérique, Windows peut automatiquement télécharger et installer cette application à partir du Windows Store si vous êtes connecté au magasin.

Informations collectées, traitées ou transmises

Lorsque Windows recherche des pilotes, il contacte le service Windows Update en ligne pour rechercher et télécharger des pilotes de périphérique, si aucun pilote approprié n'est déjà disponible sur votre PC. Pour plus d'informations sur les informations collectées par Windows Update et son utilisation, voir la déclaration de confidentialité de Update Services.

Pour récupérer des informations sur votre périphérique et déterminer si une application est disponible, Windows envoie à Microsoft des données sur le périphérique, y compris son ID de périphérique (par exemple, ID matériel ou ID de modèle du périphérique que vous utilisez), votre région et votre langue. et la date à laquelle les informations sur le périphérique ont été mises à jour pour la dernière fois. Si une application de périphérique est disponible, Windows la télécharge et l'installe automatiquement à partir du Windows Store. L'application sera disponible dans votre compte Windows Store dans la liste des applications que vous possédez.

Utilisation de l'information

Les informations envoyées à Microsoft sont utilisées pour vous aider à déterminer et télécharger le pilote de périphérique, les informations et l'application appropriés pour votre périphérique. Microsoft n'utilise pas les informations envoyées pour vous identifier ou vous contacter.

Choix et contrôle

Si vous choisissez les paramètres express lors de la configuration de Windows, vous activez le téléchargement et l'installation automatiques des pilotes de périphérique, des informations sur le périphérique et des applications du périphérique. Si vous choisissez de personnaliser les paramètres, vous pouvez contrôler le téléchargement et l'installation automatiques des pilotes de périphérique, des applications et des informations en sélectionnant Obtenir automatiquement les pilotes de périphérique, les applications et les informations pour les nouveaux périphériques sous Protégez et mettez à jour votre PC. Après avoir configuré Windows, vous pouvez modifier ces paramètres dans le Panneau de configuration en sélectionnant Modifier les paramètres d'installation du périphérique, puis en sélectionnant Non, laisse moi choisir quoi faire.

Vous pouvez désinstaller une application de périphérique à tout moment sans désinstaller le périphérique, même si vous en aviez peut-être besoin pour utiliser certaines fonctionnalités du périphérique. Vous pouvez réinstaller une application après l'avoir désinstallée en allant dans la liste des applications que vous possédez dans le Windows Store.

Installation d'un périphérique haut débit mobile

Que fait cette fonctionnalité?

Si votre ordinateur est équipé d’un matériel haut débit mobile fourni par certains opérateurs mobiles, Windows peut automatiquement télécharger et installer une application vous permettant de gérer votre compte et votre plan de données avec l’opérateur mobile ayant fourni le matériel haut débit mobile de votre ordinateur. Des informations supplémentaires sur le périphérique sont également téléchargées pour vous aider à afficher votre connexion haut débit mobile dans des listes de réseaux.

Informations collectées, traitées ou transmises

Pour déterminer les informations sur le périphérique et l'application à télécharger, Windows envoie une partie des identifiants de matériel à partir de votre matériel haut débit mobile, ce qui nous permet d'identifier votre opérateur de téléphonie mobile. Pour protéger votre confidentialité, Windows n'envoie pas les identifiants de matériel haut débit mobiles complets à Microsoft.

Si votre opérateur de téléphonie mobile a fourni une application à Microsoft, Windows la télécharge à partir du Windows Store et l'installe. Lorsque vous ouvrez l'application après son installation, celle-ci aura accès à votre matériel haut débit mobile, y compris aux identifiants matériels uniques que l'opérateur de téléphonie mobile peut utiliser pour identifier votre compte.

Utilisation de l'information

Microsoft utilise la partie de l'identifiant de votre matériel haut débit mobile que Windows envoie pour déterminer l'application de votre opérateur à installer sur votre ordinateur. Une fois installée, l'application peut utiliser vos identifiants de matériel haut débit mobile. Par exemple, l’application d’un opérateur de téléphonie mobile peut utiliser ces identifiants pour rechercher un compte et planifier des informations en ligne. L’utilisation de ces informations par l’application sera soumise aux pratiques de confidentialité de votre opérateur de téléphonie mobile.

Choix et contrôle

Si vous choisissez les paramètres express lors de la première configuration de Windows, Windows recherchera et téléchargera automatiquement les applications de l'opérateur mobile. Vous pouvez activer et désactiver cette fonctionnalité dans le Panneau de configuration. Pour plus d'informations, voir la section Installation du périphérique ci-dessus.

Vous pouvez désinstaller l'application d'un opérateur de téléphonie mobile à tout moment sans désinstaller votre matériel haut débit mobile.

Découverte du réseau

Que fait cette fonctionnalité?

Lorsque vous connectez votre ordinateur à un petit réseau privé comme chez vous, Windows peut détecter automatiquement les autres ordinateurs et les périphériques partagés du réseau et rendre votre ordinateur visible pour les autres utilisateurs du réseau. Lorsque des périphériques partagés sont disponibles, Windows peut automatiquement s'y connecter et les installer. Les exemples de périphériques partagés incluent les imprimantes et les extensions de média, mais pas les périphériques personnels tels que les appareils photo et les téléphones portables.

Informations collectées, traitées ou transmises

Lorsque vous activez le partage et la connexion à des périphériques, des informations sur votre PC, telles que son nom et son adresse réseau, peuvent être diffusées sur le réseau local pour permettre à d'autres PC de le découvrir et de s'y connecter.

Afin de déterminer si les périphériques connectés à votre réseau doivent être installés automatiquement, certaines informations sur le réseau sont collectées et envoyées à Microsoft. Ces informations incluent le nombre de périphériques sur le réseau, le type de réseau (par exemple, réseau privé), ainsi que les types et les noms de modèle des périphériques sur le réseau. Aucune information personnelle, telle que le nom de réseau ou le mot de passe, n'est collectée.

Selon les paramètres d'installation de votre périphérique, lorsque Windows installe des périphériques partagés, Windows peut envoyer des informations à Microsoft et installer le logiciel de périphérique sur votre PC. Pour plus d'informations, voir la section Installation du périphérique.

Utilisation de l'information

Les informations envoyées à Microsoft concernant votre réseau permettent de déterminer quels périphériques du réseau doivent être installés automatiquement. Microsoft n'utilise pas ces informations pour vous identifier, vous contacter ou vous cibler.

Choix et contrôle

Si vous choisissez d'activer le partage et de vous connecter aux périphériques lorsque vous rejoignez un réseau, la découverte du réseau est activée pour ce réseau. Vous pouvez modifier ce paramètre pour votre réseau actuel en cliquant sur le type de réseau indiqué sous le nom du réseau dans Centre réseau et partage.

Vous pouvez choisir d'activer ou non la découverte du réseau et d'activer la configuration automatique des périphériques connectés au réseau en sélectionnant Modifier les paramètres de partage avancés dans le réseau et le centre de partage.

Appariement d'appareils sans fil

Que fait cette fonctionnalité?

Windows vous permet d’apparier votre ordinateur avec des périphériques sans fil utilisant Bluetooth ou Wi – Fi Direct. Wi – Fi Direct est une technologie sans fil qui permet aux périphériques de communiquer directement entre eux sans avoir à se connecter à un réseau Wi – Fi.

Informations collectées, traitées ou transmises

Lorsque vous sélectionnez Autoriser les appareils Bluetooth à trouver ce PC Dans les paramètres Bluetooth, Windows diffuse le nom de votre PC via Bluetooth pour permettre aux appareils compatibles Bluetooth de détecter et d’identifier votre PC.

Lorsque vous sélectionnez Ajouter un périphérique Sous Appareils dans les paramètres du PC, Windows diffuse le nom de votre ordinateur via Wi – Fi pour permettre aux appareils compatibles Wi – Fi Direct de le détecter et de l’identifier. Quand vous fermez Ajouter un périphérique, Windows arrête de diffuser le nom de votre PC via Wi – Fi.

Selon les paramètres d'installation de votre périphérique, lorsque Windows s'associe à des périphériques sans fil, Windows peut envoyer certaines informations à Microsoft et installer le logiciel de périphérique sur votre PC. Pour plus d'informations, voir la section Installation du périphérique ci-dessus.

Utilisation de l'information

Windows diffuse le nom de votre PC pour permettre à d’autres périphériques de s’identifier et de se connecter à votre PC. Le nom de votre ordinateur n’est pas envoyé à Microsoft.

Choix et contrôle

Pour indiquer si Windows diffuse le nom de votre ordinateur via Bluetooth, maintenez enfoncé ou cliquez avec le bouton droit de la souris sur votre ordinateur dans Périphériques et imprimantes dans le Panneau de configuration, sélectionnez Paramètres Bluetooth, puis sélectionnez Autoriser les appareils Bluetooth à trouver ce PC. Si vous ne souhaitez pas que Windows diffuse le nom de votre ordinateur via Wi – Fi lors de l’ajout de périphériques, désactivez temporairement Wi-Fi dans Paramètres sans fil du PC avant d’ajouter un périphérique.

Haut de page

Cryptage de l'appareil

Que fait cette fonctionnalité?

Le chiffrement de périphérique permet de protéger vos données en les chiffrant à l'aide de la technologie BitLocker Drive Encryption, qui peut aider à prévenir les attaques logicielles hors connexion. Lorsque vous activez le chiffrement de périphérique, Windows chiffre les données sur le lecteur sur lequel Windows est installé.

Informations collectées, traitées ou transmises

Lorsque vous utilisez le cryptage logiciel, les clés cryptographiques en mémoire cryptent et décryptent en permanence les données lors de la lecture ou de l'écriture sur le lecteur protégé. Lorsque vous utilisez le cryptage matériel, le cryptage et le décryptage des données sont effectués par le lecteur.

Windows utilise le module de plateforme sécurisée (TPM) de votre PC pour stocker et gérer les clés de chiffrement utilisées pour chiffrer votre lecteur. Lorsque le chiffrement de périphérique est activé, Windows chiffre automatiquement le lecteur sur lequel Windows est installé et génère une clé de récupération. La clé de récupération peut vous aider à accéder à vos données protégées en cas de défaillance matérielle ou de problèmes.

La clé de récupération BitLocker de votre PC est automatiquement sauvegardée en ligne dans le compte MicrosoftOneDrive de chaque compte d'administrateur connecté à un compte Microsoft. Votre nom d'ordinateur et un identifiant pour la clé de récupération sont également sauvegardés dans le même compte OneDrive. Pour protéger votre vie privée, les informations sont envoyées cryptées via SSL.

Utilisation de l'information

Les clés cryptographiques et les identificateurs globaux uniques (GUID) sont stockés en mémoire sur votre PC pour prendre en charge les opérations BitLocker. Les informations de récupération vous permettent d'accéder à vos données protégées en cas de certaines pannes matérielles ou d'autres problèmes, et permettent à BitLocker de faire la distinction entre les utilisateurs autorisés et non autorisés.

Microsoft sauvegarde vos informations de récupération dans votre compte OneDrive afin que vous puissiez y accéder en ligne. Nous n'utilisons pas les informations de clé de récupération et ne les stockons nulle part ailleurs que ce compte OneDrive. Nous pourrions utiliser des données globales sur les clés de récupération pour analyser les tendances et contribuer à l'amélioration de nos produits et services. Par exemple, nous pourrions utiliser ces informations pour déterminer la proportion de PC sur lesquels Device Encryption est activé.

Choix et contrôle

Si vous choisissez d'utiliser un compte Microsoft lors de la configuration de votre ordinateur et que celui-ci le prend en charge, le cryptage de l'appareil est activé et votre clé de récupération est sauvegardée dans votre compte OneDrive. Si vous choisissez d'utiliser un compte local lors de la configuration de votre PC, le cryptage de l'appareil est désactivé.

Si vous connectez ultérieurement un compte Microsoft à un compte d'administrateur sur votre PC:

  • Si le chiffrement de périphérique n’est pas déjà activé, Windows l’active automatiquement et sauvegarde les informations de récupération sur le compte OneDrive de cet utilisateur.

  • Si le chiffrement de périphérique est déjà activé, les informations de récupération de votre PC sont sauvegardées sur le compte OneDrive de cet utilisateur.

Vous pouvez afficher et gérer les clés de récupération stockées dans votre compte OneDrive ici.

Haut de page

Accès direct

Que fait cette fonctionnalité?

DirectAccess permet à votre PC de se connecter de manière transparente et à distance au réseau de votre lieu de travail chaque fois que votre PC est connecté à Internet, quel que soit votre emplacement.

Informations collectées, traitées ou transmises

À chaque démarrage de votre PC, DirectAccess tentera de se connecter à votre réseau de lieu de travail, que vous soyez ou non physiquement situé sur votre lieu de travail. Une fois connecté, votre PC téléchargera la politique du lieu de travail et vous pourrez accéder aux ressources configurées sur le réseau du lieu de travail. Votre administrateur de lieu de travail peut utiliser la connectivité DirectAccess pour gérer et surveiller à distance votre PC, y compris les sites Web que vous visitez, même lorsque vous n'êtes pas physiquement situé sur votre lieu de travail.

DirectAccess n'envoie aucune information à Microsoft.

Utilisation de l'information

Les politiques de votre entreprise déterminent la manière dont les informations collectées par votre administrateur de lieu de travail sont utilisées.

Choix et contrôle

DirectAccess doit être configuré par l'administrateur de votre lieu de travail à l'aide de la stratégie de groupe. Bien que votre administrateur puisse vous autoriser à désactiver temporairement certains éléments de DirectAccess, seul votre administrateur de lieu de travail peut empêcher Windows de tenter de se connecter à votre lieu de travail à des fins de gestion. Si vous ou votre administrateur de lieu de travail supprimez votre PC de votre domaine de lieu de travail, DirectAccess ne pourra plus se connecter.

Haut de page

Facilité d'accès au centre

Que fait cette fonctionnalité?

La facilité d'accès Center vous permet d'activer les options d'accessibilité et les paramètres pour vous aider à interagir plus facilement avec le PC.

Informations collectées, traitées ou transmises

Si vous utilisez cette fonctionnalité, il vous sera demandé de sélectionner les instructions appropriées.

Ces déclarations comprennent:

  • Les images et les textes à la télévision sont difficiles à voir.

  • Les conditions d'éclairage rendent difficile la visualisation des images sur mon moniteur.

  • Je n’utilise pas de clavier.

  • Je suis aveugle.

  • Je suis sourd.

  • J'ai des troubles de la parole.

Ces informations sont enregistrées dans un format non lisible par l'homme et stockées localement sur votre PC.

Utilisation de l'information

Un ensemble de recommandations de configuration vous est fourni en fonction des instructions que vous choisissez. Ces informations ne sont pas envoyées à Microsoft et ne sont pas accessibles aux autres utilisateurs, à l’exception de vous et des administrateurs de votre PC.

Choix et contrôle

Vous pouvez choisir les instructions que vous souhaitez sélectionner en sélectionnant Facilité d’accès dans le Panneau de configuration. Vous pouvez modifier vos choix à tout moment. Vous pouvez également choisir les recommandations que vous souhaitez configurer sur votre PC.

Haut de page

Observateur d'événements

Que fait cette fonctionnalité?

Les utilisateurs de PC, principalement les administrateurs, peuvent utiliser l'observateur d'événements pour afficher et gérer les journaux des événements. Les journaux des événements contiennent des informations sur le matériel, les logiciels et les événements de sécurité sur votre PC. Vous pouvez également obtenir des informations de Microsoft sur les événements dans les journaux des événements en cliquant sur Aide en ligne du journal des événements.

Informations collectées, traitées ou transmises

Les journaux des événements contiennent des informations sur les événements générés par tous les utilisateurs et toutes les applications du PC. Par défaut, tous les utilisateurs peuvent afficher les entrées du journal des événements. Toutefois, les administrateurs peuvent choisir de limiter l'accès aux journaux des événements. Vous pouvez accéder aux journaux des événements de votre PC en ouvrant l'observateur d'événements. Pour savoir comment ouvrir l'Observateur d'événements, voir Aide et support Windows.

Si vous utilisez l'aide en ligne du journal des événements pour rechercher des informations supplémentaires sur un événement spécifique, des informations sur l'événement sont envoyées à Microsoft.

Utilisation de l'information

Lorsque vous utilisez l'aide en ligne Event Log pour rechercher des informations sur un événement, les données d'événement envoyées depuis votre PC sont utilisées pour localiser et vous fournir des informations supplémentaires sur l'événement. Pour les événements Microsoft, les détails de l'événement seront envoyés à Microsoft. Microsoft n’utilise pas ces informations pour vous identifier, vous contacter ou vous cibler. Pour les événements associés à des applications tierces, les informations seront envoyées à l'emplacement spécifié par l'éditeur ou le fabricant tiers. Si vous envoyez des informations sur des événements à des éditeurs tiers ou à des fabricants, leur utilisation sera soumise aux pratiques de confidentialité de chaque tiers.

Choix et contrôle

Les administrateurs peuvent choisir de restreindre l'accès aux journaux de l'observateur d'événements. Les utilisateurs ayant un accès complet aux journaux de l'observateur d'événements peuvent les effacer. Sauf si vous avez préalablement consenti à l'envoi automatique des informations sur les événements lorsque vous cliquez sur l'aide en ligne du journal des événements, il vous sera demandé de confirmer que les informations qui vous sont présentées peuvent être envoyées par Internet. Aucune information du journal des événements ne sera envoyée sur Internet à moins que vous n'y consentiez. Les administrateurs peuvent utiliser la stratégie de groupe pour sélectionner ou modifier le site auquel les informations sur les événements sont envoyées.

Haut de page

Sécurité familiale

Que fait cette fonctionnalité?

Family Safety aide les parents à protéger leurs enfants lorsqu'ils utilisent un ordinateur. Les parents peuvent contrôler les applications, les jeux et les sites Web que les enfants sont autorisés à utiliser. Les parents peuvent également fixer des délais et recevoir des rapports d'activité réguliers par courrier électronique. Les parents peuvent gérer les restrictions et consulter les rapports d'activité localement sur le PC ou en ligne à l'aide du site Web Microsoft Family Safety.

Informations collectées, traitées ou transmises

Family Safety settings and reports of children’s activity are stored on your PC. Activity reports can include info about time spent using the computer, time spent in individual apps and games, and websites visited (including attempts to view blocked sites). Administrators on the PC can change settings and view the activity report.

If online management is turned on for a child account, parents can view the child’s activity report and change their settings on the Microsoft Family Safety website. A parent can allow other people to view activity reports and change settings by adding them as parents on the Microsoft Family Safety website. If the parent configuring Family Safety is signed into Windows with a Microsoft account, online management is automatically turned on.

When Family Safety is configured for a child account with online management enabled, weekly reports of the child’s activity will automatically be emailed to the parent.

Use of information

Windows and the Microsoft Family Safety website use the information collected to provide the Family Safety feature. Microsoft may analyze activity log information in aggregate for data quality purposes, but we don’t use this information to identify, contact, or target advertising to individual users.

Choice and control

Family Safety is turned off by default. You can access Family Safety by opening Family Safety in Control Panel. Only administrators can turn on Family Safety, and only users without administrative privileges can be monitored or restricted. Children can see their settings but can’t change them. If Family Safety is turned on, the child will receive a notification that Family Safety is monitoring their account each time they sign in to Windows. If you indicate that an account is a child account during account creation, you can choose to enable Family Safety for that account.

If the administrator setting up a child’s account is signed into Windows with a Microsoft account, online management is automatically enabled, and reports about the child’s activity will be sent weekly. Parent accounts can be added or removed on the Microsoft Family Safety website. Anyone added as a parent on the website can view a child’s activity report and change the child’s Family Safety settings, even if the parent isn’t an administrator on the PC the child uses.

To properly use Family Safety, only parents should be administrators of their PC, and children should not be granted administrative privileges. Please note that using this feature to monitor other users (such as adults) may violate applicable law.

Top of Page

Fax

What this feature does

The fax feature allows you to create and save fax cover pages, and to send and receive faxes using your PC and an external or a built-in fax modem or a fax server.

Information collected, processed, or transmitted

Information collected includes any personal information entered on a fax cover page, as well as identifiers contained within industry standard fax protocols such as Transmitting Subscriber ID (TSID) and Call Subscriber ID (CSID). By default, Windows uses "Fax" as the value for each identifier.

Use of information

Information entered in the sender dialog box is presented on the fax cover page. Identifiers such as the TSID and CSID might contain arbitrary text and are typically used by the receiving fax machine or PC to identify the sender. No information is sent to Microsoft.

Choice and control

Fax access is determined by your user account privileges on the PC. Unless a fax administrator changes access settings, all users can send and receive faxes. By default, all users can view the documents that they send and any fax that is received on the PC. Administrators can see all faxed documents, sent or received, and can configure fax settings, including who has permissions to view or manage faxes, and the TSID and CSID values.

Top of Page

Handwriting personalization—automatic learning

What this feature does

Automatic learning is a handwriting recognition personalization tool that is available on PCs with touch or tablet pen. This feature collects data about the words that you use and how you write them. This helps the handwriting recognition software improve its interpretation of your handwriting style and vocabulary and also improves auto correction and text suggestions for languages without input method editors (IMEs).

Information collected, processed, or transmitted

Information collected by automatic learning is stored in the user profile for each user on the PC. The data is stored in a proprietary format that can’t be read by using a text viewing app (for example, Notepad or WordPad) and is only available to other users if they are administrators on your PC.

The information collected includes:

  • Text from messages you compose and calendar entries you create by using email apps (for example, Office Outlook or Windows Live Mail) including any messages that you have already sent.

  • Ink that you write in Input Panel.

  • Recognized text from ink that you write in Input Panel or type using touch keyboards.

  • Alternate characters that you select to correct the recognized text.

Use of information

The information collected is used to help improve handwriting recognition by creating a version of the recognition software that's personalized to your own style and vocabulary, and to turn on auto correction and text suggestions as you type using touch keyboards.

The text samples are used to create an extended dictionary. The ink samples are used to help improve handwriting recognition for each user on a PC. No information is sent to Microsoft.

Choice and control

Automatic learning is turned on by default. You can turn automatic learning on or off at any time by going to Advanced settings dans Les langues in Control Panel. When you turn off automatic learning, any data that has been collected and stored by automatic learning is deleted.

Top of Page

HomeGroup

What this feature does

Windows allows you to easily link PCs on your home network so that you can share pictures, music, videos, documents, and devices. It also enables PCs to stream media to devices on your home network such as a media extender. These PCs and devices are your homegroup. You can help protect your homegroup with a password, and you can choose what you want to share.

Information collected, processed, or transmitted

You can access your own files, such as pictures, videos, music, and documents, from any PC in the homegroup. When you join a homegroup, account information (including email address, display name, and picture) for all Microsoft accounts on your PC will be shared with others in the homegroup in order to turn on sharing with those users.

Use of information

The information collected allows PCs in your homegroup to understand who to share content with and how to present it. No information is sent to Microsoft.

Choice and control

You have the ability to add or remove PCs from your homegroup and decide what is shared with other homegroup members. You can create a homegroup and manage its settings by going to HomeGroup sous Réseau in PC settings.

Top of Page

Input Method Editor (IME)

Microsoft Input Method Editors (IMEs) are used with East Asian languages to convert keyboard input to ideograms. This section addresses several features, including IME auto-tuning and prediction, IME conversion error reporting, and IME word registration.

Cloud IME candidates

What this feature does

When you use the Microsoft Pinyin IME to enter simplified Chinese characters, the IME can use an online service to look up candidate ideograms for typed input that doesn’t exist in a local dictionary on your PC.

Information collected, processed, or transmitted

As you type simplified Chinese characters using the Microsoft Pinyin IME, the IME suggests ideograms that you may want to use. If the IME cannot find a good suggestion in your local dictionary it will send the keyboard input to Microsoft to determine if there are better candidate ideograms for that input. If there are any, they’ll be displayed in the list of candidates and, if selected, will be added to the local dictionary. A randomly-generated unique identifier is also sent to help us analyze usage of this feature. The identifier isn’t associated with your Microsoft account, and it’s not used to identify, contact, or target advertising to you.

Use of information

Microsoft uses the information collected to look up cloud ideograms and to improve our products and services. We won’t use it to identify, contact, or target advertising to you.

Choice and control

Cloud IME candidates are turned off by default for the Microsoft Pinyin IME for simplified Chinese. To view or change this setting, open PC settings, click Time and language, Cliquez sur Region and language, choose your language, and then click Les options.

IME auto-tuning and prediction

What this feature does

Depending on the IME you use, and your settings, the auto-tuning and text suggestion features of IME might record words or word sequences to improve the selection of the ideograms displayed.

Information collected, processed, or transmitted

The IME auto-tuning (self-learning) and text suggestion features record a word or sequence of words and the frequency with which you use them. Auto-tuning information (excluding any digit/symbol character sequences) is stored in files for each user on a PC.

Use of information

Automatic learning and text suggestion data is used by the IME on your PC to improve the selection of ideograms displayed when you use the IME. If you choose to send this data to Microsoft, it is used to improve IME and related products and services.

Choice and control

The automatic learning and text suggestion features are on by default in those IMEs that support them. The data collected isn't sent automatically to Microsoft. You can choose whether or not to collect or send this data in Language in Control Panel.

IME conversion error reporting

What this feature does

If errors in presenting ideograms or in converting keyboard input to ideograms occur, this feature can collect information about the errors that can help Microsoft improve its products and services.

Information collected, processed, or transmitted

IME Conversion Error Reporting collects information about IME conversion errors, such as what you typed, the first conversion or prediction result, the string you chose instead, information about the IME you use, and information about how you use it. In addition, if you use the Japanese IME, you can choose to include automatic learning information in conversion error reports.

Use of information

Microsoft uses the information to improve our products and services. Microsoft doesn’t use the information to identify, contact, or target advertising to you.

Choice and control

After a certain number of conversion errors are stored, the Mis-Conversion Report Tool will ask whether you want to send a conversion error report. You also can choose to send a conversion error report from the IME Mis-Conversion Report Tool at any time. You can view the information contained in each report before choosing whether to send it. You can also turn on automatic sending of conversion error reports in IME Settings.

IME word registration

What this feature does

Depending on the IME you use, you might be able to use word registration to report unsupported words (words that might not be converted correctly to ideograms from keyboard input).

Information collected, processed, or transmitted

Registration reports can include the information you provide in the Add Word dialog box about the words being reported, and the software version number for an IME. These reports might include personal information, for example, if you add personal names using word registration. You have the opportunity to review the data being sent with each report before you choose to send it.

Use of information

Microsoft uses the information to help improve our products and services. Microsoft doesn’t use the information to identify, contact, or target advertising to you.

Choice and control

Each time you create a word registration report, you’re asked if you want to send this report to Microsoft. You can view the information contained in the report before choosing whether to send it.

Top of Page

Internet connection sharing

What this feature does

Internet connection sharing allows you to share your mobile broadband Internet connection with other devices over Wi‑Fi. You can also remotely start Internet connection sharing on your mobile broadband device from your PC if you’re signed in to both with the same Microsoft account.

Information collected, processed, or transmitted

When you share your Internet connection for the first time, Windows will automatically generate and store a network name and password. You can change these at any time.

If your PC supports it, and you’ve added your PC to your Microsoft account as a trusted device, Windows syncs the network name and password to your Microsoft account. Windows also syncs other information to let you remotely start Internet connection sharing from your other trusted devices. This information includes your Bluetooth radio’s hardware address and a random number used to help secure the connection.

Use of information

This information is used to set up Internet connection sharing. Microsoft doesn’t use the information to identify, contact, or target advertising to you.

Choice and control

If you sign in to a device that supports Internet connection sharing with your Microsoft account, and you add the device as a trusted device, the information necessary to remotely start Internet connection sharing will be synced to OneDrive. You can stop syncing the information by choosing not to sync passwords. For more info, see the "Sync settings" section of this page.

Top of Page

Internet printing

What this feature does

Internet printing lets you print over the Internet.

Information collected, processed, or transmitted

When you print using this feature, you must first connect and authenticate yourself to an Internet print server. The information that you'll need to submit to the print server will vary depending on the level of security that the print server supports (for example, you might be asked to provide a user name and password). After you're connected, you’re presented with a list of compatible printers. If your PC doesn’t have a print driver for your selected printer, you can choose to download a driver from the print server. Because print jobs aren’t encrypted, it might be possible for others to see the content being sent.

Use of information

The information collected enables you to print using remote printers. If you choose to use a print server hosted by Microsoft, we don’t use the information that you provide to identify, contact, or target advertising to you. If you send information to a third-party print server, use of the information will be subject to the third party's privacy practices.

Choice and control

You can turn Internet printing on or off by opening Programs and Features in Control Panel, and then selecting Turn Windows features on or off.

Top of Page

Language preferences

What this features does

You can add the languages you prefer to use to your language list in Windows 8.1. Apps and websites appear in the first language available in that list.

Information collected, processed, or transmitted

When you visit websites and install apps on your PC, your list of preferred languages is sent to the websites you visit and is available to the apps you use so they can provide content in your preferred languages.

Use of information

Your list of preferred languages is used by Microsoft’s websites and apps to provide content in your preferred languages. Microsoft doesn't use any language information to identify or contact you. Language information sent or used by third-party websites and apps is subject to the privacy practices of the third-party website or app publisher.

Choice and control

Your list of preferred languages is available to the apps you install and websites you visit. You can add or remove languages from this list in Language preferences in Control Panel. If you don’t have any languages in this list, the language you choose on the Formats tab in Region in Control Panel will be sent to the websites you visit.

Top of Page

Location services

Windows location services let you decide which apps, websites, and Windows features you want to allow to determine your PC’s location. Windows location services consist of two components. Windows Location Provider connects to a Microsoft online service to determine your location. Windows Location Platform determines your PC’s location using hardware, such as a GPS sensor, or software, such as Windows Location Provider.

Windows Location platform

What this feature does

If you choose to turn on the Windows Location Platform, apps you install from the Windows Store, as well as some Windows features, can ask for permission to determine your PC’s location. If you let an app use your location, in addition to providing your location while you use the app, Windows Location Platform can tell the app when your PC moves inside or outside of app-defined geographical boundaries. For example, an app could let you set a reminder to pick up groceries when you leave work. Depending on your system’s configuration, the Windows Location Platform may determine your PC’s location using hardware, such as a GPS sensor, or software, such as Windows Location Provider.

Windows Location Platform doesn’t prevent apps from determining your PC’s location in other ways. For example, you can install devices (such as a GPS receiver) that might send location information directly to an app and bypass the platform. Regardless of your Windows Location Platform settings, online services can use your IP address to determine its approximate location—usually the city your PC is in.

Information collected, processed, or transmitted

The Windows Location Platform itself doesn’t transmit any information from your PC, but individual Location Providers (such as the Windows Location Provider) might transfer information when Windows Location Platform asks them to determine your PC’s location. Apps, websites, and features that are authorized to use the platform to determine your PC’s location could also transmit or store that information. If an app sets up geographical boundaries to monitor, those boundaries are stored encrypted on your PC. The information stored about these boundaries includes a name, a location, and whether your PC was inside or outside the boundary the last time its location was determined. Apps that set up geographical boundaries might transmit or store this information

Use of information

If you turn on the Windows Location Platform, authorized apps, websites, and Windows features will be able to access your PC’s location and use it to give you personalized content. If you use a third-party app or Location Provider, its use of your PC’s location is subject to the third party’s privacy practices. Before you download a Windows Store app, you’ll be able to see whether the app is location aware in the app description.

Choice and control

By choosing express settings during Windows Setup, you turn on the Windows Location Platform. If you choose to customize settings, you can control the Windows Location Platform by selecting Let Windows and apps request my location from the Windows Location Platform under Share info with Microsoft and other services. The first time each Store app requests your PC’s location, Windows will ask whether you want to allow the app to use your location. You can view and change this setting for each Store app in Permissions in the app’s settings.

If you use a desktop app that uses Windows Location Platform, it should ask your permission to use your PC’s location, and when it accesses your PC’s location, an icon will appear in the notification area to let you know that your PC’s location has been accessed. Each user can control their own location settings for apps in Intimité in PC settings. In addition, administrators can choose to turn off the location platform for all users in Location Settings in Control Panel. To prevent apps from being notified when geographic boundaries defined by apps are crossed, an administrative user can turn off the Windows Location Framework Service in Control Panel.

Windows Location Provider

What this feature does

The Windows Location Provider connects to the online Microsoft Location Service, which helps determine your PC’s approximate location based on Wi‑Fi networks near your PC and your PC's IP address.

Information collected, processed, or transmitted

When an app you’ve authorized to receive your location requests it, the Windows Location Platform will ask all installed Location Providers (including Windows Location Provider) to determine your PC's current location. The Windows Location Provider will first check to see if it has a stored list of nearby Wi‑Fi access points from a prior request made by a location-aware app. If there isn't already a list of nearby Wi‑Fi access points, or the list is out of date, the provider sends information about nearby Wi‑Fi access points and GPS information (if available) to the Microsoft Location Service. The service returns your PC’s approximate location back to the provider, which passes the location to the Windows Location Platform, which in turn provides it to the app that requested your PC's location. Windows Location Provider may also update its stored list of Wi‑Fi access points. The Windows Location Provider maintains this list so it can determine your PC’s approximate location without connecting to the Internet each time. This list of access points is encrypted when stored on disk so that apps can't directly access it.

The information that's sent about nearby Wi‑Fi access points includes BSSID (the MAC address of the Wi‑Fi access point) and signal strength. The GPS information includes observed latitude, longitude, direction, speed, and altitude. To help protect your privacy, Windows Location Provider doesn’t send any information to uniquely identify your PC beyond the standard computer information sent with all connections to the Internet. To help protect the privacy of Wi‑Fi network owners, Windows doesn’t send information about SSIDs (Wi‑Fi access point names) or hidden Wi‑Fi networks. For privacy and security purposes, information sent about Wi‑Fi networks is sent encrypted via SSL.

If you choose to help improve the Microsoft Location Service, Windows might send information about nearby Wi‑Fi access points to Microsoft again after an app has requested your PC’s location. If you’re using a metered Internet connection, Windows will limit the number of times per day it sends this information to limit the use of your Internet connection.

Use of information

The information is used by the Windows Location Provider to give Windows Location Platform the approximate location of your PC when an authorized app requests it.

If you choose to help improve the Microsoft Location Service, the Wi‑Fi and GPS info sent to Microsoft is used to improve Microsoft’s location services, which in turn helps to improve the location services provided to your apps. Microsoft doesn't store any data collected from this service that could be used to identify, contact, target advertising to you, or to track or create a history of your PC’s location.

Choice and control

The Windows Location Provider is used only if an authorized app has requested your PC's location. For more info about how to control whether apps can request your PC's location, see the Windows Location Platform section. If you authorize apps to request your PC's location, the cached list of nearby Wi‑Fi access point locations that are encrypted and stored by the Windows Location Provider will be deleted and replaced periodically.

If you choose express settings while setting up Windows, you choose to help improve the Microsoft Location Service. If you choose to customize settings, you can control whether to help improve the Microsoft Location Service by selecting Send some location data to Microsoft when location-aware apps are used sous Help improve Microsoft products and services. After setting up Windows, you can change this setting in Location Settings in Control Panel. If you choose not to help improve the service, you'll still be able to use the Windows Location Provider to determine your PC’s approximate location.

You can turn the Windows Location Provider on or off by opening Turn Windows features on or off in Control Panel. If you turn off the Windows Location Provider, you can still use other Location Providers (such as GPS) with the Windows Location Platform.

Top of Page

Manage your credentials

What this feature does

Windows lets you connect Windows Store apps to accounts you use for websites. If you’ve previously saved a password for a website in Internet Explorer, Windows can use the saved password when you connect an app to that website.

Information collected, processed, or transmitted

When an app asks for credentials to sign in to a website, you can choose to save those credentials. If you’ve already signed in to the website in Internet Explorer and have chosen to save your credentials, Windows automatically fills in the saved credentials. The credentials are stored encrypted on your PC. For more info about how these and other credentials may be synced to OneDrive, see the "Sync settings" section of this page.

Use of information

Windows only uses the saved credentials to help you sign in to the websites you have selected. If you save credentials while connecting an app to a website, the saved credentials won't be used in Internet Explorer or other apps.

Choice and control

You can manage saved credentials in Credential Manager in Control Panel. For more information about how these and other credentials may be synced to OneDrive, see the "Sync settings" section of this page.

Top of Page

Name and account picture

What this feature does

To provide personalized content, apps can request your name and account picture from Windows. Your name and account picture are displayed under Your account dans Comptes in PC settings. If you sign in to Windows with a Microsoft account, Windows will use the name and account picture associated with that account. If you haven’t chosen a picture for your account, your account picture will be a default picture provided by Windows.

Information collected, processed, or transmitted

If you allow apps to access your name and account picture, Windows will provide that information to all apps that request it. Apps might store or transmit this information.

If you sign in to Windows with a domain account, and you choose to allow apps to use your name and account picture, apps that can use your Windows credentials will be allowed to access certain other forms of your domain account information. This information includes, for example, your user principal name (like [email protected]) and DNS domain name (like corp.contoso.comjack).

If you sign in to Windows with a Microsoft account, or if you sign in to Windows with a domain account connected to a Microsoft account, Windows can automatically sync your account picture on your PC with your Microsoft account picture.

Use of information

If you use a third-party app, how the app uses your name and account picture is subject to the third party’s privacy practices. If you use a Microsoft app, the app’s privacy practices will be explained in its privacy statement.

Choice and control

If you choose express settings while setting up Windows, Windows will allow apps to access your name and account picture. If you choose to customize settings, you can control access to your name and account picture by selecting Let apps use my name and account picture sous Share info with Microsoft and other services. After setting up Windows, you can turn change this setting in Intimité in PC settings. You can change your account picture in Comptes in PC settings. You can also choose to allow certain apps to change your account picture.

Top of Page

Network awareness

What this feature does

If you have a subscription plan for network access (for example, via a mobile broadband connection), this feature provides information about your subscription plan to apps and Windows features on your PC. Windows features and apps can use this information to optimize their behavior. For example, if you’re on a metered data plan, Windows Update will wait to deliver lower priority updates to your PC until you’re connected to another type of network. This feature also provides information about your network connection, such as signal strength and whether your PC is connected to the Internet.

Information collected, processed, or transmitted

This feature collects Internet and intranet network connectivity information, such as the Domain Name Service (DNS) suffix of your PC, network name, and gateway address of the networks that your PC connects to. This feature also receives subscription plan information such as the amount of data remaining in the plan.

Network connectivity profiles can include a history of all networks visited and the date and time of the last connection. This feature can attempt to connect to a Microsoft server to determine whether you're connected to the Internet. The only data sent to Microsoft during network connectivity checks is standard PC information.

Use of information

If data is sent to Microsoft, it is only used to provide network connectivity status. Network connectivity status is made available to apps and features on your PC that request network connectivity information. If you use a third-party app, use of the information collected will be subject to the third party's privacy practices.

Choice and control

Network Awareness is on by default. An administrator can turn it off using the Services options in Administrative Tools in Control Panel. Disabling this feature isn't recommended because it will prevent some Windows features from functioning properly.

Top of Page

Notifications, lock screen apps, and tile updates

Windows Store apps can automatically receive content and display notifications in several ways. They can, for example, receive notifications that are displayed briefly in the corner of the screen or on app tiles if those tiles are pinned to Start. You can also receive those notifications on the lock screen if you’d like. The lock screen can display detailed or brief status for certain apps as well. App publishers can send content to your Windows Store apps through the Windows Push Notification Service running on Microsoft servers, or the apps can download information directly from third-party servers.

Notifications

What this feature does

Windows Store apps can deliver periodic or real-time information to you that will be displayed briefly as notifications in the corner of the screen.

Information collected, processed, or transmitted

Apps can display text, images, or both in notifications. The contents of notifications can be provided locally by the app (for example, an alarm from a clock app). Notifications can also be sent from an app's online service through the Windows Push Notification Service (for example, a social network update). Images displayed in notifications may be downloaded directly from a server specified by the app publisher; when that happens, standard computer information will be sent to that server.

Use of information

Microsoft only uses notification information to deliver notifications from your apps to you. The notification can be stored temporarily by the Windows Push Notification Service before delivery to your PC. If a notification can’t be delivered immediately, it will only be stored for a few minutes before it’s deleted.

Choice and control

You can turn off notifications for all apps or for individual apps in Notifications sous Search & apps in PC settings. If you turn off notifications for an app or uninstall it, the app publisher could still send updates to the Windows Push Notification Service, but those notifications won’t display on your PC.

Lock screen apps

What this feature does

Some Windows Store apps can display status and notifications on the screen when your PC is locked. Lock screen apps can also perform tasks while the PC is locked, such as syncing email in the background or letting you answer incoming phone calls. You can also use your PCs camera directly from the lock screen.

Information collected, processed, or transmitted

Lock screen apps can receive status updates from the app publisher through the Windows Push Notification Service, or directly from the app publisher’s (or another third party’s) servers. Lock screen apps could also transmit or process other information unrelated to notifications and updates.

Use of information

Windows uses the status and notification information provided by the lock screen apps to update the lock screen.

Choice and control

After you set up Windows, the Mail, Calendar, and Skype apps are automatically set as lock screen apps. You can add or remove these or other apps from the lock screen and turn off use of the Camera in Lock screen sous PC & devices in PC settings. You can also choose one app to persistently display detailed status (for example, details for the next appointment on your calendar) on the lock screen.

You can control whether lock screen apps can display notifications on the lock screen in Notifications sous Search & apps in PC settings.

Tile updates

What this feature does

Windows Store apps can deliver periodic or real-time information to you that will be displayed as updates to your apps’ tiles in Start.

Information collected, processed, or transmitted

Store apps that are pinned to Start can update their tiles with text, images, or both. The content displayed on an app’s tile can be provided locally by the app, downloaded periodically from a server specified by the app publisher, or sent from an app's online service through the Windows Push Notification Service. If tile content is downloaded directly from a server specified by the app publisher, standard computer information will be sent to that server.

Use of information

Microsoft only uses tile information to deliver tile updates from your apps to you. This information can be stored temporarily by the Windows Push Notification Service before delivery to your PC. If a tile update can’t be delivered immediately, it will only be stored for a few days before it’s deleted.

Choice and control

After an app has started receiving tile updates, you can turn them off by selecting the app’s tile in Start and selecting Turn live tile off in the commands that are available for the app. If you unpin an app’s tile from Start, its tile updates won’t display. If you uninstall an app, the app publisher could still send updates to the Windows Push Notification Service, but they won’t display on your PC.

To clear the current updates displayed on your Start tiles, swipe from the right side or point to the upper right corner of Start, tap or click Réglages, and then tap or click Tiles. Tap or click the Clair button under Clear personal info from my tiles. Tile updates delivered after you clear the current updates will continue to appear.

Top of Page

Order prints

What this feature does

Order Prints enables you to send digital pictures stored on your PC or a network drive to an online photo printing service of your choice. Depending on the service, you can have your pictures printed and then delivered using postal mail or you can pick up the prints at a local store.

Information collected, processed, or transmitted

If you decide to place an order with an online photo printing service, your digital photos are sent over the Internet to the service that you selected. The file path to the digital pictures that you select (which might include your user name) might be sent to the service in order to allow the service to display and upload the images. Digital picture files might contain data about the image that was stored with the file by the camera, such as the date and time that the picture was taken or the location where the picture was taken if your camera has GPS capabilities. The files might also contain personal information (such as captions) that might have been associated with the file through the use of digital picture management apps and File Explorer. For more information, see the Properties section below.

After you select an online photo printing service from Order Prints, you'll be redirected to the service’s website in the Order Prints window. Information you enter on the online photo printing services website is transmitted to the service.

Use of information

The information stored in the digital picture files by the camera might be used by the online photo printing service during the printing process, for example, to adjust the color or sharpness of the image before it is printed. Information stored by digital picture management apps might be used by the online photo printing service to print as captions on the front or back of the print copy. The online photo printing services’ use of this information, and other information you provide to the services, such as information you enter on their websites, will be subject to their privacy practices.

Choice and control

You can use Order Prints to choose which pictures to send and which service to use to print your pictures. Some picture management apps might be able to help you remove stored personal information before sending pictures to be printed. You might also be able to edit the properties of the file to remove stored personal information.

Top of Page

Prefetching and Prelaunching

What this feature does

Windows helps apps and Windows features launch faster by keeping track of when and how frequently those apps and features are used and which system files they load.

Information collected, processed, or transmitted

When you use an app or Windows feature, Windows saves some information on your PC about the system files used as well as when and how frequently the app or feature was used.

Use of information

Windows uses the information about app and feature usage to help apps and features launch faster. In some cases, apps may be automatically launched in a suspended state.

Choice and control

Apps that are automatically launched and suspended appear in Task Manager and can be terminated. While suspended, those apps cannot access your webcam or microphone until you launch them, even if you have previously enabled that functionality.

Top of Page

Program Compatibility Assistant

What this feature does

If an incompatibility problem is found with a desktop app that you try to run, Program Compatibility Assistant will try to help you resolve it.

Information collected, processed, or transmitted

If an incompatibility problem is found with an app you attempt to run, a report is generated that includes information such as the app name, app version, the needed compatibility settings, and your actions with the app so far. Problems about incompatible apps are reported to Microsoft through Windows Error Reporting or the Windows Customer Experience Improvement Program (CEIP).

Use of information

Error reports are used to provide you with responses to problems that you report for your apps. Responses contain links (when available) to the app publisher's website so you can learn more about possible solutions. Error reports created due to app failures are used to try to determine which setting to adjust when you encounter compatibility problems for the apps that you're running on this version of Windows. Information reported through CEIP is used to identify app compatibility problems.

Microsoft doesn’t use any information collected through this feature to identify, contact, or target advertising to you.

Choice and control

For problems reported through Windows Error Reporting, an error report is created only when you select the option to check online for a solution. Unless you have previously consented to report problems automatically so you can check for solutions, you're asked if you want to send the error report. For more information, see the Windows Error Reporting section.

Some issues will automatically be reported through Windows CEIP if you’ve chosen to turn it on. For more information, see the Windows Customer Experience Improvement Program section.

Top of Page

Propriétés

What this feature does

Properties are file information that allow you to quickly search and organize your files. Some properties are intrinsic to the file (for example, the size of the file) while others might be specific to an app or device (for example, the settings of your camera when you took a photo or the location data recorded by the camera for the photo).

Information collected, processed, or transmitted

The type of information stored will depend upon the type of file and the apps that use it. Examples of properties include file name, date modified, file size, author, keywords, and comments. Properties are stored in the file, and they move with the file if it is moved or copied to another location, such as a file share, or sent as an email attachment.

Use of information

Properties can help you more quickly search and organize your files. They can also be used by apps to perform app-specific tasks. No information is sent to Microsoft.

Choice and control

You can edit or remove some properties for a file by selecting the file in File Explorer and clicking Propriétés. Some intrinsic properties, such as date modified, file size, file name, and some app-specific properties can’t be removed this way. For app-specific properties, you can edit or remove them only if the app used to generate the file supports these features.

Top of Page

Proximity

Near-field proximity service

What this feature does

If your PC has near-field communication (NFC) hardware, you can physically tap it against another device or accessory with NFC hardware to share links, files, and other information. There are two types of proximity connections: Tap and Do and Tap and Hold. With Tap and Do, you can create a brief or long-term connection between devices over Wi‑Fi, Wi‑Fi Direct, or Bluetooth. With Tap and Hold, the connection is active only as long as the devices are held next to each other.

Information collected, processed, or transmitted

When you tap proximity enabled devices together, they exchange information to establish a connection with each other. Depending on the way the devices are configured, this data can include Bluetooth pairing information, Wi‑Fi network addresses, and the name of your PC.

After a connection is established, other information might be exchanged between devices, depending on the specific proximity feature or app you’re using.  Windows can send files, links, and other information between devices using a proximity connection. Apps that use proximity can send and receive any information they have access to. This information might be sent through your network or Internet connection, or directly through a device-to-device wireless connection.

Use of information

Network and PC information exchanged over a proximity connection is used to establish a network connection, and to identify the devices connecting to each other. Data transferred through a proximity connection initiated within an app can be used by that app in any way. No information is sent to Microsoft.

Choice and control

Near field proximity service is on by default. An administrator can turn it off using the options provided in Devices and Printers in Control Panel.

Tap and Send

What this feature does

Windows Tap and Send makes it easy to share selected information with a friend standing next to you or with another one of your devices such as a mobile phone. For example, when you’re in a browser, you can start Tap and Send from the Devices pane. The next device you tap will receive a link to the webpage currently being displayed. This also works with any app that supports sharing information, such as pictures, text, or files.

Information collected, processed, or transmitted

Tap and Send uses the information you're sharing and the information described in the Near field proximity service section above.

Use of information

This information is only used to create the connection between the two devices. The shared information isn’t stored by Tap and Send. No information is sent to Microsoft.

Choice and control

If Near-field proximity service is turned on, Tap and Send is also turned on. For more information, see the Near-field proximity service section.

Top of Page

Remote Access connections

What this feature does

Remote Access connections allow you to connect to private networks using a virtual private network (VPN) connection and Remote Access Service (RAS). RAS is a component that connects a client PC (typically your PC) to a host PC (also known as a remote access server) using industry standard protocols. VPN technologies allow users to connect to a private network, such as a corporate network, over the Internet.

A Remote Access connections component, Dial-up Networking, allows you to access the Internet using a dial-up modem or broadband technology such as a cable modem or a digital subscriber line (DSL). Dial-up Networking includes dialer components such as RAS Client, Connection Manager, and RAS Phone, as well as command-line dialers like rasdial.

Information collected, processed, or transmitted

The dialer components collect information from your PC such as your user name, password, and domain name. This information is sent to the system that you're attempting to connect with. To help protect your privacy and the security of your PC, security-related information such as your user name and password are encrypted and stored on your PC.

Use of information

Dialer information is used to help your PC connect to the Internet. A remote access server might keep the user name and IP address information for accounting and compliance purposes, but no information is sent to Microsoft.

Choice and control

For non-command-line dialers, you can choose to save your password by selecting sauvegarder this user name and password. You can clear that option at any time to delete the previously saved password from the dialer. Because this option is turned off by default, you might be prompted to provide your password to connect to the Internet or a network. For command-line dialers like rasdial, there is no option to save your password.

Top of Page

RemoteApp and Desktop Connections

What this feature does

RemoteApp and Desktop Connections let you access apps and desktops on remote PCs that have been made available online for remote access.

Information collected, processed, or transmitted

When you enable a connection, configuration files are downloaded to your PC from the remote URL you specify. These configuration files link apps and desktops on remote PCs so that you can run them from your PC. Your PC will automatically check for and download updates to these configuration files periodically. These apps run on remote PCs, and information you enter into the apps is transmitted across the network to the remote PCs you chose to connect with.

If Microsoft is hosting the PC or app that you're connecting to, additional information about your connection might be sent to Microsoft for support purposes.

Use of information

Updates to configuration files might include settings changes including providing you with access to new apps; however, new apps will run only if you choose to run them. This feature also sends information to the remote PCs on which the remote apps run. The use of this data by the remote apps is subject to the privacy policies of the app providers and the remote PCs’ administrators. No information is sent to Microsoft unless the remote connection is hosted by Microsoft.

Choice and control

You can choose whether you want to use RemoteApp and Desktop Connections. You can add or remove RemoteApp and Desktop Connections by going to RemoteApp and Desktop Connections in Control Panel. You can add a new connection by clicking Access RemoteApp and desktops, and entering a Connection URL in the dialog box. You can also use your email address to retrieve the Connection URL. You can remove a connection and its connection files by clicking Retirer on the connections description dialog box. If you disconnect a connection without closing all open apps, these apps will remain open on the remote PC. RemoteApp and Desktop Connections aren’t shown in the Add or remove programs list in Control Panel.

Top of Page

Connexion Bureau à distance

What this feature does

Remote Desktop connection provides a way for you to establish a remote connection with a host PC that is running Remote Desktop Services.

Information collected, processed, or transmitted

Remote Desktop connection settings are stored in app-local storage or in a Remote Desktop Protocol (RDP) file on your PC. These settings include the name of your domain and connection configuration settings, such as remote PC name, user name, display information, local device information, audio information, clipboard, connection settings, remote app names, and session icon or thumbnail.

Credentials for these connections, Remote Desktop Gateway credentials, and a list of trusted Remote Desktop Gateway server names are stored locally on your PC. A list is stored in the registry. This list is stored permanently unless it is deleted by an administrator. No information is sent to Microsoft unless the remote connection is hosted by Microsoft.

Use of information

Information collected by Remote Desktop connection allows you to connect to host PCs running Remote Desktop Services using your preferred settings. User name, password, and domain information are collected to allow you to save your connection settings and to enable you to double-click an RDP file or click a favorite to launch a connection without having to re-enter this information.

Choice and control

You can choose if you want to use Remote Desktop connection. If you use it, your RDP files and Remote Desktop connection favorites contain information required to connect to a remote PC, including the options and settings that were configured when the connection was automatically saved. You can customize RDP files and favorites, including files for connecting to the same PC with different settings. To modify saved credentials, open Credential Manager in User accounts in Control Panel.

Top of Page

Sign in with a Microsoft account

What this feature does

A Microsoft account (formerly known as Windows Live ID) is a single email address and password you can use to sign in to apps, sites, and services from Microsoft and select Microsoft partners. You can sign up for a Microsoft account in Windows or on Microsoft websites that require you to sign in with a Microsoft account.

You can sign in to Windows with a Microsoft account or, on products that support it, choose to connect your local or domain account to a Microsoft account. If you do this, Windows can help make your PCs look and feel the same by automatically syncing settings and info in Windows and Microsoft apps. If you visit a website where you use a Microsoft account to sign in, Windows will also sign you in to that website automatically.

Information collected, processed, or transmitted

When you enter an email address to use as a Microsoft account while setting up your PC or in Comptes in PC settings, Windows sends the email address to Microsoft to determine if there’s already a Microsoft account associated with that email address. If you already use that email address as a Microsoft account, you can use it and the password for the Microsoft account to sign in to Windows. If you don’t already have enough security info for your Microsoft account, we might first ask you for additional security info such as a mobile phone number that we can use to verify the account is yours. If you don’t have a Microsoft account, you can create one using any email address.

When you sign in with a Microsoft account, Windows will also send standard computer information to Microsoft, including your device’s manufacturer, model name, and version.

Each time you sign in to Windows with a Microsoft account while your PC is connected to the Internet, Windows verifies your email address and password with Microsoft’s servers. When you're signed in to Windows with your Microsoft account or with a domain account connected to your Microsoft account:

  • Certain Windows settings will sync between the PCs that you sign in to with your Microsoft account. For more info about what settings are synced and how to control them, see the "Sync settings" section of this page.

  • Microsoft apps that use a Microsoft account for authentication (like Mail, Calendar, People, Microsoft Office, and other apps) can automatically begin downloading your info (for example, the Mail app will automatically download the messages sent to your Outlook.com or Hotmail.com address if you have one). Web browsers can automatically sign you in to websites that you sign in to with your Microsoft account (for example, if you visit Bing.com you might be automatically signed in without needing to enter your Microsoft account password).

Windows will ask your permission before allowing third-party apps to use profile information or other personal information associated with your Microsoft account. If you sign in to Windows with a domain account connected to a Microsoft account, the settings and info you choose will sync with your domain account, and you’ll automatically be signed in to apps and websites as described above. Because domain administrators are able to access any information on your PC, they'll also be able to access any settings and info you've chosen to sync with other PCs through your Microsoft account. This can include settings such as name, account picture, and browser history. For more info about what settings are synced and how to control them, see the "Sync settings" section of this page.

Use of information

When you create a new Microsoft account in Windows, we use the information you provide to create and help secure the account. For example, the security info you provide (like your phone number or alternate email address) is only used if you can’t sign in to your account. When you’re signed in to Windows with a Microsoft account, Windows uses your Microsoft account info to sign you in to apps and websites automatically. To learn more about the privacy impact of having a Microsoft account, read the Microsoft account privacy statement. For info about how individual Microsoft apps use information associated with your Microsoft account, see the privacy statements for each app. You can find the privacy statement for a Microsoft app by opening Settings from within the app, or in the About dialog.

Standard device information may be used to personalize certain communications to you, such as emails intended to help you get started with your device.

Choice and control

When you sign in to Windows with a Microsoft account, some settings are synced automatically. To learn how to change which Windows settings are synced or to stop syncing, see the "Sync settings" section of this page. To learn more about the data collected by Microsoft apps that use a Microsoft account for authentication, read their privacy statements.

On products that support it, you can create a local account or Microsoft account at any time in Comptes in PC settings. If you sign in to Windows with a domain account, you can connect or disconnect your Microsoft account at any time in Comptes in PC settings.

When you use InPrivate Browsing in Internet Explorer, you won’t be automatically signed in to websites that use Microsoft accounts.

Top of Page

OneDrive cloud storage

What this feature does

When you sign in with a Microsoft account on your device, you can choose to automatically save certain content and settings to Microsoft servers so you’ll have a backup if something happens to your device.

Information collected, processed, or transmitted

During setup, if you choose to use OneDrive for cloud storage, Windows will automatically send content to Microsoft servers, including:

  • Photos and videos on your device that are saved to the rouleau de la caméra dossier.

  • Settings that are specific to your device and not shared between your devices.

  • Descriptive info about your device, like the device name and type.

You may also choose to save content on Microsoft servers, and apps may choose to select Microsoft servers as the default save location for your files.

Use of information

Windows uses this content to provide the cloud storage service. Microsoft doesn't use your content or information to identify, contact, or target advertising to you.

Choice and control

If you choose "Use OneDrive" while setting up your PC, Windows will save the content described in this section to OneDrive. You can change these settings at any time in the OneDrive section of PC settings.

Top of Page

Sync settings

What this feature does

When you sign in to Windows with a Microsoft account, Windows syncs some of your settings and info with Microsoft servers to make it easier to have personalized experiences across multiple PCs. After you’ve signed in to one or more PCs with a Microsoft account, when you sign in to another PC with the same Microsoft account for the first time, Windows will download and apply the settings and info you choose to sync from your other PCs. Settings you choose to sync will automatically update on Microsoft servers and your other PCs as you use them.

Information collected, processed, or transmitted

If you choose to sign in to Windows with a Microsoft account, Windows syncs certain settings with Microsoft servers. These settings include:

  • The layout of your Start screen

  • Apps you’ve installed from the Windows Store

  • Language preferences

  • Ease of Access preferences

  • Personalization settings such as your account picture, lock screen image, background, and mouse settings

  • Settings for Windows Store apps

  • Spell checker dictionaries, IME dictionaries, and personal dictionaries

  • Web browser history, favorites, and websites you have open

  • Saved app, website, and network passwords

  • Addresses of shared network printers that you've connected to

To help protect your privacy, all synced settings are sent encrypted via SSL. Some of these settings won't sync on your PC until you add your PC to your Microsoft account as a trusted PC.

If you sign in to Windows with a domain account connected to a Microsoft account, settings and info you've chosen will sync to your domain account. Passwords that you save while signed into Windows with a domain account connected to a Microsoft account will never be synced. Because domain administrators can access any information on your PC, they'll also be able to access any settings and info you've chosen to sync with other PCs through your Microsoft account.

Use of information

Windows uses these settings and info to provide the syncing service. Microsoft doesn't use your synced settings and info to identify, contact, or target advertising to you.

Choice and control

When you sign in to Windows with a Microsoft account, your settings sync by default. You can choose to sync your settings, and control what is synced, by going to Sync settings in the OneDrive section of PC settings. If you sign in to Windows with a domain account and you choose to connect that account to a Microsoft account, Windows will ask which settings you want to sync before connecting your Microsoft account.

Top of Page

Teredo Technology

What this feature does

Teredo Technology (Teredo) allows PCs and networks to communicate over multiple networking protocols.

Information collected, processed, or transmitted

Each time you start your PC, Teredo will attempt to locate a public Internet Protocol version 6 (IPv6) service on the Internet. This occurs automatically when your PC is connected to a public or private network, but doesn’t occur on managed networks such as enterprise domains. If you use an app that requires Teredo to use IPv6 connectivity, or if you configure your firewall to always enable IPv6 connectivity, then Teredo will periodically contact the Microsoft Teredo service over the Internet. The only information sent to Microsoft is standard PC information and the name of the service requested (for example, teredo.ipv6.microsoft.com).

Use of information

The information sent from your PC by Teredo is used to determine if your PC is connected to the Internet and if it can locate a public IPv6 service. Once the service is located, information is sent to maintain a connection with the IPv6 service.

Choice and control

Using the netsh command line tool, you can change the query that the service sends over the Internet to use non-Microsoft servers instead, or you can turn it off. For detailed instructions, see the “Internet Protocol Version 6, Teredo, and Related Technologies” section of this technical white paper.

Top of Page

Trusted Platform Module (TPM) Services

What this feature does

The Trusted Platform Module (TPM) is security hardware built into some PCs that, if present and provisioned, enables your PC to take full advantage of advanced security features. Windows features that use the TPM include Device Encryption, Virtual Smart Card, Secure Boot, Windows Defender, and TPM Based Certificate Storage.

Information collected, processed, or transmitted

By default, Windows takes ownership of the TPM and stores the full TPM owner authorization information so it’s only available to the Windows administrators. Limited authorization values are created to perform typical administrative actions and standard user actions and are managed by Windows.

The TPM Management Console allows you to interactively provision the TPM and save the TPM owner authorization value to external media like a USB flash drive after the TPM has been provisioned. A saved file contains the TPM owner authorization information for the TPM. The file also contains the PC name, operating system version, creation user, and creation date information to assist you in recognizing the file.

In a domain environment, the full TPM owner password can be configured by the domain administrator to be stored in Active Directory under a TPM object when the TPM is provisioned.

Each TPM has a unique cryptographic Endorsement Key that it uses to indicate its authenticity. The Endorsement Key can be created and stored in the TPM by your PC's manufacturer, or for older PCs, Windows might need to trigger creation of the Endorsement Key inside the TPM. The private portion of the Endorsement Key is never exposed outside of the TPM, and once it has been created, it usually can't be reset. An Endorsement Key Certificate will be stored in the TPM of most Windows computers. The Endorsement Key Certificate indicates that the Endorsement Key exists in a hardware TPM. The certificate is useful for remote verifiers to confirm the TPM conforms to the TPM specifications. The Endorsement Key Certificate is usually signed by the TPM manufacturer or the platform manufacturer.

Use of information

Once the TPM is initialized, apps can use the TPM to create and help secure additional unique cryptographic keys. For example, Device Encryption uses the TPM to help protect the key that encrypts the drive.

If you choose to save the TPM owner password to a file, the additional PC and user information saved inside this file helps you to identify the matching PC and TPM. The TPM endorsement key is used by Windows during TPM initialization to encrypt your TPM owner authorization value before sending it to the TPM. Windows doesn’t transmit cryptographic keys outside of your PC. Windows does provide an interface for third-party apps like antimalware software to use the Endorsement Key for certain TPM scenarios, such as Measured Boot with Attestation. For antimalware software the endorsement key and the endorsement key certificate also are useful to confirm boot measurements are provided by a TPM from a specific manufacturer. By default, only administrators or apps with administrative rights can use the TPM endorsement key.

Choice and control

Users or administrators opt in to using the TPM by turning on a Windows feature or running an app that uses the TPM.

You can choose to clear the TPM and reset it to factory defaults. Clearing the TPM removes owner information, and with the exception of the endorsement key, all TPM-based keys or cryptographic information that apps might have created when the TPM was in use.

Top of Page

Update Root Certificates

What this feature does

Certificates are used primarily to verify the identity of a person or device, authenticate a service, or encrypt files. Trusted root certification authorities are the organizations that issue certificates. Update Root Certificates contacts the online Windows Update service to see if Microsoft has added a certification authority to its list of trusted authorities, but only when an app is presented with a certificate issued by a certification authority that isn't directly trusted (a certificate that isn't stored in a list of trusted certificates on your PC). If the certification authority has been added to the Microsoft list of trusted authorities, its certificate will automatically be added to the list of trusted certificates on your PC.

Information collected, processed, or transmitted

Update Root Certificates sends a request to the online Windows Update service that asks for the current list of root certification authorities in the Microsoft Root Certificate Program. If the untrusted certificate is on the list, Update Root Certificates obtains that certificate from Windows Update and places it in the trusted certificate store on your PC. The information transferred includes the names and cryptographic hashes of root certificates.

Use of information

The information is used by Microsoft to update the list of trusted certificates on your PC. Microsoft doesn’t use this information to identify, contact, or target advertising to you.

Choice and control

Update Root Certificates is turned on by default. Administrators can configure Group Policy to turn off the Update Root Certificates on a PC.

Top of Page

Update Services

What this feature does

Update services for Windows includes Windows Update and Microsoft Update:

  • Windows Update is a service that provides you with software updates for Windows software and other supporting software, such as drivers supplied by device manufacturers.

  • Microsoft Update is a service that provides you with software updates for Windows software, as well as other Microsoft software such as Microsoft Office.

Information collected, processed, or transmitted

The Update Services collect info from your PC that allows Microsoft to operate and improve the services, such as:

  • The Microsoft software and other supporting software (e.g., drivers and firmware supplied by device manufacturers) installed on your PC for which the update services have updates available. This helps us determine which updates are appropriate for you.

  • Your Windows Update and/or Microsoft Update configuration settings such as whether you want updates automatically downloaded or installed.

  • The successes, failures, and errors you experience when accessing and using the update services.

  • Plug and Play ID numbers of hardware devices – a code assigned by the device manufacturer that identifies the device (e.g., a particular type of keyboard).

  • Globally Unique Identifier (GUID) – a randomly generated number that doesn’t contain any personal information. GUIDs are used to identify individual PCs without identifying the user.

  • BIOS name, revision number, vendor, and revision date – info about the set of essential software routines that test your hardware, start the operating system on your PC, and transfer data among hardware devices connected to your PC.

  • Manufacturer, Model, Platform Role, and SKU Number—information about the PC used to enable diagnostic investigations into driver installations.

You can use these Update Services by going to Windows Update in Control Panel and checking for updates or changing your settings to allow Windows to automatically install updates as they become available (recommended). Within the Windows Update feature, you can choose whether to opt in to Microsoft Update.

If you choose to get important software updates for your PC, the Windows Malicious Software Removal Tool (MSRT) might be included with these updates. MSRT checks PCs for infections by specific, prevalent malicious software (“malware”) and helps remove any infections found. If the software runs, it will remove the malware listed on the Microsoft Support website. During a Malware check, a report will be sent to Microsoft with specific info about malware detected, errors, and other info about your PC. For more info, read the Windows Malicious Software Removal Tool privacy statement .

Use of information

The data sent to Microsoft is used to operate and maintain the Update Services. It is also used to generate aggregate statistics that help us analyze trends and improve our products and services, including the Update Services.

To generate aggregate statistics, the update services use the GUID collected by the Update Services to track and record the number of individual computers that use the Update Services, and whether the download and installation of specific updates succeeds or fails. The Update Services record the GUID of the computer that attempted the download and installation, the ID of the item that was requested, whether updates were available, and standard computer information.

The MSRT information described above is used to help improve our anti-malware and other security products and services. No information in the MSRT reports will be used to identify or contact you.

Required updates

If you turn on the Update Services, in order for them to properly function some software components on your system that make up or are directly related to the Update Services will need to be updated from time to time. These updates must be performed before the service can check for, download, or install other updates. These required updates fix errors, provide ongoing improvements, and maintain compatibility with the Microsoft servers that support the service.

If the Update Services are turned off, you won’t receive these updates.

Software updates required to install or update Windows Store apps will be downloaded and installed automatically. These updates must be performed for apps to function properly.

Cookies and tokens

A token is similar to a cookie. It stores information in a small file that is placed on your hard disk by the Update Services server, and is used when your computer connects to the Update Services server to maintain a valid connection. It is stored on your computer only, not on the server. This cookie or token contains information (such as last scan time) in order to find the most recently available updates. It contains information to manage what content should be downloaded to your computer, when that should happen, as well as a GUID to identify your computer to the server.

Information contained in the contents of the cookie or token is encrypted by the server (with the exception of the cookie or token expiration time). This cookie or token is not a browser cookie, so it cannot be controlled with your browser settings. The cookie or token cannot be removed; however, if you don’t use the Update Services, the cookie or token won't be used.

Choice and control

If you choose express settings while setting up Windows, the Windows Update service is turned on and set to install updates automatically.

If you turn on the Update Services, regardless of which setting you’ve chosen, required updates to some components of the service will be downloaded and installed automatically without further notice to you. If you’d prefer not to receive required updates, turn off the Update Services.

You can also choose whether to check for or automatically install Important and Recommended updates for your computer or Important updates only. Optional updates are never installed automatically. After setting up Windows, you can change your Windows Update settings in Control Panel or in PC settings.

If you’ve chosen to check for and install important updates, and receive MSRT as part of these updates for your computer, you can turn off the software's reporting functionality.

Top of Page

Virtual Private Networking

What this feature does

A Virtual Private Network (VPN) lets you connect to a private network, such as a corporate network, over the Internet. A VPN connection can be provided by the Windows VPN client, or by a third-party VPN app.

Information collected, processed, or transmitted

When you connect to a VPN, the credentials you enter in the VPN client are sent to the remote network. You might be able to store these credentials on your PC. After you’re connected, depending on the way the VPN is configured, some or all of your network activity will be routed through the remote network. Administrators can configure specific apps to always route their traffic through the VPN, and to automatically connect to the VPN when those apps are launched. No information is sent to Microsoft.

Third-party VPN software may collect additional information; collection and use of this information is subject to the third party’s privacy practices.

Use of information

VPN clients use the credentials you provide to authenticate with the remote network, and to route network traffic to and from the remote network. If a third-party VPN client collects additional information, the third party’s use of that information is subject to the third party’s privacy practices.

Choice and control

You can add or remove a VPN connection, and see the status of existing connections, in Réseau in PC settings. After a VPN connection has been set up, you can manually connect or disconnect it by selecting the network from the list in Settings.

Top of Page

Windows Customer Experience Improvement Program (CEIP)

What this feature does

The Windows Customer Experience Improvement Programs (CEIP) can collect information about how you use your apps, your PCs, connected devices, and Windows. It can also collect information about performance and reliability problems that might occur. If you choose to participate in Windows CEIP, Windows will send this data to Microsoft, and will also periodically download a file to collect more relevant information about how you use Windows and apps. CEIP reports are sent to Microsoft to help improve the features our customers use most often, and to create solutions to common problems.

Information collected, processed, or transmitted

CEIP reports can include information such as:

  • Configuration information, including how many processors are in your PC, the number of network connections in use, screen resolutions for display devices, and which version of Windows is on your PC.

  • Performance and reliability information, including how quickly an app responds when you click a button, how many problems you experience with an app or a device, and how quickly information is sent or received over a network connection.

  • App use information, including information such as how frequently you open apps, how often you use Windows Help and Support, which services you use to sign in to apps, and how many folders you typically create on your desktop.

CEIP reports can also contain information about events (event log data) on your PC from up to seven days prior to the time you decide to start participating in CEIP. Because most users decide to participate in CEIP within several days of setting up Windows, Microsoft uses this information to analyze and improve the Windows setup experience.

This information is sent to Microsoft when you're connected to the Internet. CEIP reports don’t intentionally contain contact information, such as your name, address, or phone number; however, some reports might unintentionally contain individual identifiers, such as a serial number for a device that is connected to your PC. Microsoft filters the information contained in CEIP reports to try to remove any individual identifiers that they might contain. If individual identifiers are received, Microsoft doesn’t use them to identify or contact you.

CEIP randomly generates a number called a globally unique identifier (GUID) that is sent to Microsoft with every CEIP report. The GUID lets us determine which data is sent from a particular computer over time. Some CEIP reports may also include GUIDs derived from your Microsoft account.

CEIP might also periodically download a file to collect more relevant information about the way you useWindows and apps. This file helps Windows collect additional information to help Microsoft create solutions for common problems and better understand usage patterns of Windows and apps.

Use of information

Microsoft uses CEIP information to improve our products and services, as well as third-party software and hardware designed for use with these products and services. We might also share aggregate CEIP information with Microsoft partners so they can improve their products and services, but the information can’t be used to identify, contact, or target advertising to you.

We use the GUID to distinguish how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem one hundred times and one hundred customers experiencing the same problem once. Microsoft doesn’t use the information collected by CEIP to identify or contact you.

Choice and control

If you choose express settings while setting up Windows, you turn on Windows CEIP: Windows and Microsoft apps from the Windows Store will be able to send CEIP reports for all users on your PC. If you choose to customize settings, you can control CEIP by selecting Send Microsoft info about how I use my PC, as part of the Customer Experience Improvement Program sous Help improve Microsoft products and services. After setting up Windows, administrators can change this setting in Action Center in Control Panel.

For more info, see CEIP frequently asked questions.

Top of Page

Windows Defender

Windows Defender looks for malware and other potentially unwanted software on your PC. It includes the Microsoft Active Protection Service and History features.

Microsoft Active Protection Service

If you use Windows Defender, Microsoft Active Protection Service (MAPS) can help better protect your PC by automatically downloading new signatures for newly-detected malware, and monitoring the security status of your PC. MAPS will send information about malware and other potentially unwanted software to Microsoft, and may also send files that could contain malware. If MAPS detects that your PC is infected with certain types of malware, MAPS might automatically contact you through your Microsoft account to help solve the problem.

Information collected, processed, or transmitted

MAPS reports include information about potential malware files, such as file names, cryptographic hash, software publisher, size, and date stamps. In addition, MAPS might collect full URLs to indicate the origin of the files, as well as the IP addresses that the potential malware files connect to. These URLs might occasionally contain personal information such as search terms or data entered in forms. Reports might also include the actions you took when Windows Defender notified you that the potentially unwanted software was detected. MAPS includes this information to help Microsoft gauge how effectively Windows Defender can detect and remove malware and potentially unwanted software, and to attempt to identify new malware.

Reports are automatically sent to Microsoft when:

  • Windows Defender detects software that hasn’t been analyzed for risks yet.

  • Windows Defender detects changes to your PC by software that hasn't been analyzed for risks yet.

  • Windows Defender takes action on malware upon detection (as part of its automatic remediation).

  • Windows Defender completes a scheduled scan and automatically takes action on software that it detects based on your settings.

  • Windows Defender scans an ActiveX control in Internet Explorer.

If you choose to join MAPS while setting up Windows, you join with a basic membership. Basic membership reports contain the information described in this section. Advanced membership reports are more comprehensive and might occasionally contain personal information, for example, file paths and partial memory dumps. These reports, along with reports from other Windows Defender users who are participating in MAPS, help our researchers discover new threats more rapidly. Malware definitions are then created, and these updated definitions are made available to all users through Windows Update.

If you join MAPS, Windows Defender might send specific files or web content from your PC that Microsoft suspects might be potentially unwanted software. The sample report is used for further analysis. If a file is likely to contain personal information, you'll be prompted before it is sent. If Windows Update hasn't been able to obtain updated signatures for Windows Defender for a period of time, Windows Defender will attempt to use MAPS to download signatures from an alternate download location.

To help protect your privacy, all information sent to MAPS is sent encrypted via SSL.

To help detect and fix certain kinds of malware infections, Windows Defender regularly sends MAPS some information about the security state of your PC. This includes information about your PC’s security settings and log files describing the drivers and other software that load while your PC starts. A number that uniquely identifies your PC is also sent.

Use of information

Reports sent to MAPS are used to improve Microsoft software and services. The reports might also be used for statistical, testing, or analytical purposes, and for generating definitions. MAPS doesn’t intentionally collect personal information. To the extent that MAPS might unintentionally collect any personal information, Microsoft won’t use the information to identify, contact, or target advertising to you.

The information about your PC’s security state that MAPS collects is used to determine if certain kinds of malware have infected your PC. In this case, Microsoft uses the contact information in your Microsoft account to contact you with details about the problem and how to fix it.

Choice and control

If you choose express settings while setting up Windows, you turn on MAPS. If you choose to customize settings, you can control MAPS by selecting Get better protection from malware by sending info and files to Microsoft Active Protection Service when Windows Defender is turned on sous Share info with Microsoft and other services. After setting up Windows, you can change your MAPS membership or settings, including turning off MAPS, in the Réglages menu in Windows Defender.

If you receive the Malicious Software Removal Tool through Windows Update, it might send similar information to MAPS even if Windows Defender is turned off. For more information, read the Windows Malicious Software Removal Tool .

History feature

What this feature does

The History feature provides a list of all apps on your PC that Windows Defender detects and the actions that were taken when the apps were detected.

In addition, you can view a list of apps that Windows Defender doesn’t monitor while they are running on your PC (these are called allowed items). You can also view apps that Windows Defender prevents from running until you choose to remove them or allow them to run again (these are called quarantined items).

Information collected, processed, or transmitted

The list of software that Windows Defender detects, the actions that you and other users take, and the actions that Windows Defender takes automatically are stored on your PC. All users can view the history in Windows Defender to see malware and other potentially unwanted software that has attempted to install itself or run on the PC, or that has been allowed to run by another user. For example, if you learn about a new malware threat, you can check the History to see if Windows Defender has prevented it from infecting your PC. No information is sent to Microsoft.

Choice and control

History lists can be deleted by an administrator.

Top of Page

Windows Error Reporting

What this feature does

Windows Error Reporting helps Microsoft and Microsoft partners diagnose problems in the software you use and provide solutions. Not all problems have solutions, but when solutions are available, they're offered as steps to solve a problem you’ve reported or as updates to install. To help prevent problems and make software more reliable, some solutions are also included in service packs and future versions of the software.

Information collected, processed, or transmitted

Many software products are designed to work with Windows Error Reporting. If a problem occurs in one of these products, you might be asked if you want to report it.

Windows Error Reporting collects information that is useful for diagnosing and solving a problem that has occurred, such as where the problem happened in the software or hardware, the type or severity of the problem, files that help describe the problem, basic software and hardware information, or possible software performance and compatibility problems. If you use Windows to host virtual machines, error reports sent to Microsoft might include information about virtual machines.

Windows Error Reporting also collects information about apps, drivers, and devices to help Microsoft understand and improve app and device compatibility. Information about an app might include the name of the app’s executable files. Information about devices and drivers might include the names of devices you’ve installed on your PC and the executable files associated with those devices’ drivers. Information about the company that published an app or driver might be collected.

If you choose to turn on automatic reporting while setting up Windows, the reporting service will automatically send basic information about where problems occur. In some cases, the reporting service will automatically send additional information to help diagnose the problem, such as a partial snapshot of PC memory. Some error reports might unintentionally contain personal information. For example, a report that contains a snapshot of PC memory might include your name, part of a document you were working on, or data that you recently submitted to a website.

To help diagnose certain types of problems, Windows Error Reporting might create a report containing extra information, such as log files. Before sending a report containing this additional information, Windows will ask if you want to send the report, even if you’ve turned on automatic reporting.

After you send a report, the reporting service might ask you for more info about the problem that occurred. If you choose to provide your phone number or email address in this information, your error report will be personally identifiable. Microsoft might contact you to request additional information to help solve the problem you reported.

Windows Error Reporting randomly generates a number called a globally unique identifier (GUID) that is sent to Microsoft with every error report. The GUID lets us determine which data is sent from a particular computer over time. The GUID doesn’t contain any personal information.

To help protect your privacy, the information is sent encrypted via SSL.

Use of information

Microsoft uses information about errors and problems reported by Windows users to improve Microsoft products and services, as well as third-party software and hardware designed for use with these products and services. We use the GUID to determine how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem one hundred times and one hundred customers experiencing the same problem once.

Microsoft employees, contractors, vendors, and partners might be provided access to relevant portions of the information collected, but they’re only permitted to use the information to repair or improve Microsoft products and services, or third-party software and hardware designed for use with Microsoft products and services. If an error report contains personal information, Microsoft doesn’t use the information to identify, contact, or target advertising to you. However, if you choose to provide contact information as described above, we may use this information to contact you.

Choice and control

If you choose express settings while setting up Windows, Windows Error Reporting will automatically send basic reports to check for solutions to problems online. If you choose to customize settings, you can control Windows Error Reporting by selecting Use Windows Error Reporting to check online for solutions to problems sous Check online for solutions. After setting up Windows, you can change this setting in Action Center in Control Panel.

For more info, see the Microsoft Error Reporting Service privacy statement.

Top of Page

Windows File Association

What this feature does

Windows File Association helps users associate file types with specific apps. If you try to open a file type and it doesn’t have an app associated with it, Windows will ask if you want to use Windows File Association to find an app for the file, which includes searching the Windows Store for a compatible app. Apps that are typically associated with the file name extension are displayed.

Information collected, processed, or transmitted

If you choose to use Windows File Association, the file name extension (for example, docx or pdf) and your PC display language are sent to Microsoft. The rest of the file name isn’t sent to Microsoft. When a file association is made with a particular app, a unique identifier for the app is sent to identify the default app for each file type.

Use of information

When you submit a file name extension, the service returns a list of the apps that Microsoft is aware of that can open files of that extension. Unless you choose to download and install an app, no file type associations will change.

Choice and control

When you try to open a file type without an associated app, you can choose whether to use Windows File Association. No file association information is sent to Microsoft unless you decide to use the service.

Top of Page

Windows Help

Windows Online Help and Support

What this feature does

Windows Online Help and Support, when turned on, allows you to get the most up-to-date help and support content available when you're connected to the Internet.

Information collected, processed, or transmitted

When you use Windows Online Help and Support, your help search queries are sent to Microsoft, as well as your requests for help content when a link is clicked. Windows sends some information about your PC’s configuration to help find more relevant help content. Windows Online Help and Support also uses standard web technologies like cookies.

Use of information

Microsoft uses the information to return help topics in response to your search queries, to return the most relevant results, to develop new content, and to improve existing content. We use the information about your PC’s configuration to display appropriate help content for that configuration. We use cookies and other web technologies to make it easier to navigate help content and to help us better understand how users use Windows Online Help.

Choice and control

Online Help and Support is turned on by default. To change this setting, tap or click the Réglages icon at the top of the Help and Support window, and then select or clear Get online Help. To clear the cookies used by Windows Help, open Internet Options in Control Panel, click or tap the Effacer button under Browsing history, sélectionnez Cookies and website data, and click or tap Effacer. If you choose to block all cookies (in the Privacy section of Internet Options), Windows Help won’t set any cookies.

Help Experience Improvement Program

What this feature does

The Help Experience Improvement Program (HEIP) helps Microsoft identify trends in the way our customers use Windows Online Help and Support so that we can improve our search results and the relevancy of our content.

Information collected, processed, or transmitted

HEIP sends Microsoft information about the version of Windows that your PC is running and about how you use Windows Help and Support, including queries you enter when you search Windows Help and Support and any ratings or feedback on the Help topics presented to you. When you search, browse, or provide any ratings or feedback on the Help topics presented to you, this information will be sent to Microsoft.

HEIP randomly generates a number called a globally unique identifier (GUID) that is sent to Microsoft with every HEIP report. The GUID lets us determine which data is sent from a particular PC over time. The GUID doesn’t contain any personal information. The GUID is separate from the GUIDs used by Windows Error Reporting and Windows CEIP.

Use of information

The data collected is used to identify trends and usage patterns so that Microsoft can improve the quality of content we provide and the relevance of our search results. We use the GUID to determine how widespread the issues we receive are and how to prioritize them. For example, the GUID allows Microsoft to distinguish between one customer experiencing an issue one hundred times and one hundred customers experiencing the same issue once.

The Help Experience Improvement Program doesn't intentionally collect any information that could be used to personally identify you. If you type such information into the search or feedback boxes, the information will be sent, but Microsoft doesn’t use the information to identify, contact, or target advertising to you.

Choice and control

If you choose express settings while setting up Windows, you join the Help Experience Improvement Program. If you choose to customize settings, you can control Help Experience Improvement Program settings by selecting Send Microsoft info about how I use Help, as part of the Help Experience Improvement Program sous Help improve Microsoft products and services. After setting up Windows, you can change this setting in Windows Help and Support.

Top of Page

Remote Assistance

What this feature does

You can use Remote Assistance to invite someone to connect to your PC and help you with a PC problem, even if that person isn't nearby. After connecting, the other person can view your PC. With your permission, the other person can use his or her mouse and keyboard to control your PC and show you how to fix a problem.

Information collected, processed, or transmitted

Remote Assistance creates an encrypted connection between the two PCs over the Internet or the local network. When someone uses Remote Assistance to connect to your PC, that person can see your desktop and any open documents, including any visible private information. In addition, if you allow the other person to control your PC with his or her mouse and keyboard, that person can do things like delete files or change settings. After a connection is made, Remote Assistance will exchange contact information including user name, PC name, and account picture. A session log file maintains a record of all Remote Assistance connections.

Use of information

The information is used to establish an encrypted connection and to provide the other person access to your desktop. No information is sent to Microsoft.

Choice and control

Before you allow someone to connect to your PC, close any open apps or documents that you don't want the other person to see. If at any time you feel uncomfortable about what that person is seeing or doing on your PC, press the Esc key to end the session. You can turn off session logging and contact information exchange by clearing these options in Remote Assistance settings.

Top of Page

Windows Search

What this feature does

Windows Search lets you search your device and the Internet from one place. To provide better search results, Windows Search can use Bing and the Windows Location Platform. Please note that there are other, separate search features on your device provided by Microsoft, such as search in the Windows Store, Internet Explorer, and other Microsoft products.

Information collected, processed, or transmitted

If you choose to get web search results, Windows sends what you type in Windows Search to Microsoft. To help improve search results, Windows Search also sends information to Microsoft about how you interact with the feature. Windows Search also sends an identifier to provide personalized search results based on your interactions with Bing and other Microsoft products and services. If you sign in to Windows with a Microsoft account, the identifier will be associated with your Microsoft account. You can choose not to get personalized results in Windows Search, in which case this identifier won't be sent.

If you allow Windows Search to use your location, the physical location of your device as provided by the Windows Location Platform will be sent to Microsoft as a part of each search request. Alternatively, we may attempt to derive your approximate physical location based on your IP address.

When you use Windows Search to search within an app, your search terms are provided to the app.

Use of information

If you choose to use Windows Search to get web search results, we use the search term you've provided, your local and online search history, information associated with your Microsoft account, and the location of your device to provide relevant search suggestions, personalized search results, and personalized experiences in other Microsoft products and services. To learn more about how your data is used, read the Bing privacy statement.

When you use Windows Search to search within a third-party app, use of the information collected will be subject to the third party's privacy practices. If you search within a Microsoft app, the app's privacy practices will be explained in its privacy statement.

Choice and control

If you choose express settings when setting up Windows, you allow Windows Search to get search suggestions and web results, and you allow Microsoft to use data from Windows Search (including location) to personalize Windows Search and other Microsoft experiences. If you choose to customize settings, you can decide whether to change these settings for Windows Search. After setting up Windows, you can change these settings in Chercher in PC settings.

You can clear your local search history and some Bing search history used to personalize your Windows Search experience in Chercher dans Search & apps in PC settings. Clearing your search history instructs Microsoft not to use any previously collected search history to personalize search suggestions or order search results. It doesn't clear advertising or other personalization info (including information derived from your search history), nor does it delete information that is used by Microsoft in aggregate to improve search results and other Microsoft experiences. That information is retained and anonymized, as described in the Bing privacy statement. You can manage Microsoft advertising and other personalization info online.

Top of Page

Windows Setup

This section describes features that are available as part of the process of installing Windows.

Mise à jour dynamique

What this feature does

Dynamic Update makes it possible for Windows to perform a one-time check with Windows Update to get the latest updates for your PC while Windows is being installed. If updates are found, Dynamic Update automatically downloads and installs them so your PC is up to date the first time that you sign in or use it.

Information collected, processed, or transmitted

To install compatible drivers, Dynamic Update sends information to Microsoft about your PC's hardware. The types of updates that Dynamic Update can download to your PC include:

  • Installation updates. Important software updates for installation files to help ensure a successful installation.

  • In-box driver updates. Important driver updates for the version of Windows that you're installing.

Additionally, if you install Windows from the Windows Store, Dynamic Update will download and install the latest updates to Windows, as well as certain hardware drivers your PC needs.

Use of information

Dynamic Update reports information to Microsoft about your PC's hardware to help identify the correct drivers for your system.

Choice and control

If you install Windows from the Windows Store, Setup downloads and installs updates automatically. If you install Windows from physical media, you’ll be asked whether you would like to go online to install updates.

Installation Improvement Program

What this feature does

This feature sends a single report to Microsoft containing basic information about your PC and how you installed Windows. Microsoft uses this information to help improve the installation experience and to create solutions to common installation problems.

Information collected, processed, or transmitted

The report generally includes information about your installation experience, such as the date of installation, the time it took for each installation phase to complete, whether the installation was an upgrade or a new installation of the product, version details, operating system language, media type, PC configuration, and success or failure status, along with any error codes.

If you choose to participate in the Installation Improvement Program, the report is sent to Microsoft when you're connected to the Internet. The Installation Improvement Program randomly generates a number called a globally unique identifier (GUID) that is sent to Microsoft with the report. The GUID lets us determine which data is sent from a particular computer over time. The GUID doesn't contain any personal information and isn't used to identify you.

Use of information

Microsoft and our partners use the report to help improve our products and services. We use the GUID to correlate this data with data collected by the Windows Customer Experience Improvement Program (CEIP), a program you can choose to participate in when you're using Windows.

Choice and control

You can choose to participate in this program when you install Windows by selecting I want to help make the installation of Windows better .

For more info, see the Windows CEIP section.

Installation Compatibility Advisor

What this feature does

When you install Windows, Setup helps you determine if your current PC is ready for an upgrade to Windows 8.1, and provides compatibility information regarding your programs and devices.

Information collected, processed, or transmitted

When determining compatibility, we collect certain information about your potential upgrade experience, such as the capabilities of your computer hardware, the devices connected to your computer, and the programs installed on your computer. Occasionally, program publisher information might contain information such as the publisher’s name or publisher’s email address.

Use of information

We use the information collected to determine the right drivers for your PC and to determine compatibility of your PC, programs, and devices with Windows 8.1. We may also use it to improve our products and services. We don’t use this information to identify, contact, or target advertising to you.

Choice and control

If you install Windows from the Windows Store or from physical media inside an existing Windows installation, the information described in this section will be sent to Microsoft. If you boot from physical installation media to install Windows, Setup won’t check online for compatibility information.

Top of Page

Windows Share

What this feature does

Windows Share lets you share content between Windows Store apps that support sharing. It also lets you share content with your friends.

Information collected, processed, or transmitted

When sharing, the source app passes content to the target app only after you select the target in the Share pane. If the source app hasn’t implemented sharing, you’ll have the option to share an image of whatever appears on the screen. So that you can access them more easily, target apps and people that you frequently share content with will appear in a list in the Share pane. No information is sent to Microsoft.

Use of information

The information stored about how often you share with target apps and people that you frequently share content with is used to sort the list in the Share pane in order of frequency. If you share information with a third-party app, use of the information collected will be subject to the third party's privacy policy. If you share with a Microsoft app, the app's privacy practices will be explained in its privacy statement.

Choice and control

By default, Windows stores information about your use of Windows Share. You can stop storing this information or delete all of the stored targets in Partager sous Search & apps in PC settings.

Top of Page

Windows SmartScreen

What this feature does

Windows SmartScreen helps keep your PC safe by checking downloaded files and web content within apps to help protect you from malicious software and potentially unsafe web content. Before an unknown or potentially unsafe downloaded file is opened, Windows will display a warning. If SmartScreen detects potentially unsafe web content in an app, Windows will display a warning in place of the content.

Information collected, processed, or transmitted

If you choose to use Windows SmartScreen to check downloaded files, Windows sends information to the SmartScreen online service This information might include a file name, file identifier (“hash”), and digital certificate information along with standard PC information and the Windows SmartScreen filter version number. To help protect your privacy, the information sent to Microsoft is encrypted via SSL.

If you choose to use Windows SmartScreen to block potentially unsafe content in apps, Windows sends information to the SmartScreen online service including the addresses and types of content that some Windows Store apps access when you use them. In response, the online service tells your PC whether the content has been reported to Microsoft as unsafe or suspicious. Reports sent to Microsoft include information such as the name or identifier of the app and the full addresses of web content accessed by the app.

To help protect your privacy, the information sent to Microsoft is encrypted. Information that might be associated with a webpage accessed inside an app, such as search terms, might be included in the address sent to Microsoft. For example, if you look up a word in a dictionary app, the word you look up might be sent to Microsoft as part of the full address accessed by the app. Microsoft filters these addresses to try to remove personal information where possible.

Windows generates a number called a globally unique identifier (GUID) that is sent to Microsoft with each report. The GUID lets us determine which data is sent from a particular computer over time. The GUID doesn’t contain any personal information.

Use of information

Microsoft uses the information described above to provide warnings to you about potentially unsafe downloaded files and content within apps. For example, if SmartScreen detects a potential threat inside an app that supports SmartScreen, Windows will display a warning in place of the content. We also use the information to improve SmartScreen and other products and services. Microsoft doesn’t use the information to target advertising to you.

Choice and control

If you choose express settings while setting up Windows, you turn on Windows SmartScreen. If you choose to customize settings, you can control Windows SmartScreen by selecting Use SmartScreen online services to help protect against malicious content in sites loaded by Windows Store apps and Internet Explorer, and malicious downloads sous Help protect your PC and your privacy. After setting up Windows, you can change this setting in Action Center in Control Panel. For info about Internet ExplorerSmartScreen, see the SmartScreen Filter section of the Internet Explorer privacy statement.

Top of Page

Windows Speech Recognition

What this feature does

Windows Speech Recognition provides speech recognition within Windows and for any apps that choose to use it. Windows Speech Recognition increases its accuracy by learning how you use language, including the sounds and words you like to use.

Information collected, processed, or transmitted

Windows Speech Recognition stores a list of words and their pronunciations on your PC. Words and pronunciations are added to this list using the Speech Dictionary, and by using Windows Speech Recognition to dictate and correct words.

When the Windows Speech Recognition document review feature is turned on, text from Microsoft Office Word documents (with doc or docx file name extensions) and email (from email folders other than Deleted items or Junk email) on your PC and on any connected file shares included in your Windows search index locations is collected and stored in one-, two-, or three-word fragments. One-word fragments include only words you have added to custom dictionaries, and two- or three-word fragments include only words found in standard dictionaries.

All collected information is stored in your personal speech profile on your PC. Speech profiles are stored for each user, and users aren’t able to access the profiles of other users on your PC. However, administrators can access any profile on your PC. The profile information isn’t sent to Microsoft unless you choose to send it when asked by Windows Speech Recognition. You can review the data before it is sent. If you choose to send this information, acoustic adaptation data that was used to adapt to your audio characteristics is also sent.

If you complete a speech training session, Windows Speech Recognition will ask you whether you wish to send your speech profile information to Microsoft. You can review the information before it’s sent. This information might include recordings of your voice while you completed the training session and the other information from your personal speech profile.

Use of information

Windows Speech Recognition uses words from the speech profile to convert your speech to text. Microsoft uses personal speech profile information to improve our products and services. We don’t use this information to identify, contact, or target advertising to you.

Choice and control

You can choose whether to run Windows Speech Recognition. If you run Windows Speech Recognition, the document review feature is on by default. You can choose to change your document review settings the first time you run Windows Speech recognition. You can change your document review settings or delete personal speech profiles (and most document review information) by going to Speech Recognition in Control Panel and clicking Avancée speech options. You can also use the Change existing words option in the Speech Dictionary to delete words that you’ve added to your speech profile. However, deleting your personal speech profile doesn’t delete words added through the Speech Dictionary.

You can control the locations that document review will collect word fragments from by modifying the locations included in your Windows search index. To view or modify what locations are included in your Windows search index, open Indexing Options in Control Panel.

At the end of any training session you'll be given the choice whether to send your training and other profile information to Microsoft. You can also send information when Windows Speech Recognition is launched by right-clicking Microphone, and then clicking Help improve speech recognition. In either case, you can view all data files before they are sent, and can choose not to send them.

Top of Page

Windows Store

The Windows Store lets you find, manage, and install apps for your PC. The sections below describe how the Store’s features, and the apps you obtain through the Store, could impact your privacy, and what you can do to control that.

Store app and service

What this feature does

The Store lets you find and install apps for your PC. It also keeps track of the Store apps you’ve installed, so you can get updates for them and install them on more than one PC.

Information collected, processed, or transmitted

To find and install apps, you must sign in to the Store with a Microsoft account. This gives the Store access to information in your Microsoft account profile, such as your name, email address, and account picture. The Store collects and associates the following additional information with your Store account:

  • Payments to the Store. Information about what you bought, how much you paid, and how you paid when buying apps or making in-app purchases with your Store account.

  • Apps you've installed. The list of apps you’ve installed from the Store, the license policy for each app (permanent license or limited-time trial), and a list of purchases you made with your Store account within each app. In addition to storing this information online with your Store account, the Store stores licensing information on your PC for each app you install. This information identifies you as the owner of the license.

  • PCs you've installed apps on. The make, model, and computer name of each PC you install apps on, along with a number that uniquely identifies the PC. This number is generated based on the PC’s hardware configuration, and doesn’t contain any information about you.

  • Ratings, reviews, and problem reports. Once you’ve installed an app, you can write a review or leave a rating for it in the Store. Your Microsoft account is associated with these ratings. If you write a review, the name and picture from your Microsoft account will be published with your review.

  • Store preferences. Preferences you set for viewing apps in the Store, such as whether to only display apps that are available in your native language.

You can choose to store your payment information, such as a credit card number, with your Store account. For security purposes, this information is transmitted over SSL, and all but the last four digits of your credit card number are stored encrypted.

The Store collects some information about your copy of Windows, to determine whether it was sold at retail, is an evaluation copy, is subject to a volume licensing program, or was preinstalled by your PC’s manufacturer. When you first connect to the Store, a list of all the apps preinstalled on your PC is sent to the Store, which then associates licenses for those apps with your Store account.

As you browse the Store and use apps from it, Microsoft collects some information to help us understand usage patterns and trends, similar to the way many websites analyze their visitors’ browsing data.

Use of information

Microsoft uses your contact information to send you email necessary to provide the Store services, such as receipts for apps you buy. It uses your payment information to let you pay for purchases; if you choose to store this information, you won't need to enter it every time. Microsoft uses information about your purchases to operate the Store and provide customer support.

The Store keeps track of all the apps you’ve installed. You can use the Store to manage the list of devices you’ve installed apps on, and customer support can also help you manage this information. Once you install an app, you'll always be able to see it in your Store purchase history, even if you choose to uninstall it. The Store also uses this list to help enforce the limit on the number of PCs you can install apps on, as described in the Windows Store terms of use. When you write a review for an app, the name and account picture associated with your Windows account will be published next to the review in the Store. If you report a problem with an app, the problem report is made available to Store representatives to assess and take action on. They might use your name and the email address associated with your Store account to contact you, if necessary, when they review the report.

When there are updates available to apps you’ve installed, a notification will display in the Store, and the Store’s tile will indicate the number of available updates. You can then view the list of available updates and choose which ones to install. Updated apps might use different Windows capabilities than the previous versions, which could give them access to different resources on your PC. You can see the updated lists of capabilities on the App Description pages linked to from the page listing available updates.

The Store uses the information it collects about your copy of Windows to determine how Windows was installed on your PC (for example, whether your PC’s manufacturer preinstalled it). This information allows the Store to let you access apps provided exclusively by that manufacturer for its customers. It is also used to provide information to Microsoft (and in aggregate to the manufacturer, in some cases) about Windows usage patterns.

Microsoft uses some app purchase and usage data in aggregate to learn how people use the Store (for example, how users find the apps they install). Microsoft might share some of these aggregate statistics with app developers. Microsoft doesn't share any of your personal information with app developers. We use the browsing and usage data collected by the Store to better understand how people use the Store, and to improve Store features and services.

Choice and control

If you choose to use the Store, the information described in this section will be sent to Microsoft as described above.

If you want to remove a review that you have published for an app, go to the app description in the Store, edit your review, and delete all the text.

Automatic app updates

What this feature does

This feature checks for, downloads, and installs updates to Windows Store apps to ensure that you have the latest versions. App updates may include security updates, performance updates, or new functionality or content. Updated apps might use different Windows capabilities than the previous versions, which could give them access to different resources on your PC. You can learn about capability changes on the Product Description Page for the app in the Windows Store.

Information collected, processed, or transmitted

To provide automatic app updates, the Store sends the following information to Microsoft:

  • A list of all the apps installed from the Store by all users on your PC

  • The licensing information for each app

  • The successes, failures, and errors you experience when updating apps from the Store

  • Globally Unique Identifier (GUID) – a randomly generated number that doesn't contain any personal information

  • BIOS name, revision number, and revision date

  • Basic information about your PC, such as manufacturer, model, and the edition of Windows you’re using

Use of information

This information is used to provide the update service. It is also used to generate aggregate statistics that help us analyze trends and improve our products and services. It isn’t used to identify, contact, or target advertising to you.

Choice and control

If you choose express settings when setting up Windows, the Windows Store will check for, download, and install app updates automatically, even if you’re signed out of the Windows Store. If you turn off automatic app updates, you can choose whether or not you want to install an app update when you sign in to the Windows Store.

To turn off automatic app updates:

  1. Open the Windows Store.

  2. Swipe in from the right edge of the screen, then tap Réglages.

    If you’re using a mouse, point to the lower-right corner of the screen, then click Settings.

  3. Tap or click App updates.

  4. Tap or click Automatically update my apps to turn off automatic app updates.

To learn about what the most current version of the app can do, and to learn when an app was last updated, you can review the Product Description Page for the app in the Windows Store.

Permission for Store apps

What this feature does

Many apps you install from the Windows Store are designed to take advantage of specific hardware and software features of your PC. For example, a photo app might need to use your webcam, and a restaurant guide might need to know your location to provide nearby recommendations.

Information collected, processed, or transmitted

Here’s a list of features that apps must disclose they use:

  • Your Internet connection. Allows the app to connect to the Internet.

  • Incoming connections through a firewall. Allows the app to send information to or from your PC through a firewall.

  • A home or work network. Allows the app to send information between your PC and other PCs on the same network

  • Your pictures, videos, music, or documents libraries. Allows the app to access, change, or delete files in your libraries. This includes access to any additional data embedded in these files, such as location information in photos.

  • Removable storage. Allows the app to access, add, change, or delete files on an external hard drive, USB flash drive, or portable device.

  • Your Windows credentials. Allows the app to use your credentials to authenticate and provide access to a corporate intranet.

  • Certificates stored on your PC or a smart card. Allows the app to use certificates to securely connect to organizations like banks, government agencies, or your employer.

  • Your PC’s text messaging feature. Allows the app to send and receive text messages.

  • Your webcam and microphone. Allows the app to take pictures and record audio and video.

  • Your location. Allows the app to determine your approximate location based on a GPS sensor or network information.

  • Your PC’s near-field communication feature. Allows the app to connect to other nearby devices that the same app is running on.

  • Your portable devices. Allows the app to communicate with devices like your mobile phone, digital camera, or portable music player.

  • Your information on a portable device. Allows the app to access, add, change, or delete contacts, calendars, tasks, notes, status, or ringtones on your portable device.

  • Your mobile broadband account. Allows the app to manage your mobile broadband account.

You’ll see the features an app uses listed on its App Description page. If you install an app, Windows will allow it to use these features, except for location, text messaging, and webcam and microphone, which are considered especially sensitive. When an app requests access to one of these sensitive features for the first time, Windows will ask you whether you want to allow the app to use it. You can change whether the app can use it at any time.

In addition to the permissions above, if an app requests information from a device that stores information about you or your behavior, Windows will ask you whether you want to allow the app to use it. For example, if you connect a fitness device that tracks your location, Windows will ask if you want to allow the app to access it.

Use of information

Each app's use of these features will be subject to its developer's privacy practices. If an app uses one of the sensitive features described above, a link to the app publisher's privacy statement will be available on its App Description page in the Store.

Choice and control

You can see what features an app requires in the Store before installing the app. Windows will ask whether you want to allow or deny access to the most sensitive of these features—location, text messaging, webcam, and microphone—before the first time each app uses them.

When you look at an app’s App Description page in the Windows Store, there will be an abbreviated list of the features used by the app at the bottom of the left column. You can see the full list on the Details page of the App Description. After you install an app, you can see the full list of features it uses at any time, and control its access to the especially sensitive ones. To do this, open the app, open Réglages, and then select Permissions.

Personalized Store search and app recommendations

What this feature does

When you browse or search for apps in the Windows Store, Microsoft provides recommendations and search results to help you find apps that are relevant to you.

Information collected, processed, or transmitted

To help improve search results, Windows Store sends information to Microsoft about how you interact with it, including what you search for and what search results you select. Windows Store also sends an identifier associated with your Microsoft account to provide personalized search results based on your interactions with Bing and other Microsoft products and services. You can choose not to get personalized results, in which case the identifier won't be sent.

Use of information

The Store uses the identifier associated with your Microsoft account to provide personalized search results and recommendations based on your interactions with the Store and other Microsoft products and services, such as Bing and the Windows Phone Store. This includes information such as apps you’ve purchased, profile information you’ve provided in your Microsoft account, and your ratings and reviews of apps. This information may also be used to personalize other Microsoft products and services.

Choice and control

When you’re signed in to Windows with a Microsoft account, Windows Store personalized results and recommendations are turned on by default. You can choose not to get personalized results and recommendations from the Store in the Préférences section of Store settings.

Help improve the Windows Store by sending URLs for web content that apps use

What this feature does

Some apps you get from the Store are like websites and might expose your computer to potentially unsafe software, such as malware. If you choose to turn this feature on, it collects information about the web content used by these apps to help Microsoft diagnose potentially unsafe behavior. For example, Microsoft might use this information to remove an app from the Store.

Information collected, processed, or transmitted

If you choose to send information about the web content used by your apps, Microsoft will collect information about the URLs and types of content that these apps access when you use them. This can help us identify which of these apps are receiving content from harmful or unsafe websites. Reports sent to Microsoft include information such as the name or identifier of the app, the full URLs of addresses the app accesses, and full URLs that indicate the location of any JavaScript that the app accesses. Windows generates a number called a globally unique identifier (GUID) that is sent to Microsoft with each report. The GUID lets us determine which data is sent from a particular computer over time. The GUID doesn’t contain any personal information and isn’t used to identify you.

To help protect your privacy, the information sent to Microsoft is encrypted. Information that might be associated with a webpage that these apps access, such as search terms or data you entered into apps, might be included. For example, if you look up a word in a dictionary app, the word you look up might be included in the information sent to Microsoft as part of the full address accessed by the app. Microsoft filters these addresses to try to remove personal information where possible.

Use of information

Microsoft periodically reviews the information sent to help detect apps that might be interacting with unsafe web content, such as harmful web addresses or scripts. We might use this information to take action against potentially harmful apps. Addresses of web content can unintentionally contain personal information, but this information isn't used to identify, contact, or target advertising to you. We use the GUID to determine how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between potentially unsafe behavior occurring 100 times on a single PC, and the same behavior occurring once on each of 100 PCs.

Choice and control

If you choose express settings while setting up Windows, Windows will send information about the web content used by your apps from the Store built using JavaScript. If you choose to customize settings, you can control this setting by selecting Use SmartScreen online services to help protect against malicious content in sites loaded by Windows Store apps and Internet Explorer, and in malicious downloads sous Help improve Microsoft products and services. After installation, you can change this setting in Intimité in PC settings.

Top of Page

Windows Time service

What this feature does

The Windows Time service automatically synchronizes your PC's time with a time server on a network.

Information collected, processed, or transmitted

The service connects to a time server over the Internet or a local network using the industry standard Network Time Protocol. By default, this service synchronizes with time.windows.com once a week. No information other than standard PC information is sent to the time server.

Use of information

Information is used by the Windows Time service to automatically synchronize your PC's time.

Choice and control

The Windows Time service is turned on by default. You can turn this feature off in Date et l'heure in PC settings. Turning off Windows Time Service has no direct effect on apps or other services, but without a reliable time source, your PC’s clock might get out of sync with other PCs on the network or Internet. Apps and services that depend on time might fail or stop working correctly if there is a significant time discrepancy between networked PCs.

Top of Page

Windows Troubleshooting

What this feature does

Windows Troubleshooting allows you to diagnose and fix common problems on your PC.

Information collected, processed or transmitted

After running a troubleshooting pack, the results are saved to your PC. These results might contain personal information, such as your user name or the name of a device. Windows Troubleshooting can help you search for problem solutions in Windows Help and Windows communities online. Keywords associated with the problem will be sent to Microsoft to help find a solution. For example, if your printer isn’t working properly and you look for help, the words "printer," "print," and "printing" are sent to Microsoft.

Use of information

Microsoft uses the information collected from Windows Troubleshooting to help solve problems our users encounter.

Choice and control

To delete Troubleshooting results, go to Troubleshooting in Control Panel. Cliquez sur View history, select a result, and then click Effacer.

Top of Page

Work folders

What this feature does

Work folders are folders on your PC that are automatically kept in sync with your workplace’s file server.

Information collected, processed, stored, or transmitted

When you save a file in a work folder, the file is automatically synced to a file server managed by your workplace. Files saved in your work folder from other PCs will sync to your PC.

Use of information

Windows sends and receives the files in your work folders to keep the folders in sync. Use of the information stored on your workplace’s servers is subject to your workplace’s privacy policy.

Choice and control

You can manage your PC’s connection to work folders in Lieu de travail in PC settings.

Top of Page

Lieu de travail

Workplace lets you connect your device to Windows Intune (requires a separate subscription from Microsoft) or another 3rd party device management service. If you choose to allow your company administrator to manage your PC using Workplace, your company administrator may be able to perform tasks such as enforcing security policies on your PC, installing apps, viewing certain configuration and other information on your PC, and other management tasks. Please consult your company's privacy policy or system administrator for more information about your company’s use of this feature.

Information collected, processed, or transmitted

When you set up and use Workplace, your PC communicates with the device management service your company uses, which may be hosted by Microsoft. The credentials you enter to connect to your workplace are sent to the service.

Use of information

The information sent to the device management service is used to establish a connection between the service and your PC and to enable you to install a self-service app from the Windows Store. Please consult your company's privacy policy or system administrator for more information about the self-service app.

Choice and control

If your company uses Workplace, you can connect or disconnect in Workplace in PC settings under Réseau. After you’ve connected your PC to the service, you can view information about the connection or disconnect at any time.

Top of Page

Commentaires

Laisser un commentaire

Votre commentaire sera révisé par les administrateurs si besoin.