Privacy and Security


Privacy, Security and compliance in Microsoft Teams


Microsoft Teams is designed with IT in mind, providing management capabilities for collaboration, meetings, callings, and apps in one place with simple administration.

Privacy, security, and compliance

Collaborate more securely

Safeguarding your privacy by design

Our approach to privacy is grounded in our commitment to giving you transparency over the collection, use, and distribution of your data.

Get access to advanced security capabilities

Your data is protected from malware in attachments, accidental sharing via chat or files, and suspicious user activity. Information is secure with encryption, Multi-Factor Authentication, and device management.

Support for more than 90 regulations and standards

Administrators control what happens with business data. Easily address conflicts of interest, harassment, and legal inquiries with capabilities like information barriers, communication compliance, e-discovery, and legal hold.

Manage it your way

Microsoft Teams is designed with IT in mind, providing management capabilities for collaboration, messaging, meetings, calling and apps in one place with simple administration.

Key security and privacy features in Teams

  • Meeting options: Decide who from outside your organization can join your meetings directly, and who should wait in the lobby for someone to let them in. PSTN callers will join via lobby. Meeting organizers can also remove participants during the meeting.
  • Recording consent: All recordings of meetings are accompanied by a notice that a recording is taking place. The notice also links to the privacy notice for online participants, and the meeting organizer controls which attendees have permission to record.
  • Channel moderation and controls: Channel owners can moderate a channel conversation and control who is and isn’t allowed to share content in channel conversations. This helps ensure only appropriate content is viewed by others.
  • Multi-Factor Authentication: Require users to provide additional forms of verification to prove their identity, helping protect their accounts from attacks that take advantage of weak or stolen passwords.
  • Endpoint Manager: Manage devices and apps and enforce conditional access on any device.
  • External access: This provides an authenticated connection to another organization, enabling collaboration between organizations.
  • Data loss prevention: Prevent sensitive information from accidentally being shared with others.
  • Advanced Threat Protection: Protect users from malicious software hidden in files, including files stored in OneDrive or SharePoint.
  • Information barriers: Control communication between users and groups in Teams to protect business information in cases of conflict of interest or policy.
  • Retention policies: Manage content in the organization by deleting or preserving information to meet organizational policies, industry regulations, and legal requirements.
  • Data residency: Data in Teams resides in Microsoft’s secure network of data centers to help you meet compliance requirements.
  • Settings and policies: Meet organizational requirements with org-wide settings and tailor experiences to your users wiyh policies for teams, messaging, meetings, calling, and more.
  • Meeting role designation: A meeting organizer can define roles in a meeting that designate “presenters” and “attendees,” and control which meeting participants can present content in the meeting.
  • Recording access: Access to the recording is limited to people on the call, or those invited to the meeting, unless the meeting organizer authorizes others to access it. Recordings are uploaded to Microsoft Stream and may be shared and downloaded according to permissions enabled by account administrators.
  • Communication compliance: This enables organizations to foster a culture of inclusion and safety by identifying and preventing negative behaviors like bullying and harassment.
  • Conditional access: Set risk-based policies for access based on user context, device health, location, and more.
  • Secure guest access: Allows users to collaborate with individuals outside the organization while still controlling their access to organizational data.
  • Encryption: Teams encrypts data in transit and at rest and uses Secure Real-time Transport Protocol (SRTP) for video, audio, files, chat, and desktop sharing.
  • Sensitivity labels: Regulate who can access a team by controlling the privacy and guest settings.
  • Cloud App Security: Identify and mitigate suspicious or malicious activity, including the large-scale deletion of teams or addition of unauthorized users.
  • eDiscovery, legal hold, audit log, and content search: Easily identify, hold, and manage information that may be relevant in legal cases.
  • Safeguarding your privacy: Access your data any time, for any reason. It’s never used for advertising and is deleted after the termination or expiration of your subscription.
  • Data management reports: Access reports from the Transparency Hub, detailing how we have responded to requests for data.
  • Apps management: Confidently manage apps with detailed information of all apps available in your tenant and the ability to streamline the process of testing and distributing line-of-business applications.

Contact us today for more information.