When outages occur and source data is unavailable, you can use DPM to easily restore data to the original source or to an alternate location. That way, if the original data is unavailable because of planned or unexpected issues, you can easily restore data from an alternate location.
The following diagram provides an overview of DPM backup functionality. Learn more in How does DPM work? Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Is this page helpful?
Please rate your experience Yes No. Any additional feedback? We believe in transparency, so that people and organizations can control their data and have meaningful choices in how it is used. We empower and defend the privacy choices of every person who uses our products and services. Our time-tested approach to privacy is grounded in our commitment to give you control over the data you put in the cloud.
In other words, you control your data. Microsoft guarantees this with the contractual commitments we make to you.
Your data is your business, and you can access, modify, or delete it at any time. Microsoft will not use your data without your agreement, and when we have your agreement, we use your data to provide only the services you have chosen. You have access to independent audit reports of our compliance with privacy standards, which in turn offers support for meeting your own privacy obligations.
We only process your data based on your agreement and in accordance with the strict policies and procedures that we have contractually agreed to. We do not share your data with advertiser-supported services, nor do we mine it for any purposes like marketing research or advertising. When we deploy subcontractors or subprocessors to perform work that requires access to your data, they can perform only the functions that Microsoft has hired them to provide, and they are bound by the same contractual privacy commitments that Microsoft makes to you.
The Microsoft Online Services Subprocessor List identifies authorized, subprocessors, who have been audited against a stringent set of security and privacy requirements in advance. Use the tools and options available with Microsoft online services such as Microsoft Azure, Microsoft Dynamics and Power Platform, and Microsoft to determine where you want to store your data.
Microsoft offers data residency around the world, helping to ensure that resiliency and compliance requirements can be honored within geographic boundaries. We back these capabilities with contractual commitments and transparency regarding how we store and process your data.
With state-of-the-art encryption, Microsoft protects your data both at rest and in transit. Our encryption protocols erect barriers against unauthorized access to the data, including two or more independent encryption layers to protect against compromises of any one layer. All Microsoft-managed encryption keys are properly secured and offer the use of technologies such as Azure Key Vault to help you control access to passwords, encryption keys, and other secrets.
Microsoft defends your data through clearly defined and well-established response policies and processes, strong contractual commitments, and if necessary, the courts. We believe all government requests for your data should be directed to you. We will not disclose data to a government or law enforcement agency, except as you direct or where required by law.
Microsoft scrutinizes all government demands to ensure they are legally valid and appropriate. If Microsoft receives a request for your data, we will promptly notify you and provide a copy of the request unless legally prohibited from doing so.
Moreover, we will direct the requesting party to seek the data directly from you.
0コメント