I’m not an admin, but I do provision ms cloud licensing and have run across this question more than a few times. At the enterprise level, I’m told the copilot data is “walled off” and secure, and not harvested by MS. I have nothing to back that up, but that’s what I’m told. I’m certain if it weren’t true, I would have heard about it by now.
Comment on Microsoft Copilot has been banned for use by US House staff members, at least for now
thisisnotgoingwell@programming.dev 8 months agoFew questions about that, unless they’re literally taking their model and putting it into your own box using it’s own compute power, I don’t see how that’s possible. They can call it “your” copilot all they want but if they’re reading your data and prompts and computing that on their own box.
BurningRiver@beehaw.org 8 months ago
Kit@lemmy.blahaj.zone 8 months ago
Major organizations use encryption where they hold the keys so Microsoft is unable to read their data. They can have thousands of servers running on Microsoft’s Azure stack and yet Microsoft is unable to read the data that is being processed.
ForgotAboutDre@lemmy.world 8 months ago
If all auditors are uncorrupted, highly competent and have full overview. Boeing was able to corrupt it’s government auditors to save some money on redundant sensors. With Microsoft pushing big on gathering and selling data I wouldn’t trust a byte that passes their server.
TORFdot0@lemmy.world 8 months ago
Microsoft has to compete with other cloud providers on security. Unlike Boeing who has no domestic competition. Any of Google, Amazon, or Oracle would love to find out that Microsoft is decrypting user data to sell to partners because they would be screaming to the high heavens that O365/Azure is insecure and enterprises must switch to their solutions. SaaS/IaaS subscriptions are much more profitable than selling user data, there is a near 0 chance that Microsoft is improperly handling enterprise data (on purpose)
Kit@lemmy.blahaj.zone 8 months ago
Microsoft cannot decrypt your data when you hold the keys.
Kit@lemmy.blahaj.zone 8 months ago
You clearly do not understand encryption or corporate auditing.
thisisnotgoingwell@programming.dev 8 months ago
Thanks for the explanation