Move your business ahead with the latest security and compliance features within Office 365 Enterprise E5. Learn more

Office 365 Trust Center

Welcome to the place where we share our commitments and information about security, privacy, and compliance.
In this video, Julia White answers the question "Why trust Office 365?"
Play in-page video that answers the question, "Why trust Office 365?"
With Office 365, it’s your data. You own it. You control it. And it is yours to take with you if you decide to leave the service. The core tenets of our approach to earning and maintaining your trust are:

Built-in security

  • Service-level security through defense-in-depth
  • Customer controls within the service
  • Security hardening and operational best practices

Privacy by design

  • Your data is not used for advertising
  • You have extensive privacy controls
  • You can take your data with you when you want

Continuous compliance

  • Proactive processes to meet evolving compliance needs
  • Customer controls for organizational compliance
  • Independently verified to meet evolving standards

Transparent operations

  • You know where your data resides and who has access
  • Visibility into availability and changes to the service
  • Financially backed guarantee of 99.9% uptime

Kindred meets their security requirements with Office 365

Kindred Healthcare Logo

With Office 365, Microsoft could meet all of our security requirements in addition to our needs for regulatory and legal compliance. —Charles Wardrip

Read the full story

Quarterly uptime: 99.9%

You should know what’s going on. With Office 365, we aim to be transparent in our operations so you can monitor your service, track issues, and have a historical view of availability.

Office 365 security white paper

When you consider moving your organization to cloud services, security concerns add another layer of consideration. Read what Office 365 is doing to address your concerns.

Top 10 security and privacy features

Review the top security and privacy considerations to help you determine the security and trustworthiness of cloud service providers and their services.

RWeTPr