Skip to content


Microsoft Teams Privacy and Security Policy

A guide for organizers and participants of online meetings and events hosted by Jadex Strategic Group within Microsoft Teams


Microsoft Teams is a cloud-based communication and collaboration platform that enables users to chat, call, meet, and share files with others. Microsoft Teams also allows users to host and join online meetings and events with external participants, such as customers, partners, vendors, or guests. Jadex Strategic Group leverages Microsoft Teams as our primary unified communications platform for collaboration as well as live events and webinars. However, hosting and joining meetings and events may pose some privacy and security risks that need to be addressed and mitigated. This document provides an overview of the privacy and security policy for meetings and events hosted by Microsoft Teams and offers some best practices and recommendations for organizers and participants.

Privacy Policy

Microsoft Teams and Jadex Strategic Group collect and process certain personal data from users to provide the service and improve its features and performance. The personal data collected and processed by us may include:

  • Name, email address, phone number, and profile picture
  • Chat messages, voice and video recordings, and transcripts of meetings and events
  • Feedback, ratings, and surveys
  • Usage and diagnostic data, such as device information, network information, performance data, and error reports

Microsoft Teams and Jadex Strategic Group respect the privacy rights of users and comply with applicable data protection laws and regulations. Jadex Strategic Group and Microsoft Teams do not sell or share personal data with third parties for their own purposes, except as required by law or with the user’s consent. Jadex Strategic Group and Microsoft Teams also provide users with various controls and choice over their personal data, such as:

  • Accessing, updating, deleting, or exporting their personal data
  • Managing their privacy settings and preferences
  • Opting out of certain data collection and processing activities
  • Requesting a copy of the data protection agreement between Microsoft and Jadex Strategic Group

For more information about the Microsoft privacy policy of Microsoft Teams, please visit:

Security Policy

Microsoft Teams and Jadex Strategic Group use various security measures and technologies to protect the confidentiality, integrity, and availability of the service and the user’s data. The security measures and technologies used by Microsoft Teams may include:

  • Encryption of data in transit and at rest
  • Multi-factor authentication and single sign-on
  • Role-based access control and audit logging
  • Threat detection and prevention
  • Data backup and recovery

Microsoft Teams also follows the security standards and best practices of the industry and the regulatory bodies, such as:

  • ISO/IEC 27001 and 27018
  • EU General Data Protection Regulation (GDPR)
  • US Health Insurance Portability and Accountability Act (HIPAA)
  • US Federal Risk and Authorization Management Program (FedRAMP)

For more information about the security policy of Microsoft Teams, please visit:

Best Practices and Recommendations

While Microsoft Teams and Jadex Strategic Group provide a high level of privacy and security for the service and the user’s data, there are also some best practices and recommendations that organizers and participants of meetings and events should follow to enhance their privacy and security. These include:

  • Verifying the identity and legitimacy of the external participants before inviting or admitting them to the meeting or event
  • Using a strong and unique password for the meeting or event, and not sharing it with anyone who is not authorized to join
  • Enabling the lobby feature and the waiting room feature to control who can enter the meeting or event
  • Disabling or limiting the recording, transcription, and screen sharing features for the external participants, unless they are necessary for the meeting or event
  • Reviewing and deleting any unnecessary or sensitive data that may have been generated or shared during the meeting or event, such as chat messages, recordings, transcripts, and files
  • Reporting any suspicious or malicious activity or behavior that may have occurred during the meeting or event to the appropriate authorities

For more tips and guidance on how to host and join external meetings and events securely and effectively, please visit: