Oleksiy Mark - Fotolia
Some people have expressed concern over the way that Windows 8 collects and uses personal information. Let me shed a bit of light on the process and show you how you can delete some of the data that is collected.
In most cases, Windows 8 apps collect the personal information. You might have seen apps that ask permission to use your location or to share personal info over the Internet. In some cases, these applications may communicate with other apps, thereby resulting in potentially sensitive data being shared among apps.
Another way in which personal information may be used is through the device synchronization process. If you log into Windows 8 using a Microsoft account, then your devices can be kept in sync.
Over time, you might find that some of the data that Windows 8 apps have compiled begins to appear on your live tiles. This behavior is by design. It's how Microsoft tries to give you a more personal experience. However, in plenty of situations, it may not be in your best interest to have such information so prominently displayed.
If you want to clear private information from your live tiles, Windows makes it easy to do so. The process involves opening the Charms bar and then clicking on Settings. It is important to realize that the settings that will be displayed differ depending on whether you were on the Start menu or on the Desktop when you opened the Charms bar.
You must first open the bar from the Start menu. After clicking Settings, click on Tiles. Windows will then display a Clear button that you can click to remove personal information from your live tiles.
If you want to stop a PC from being synchronized, then open the Charms bar, click on Settings, and then click on Change PC Settings. Next, click on OneDrive, followed by Sync Settings. Finally, turn off the Sync Your Settings on This PC option.
Windows 8.1 doesn't include Backup and Restore, so rely on File History
Mind the security gaps left by Windows 8 features
Use Group Policy Objects to disable Windows Store apps
Don't neglect Windows 8 vulnerabilities when reviewing desktop security
Book excerpt: Building Windows 8 apps
Dig Deeper on Windows legacy operating systems
Related Q&A from Brien Posey
Unpredictable user behavior and boot storms can cause VDI resource usage fluctuations throughout the day. IT can take steps to identify and curtail ... Continue Reading
Like a car or any other important machine or device, backup architecture should have a maintenance plan. This process will help ensure the health and... Continue Reading
Expert Brien Posey breaks down why flash storage may not be the best choice for medical imaging archiving in terms of speed and cost, and how it may ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.