Is Microsoft Forms adequately secure to collect personal health information? [closed]

I want to make a survey on a website using Microsoft Forms. Patients would input personal health information into this form, so I want it to be secure.

The Microsoft website indicates that Microsoft Forms is HIPAA and BAA compliant, which sounds great; however, when I dig deeper, I don’t really find what I want to see in plain English.

Can information submitted over Microsoft Forms be read by someone other than me, the website owner?

How to determine if particular .NET/ASP.NET version has known vulnerabilities by version-build number using Microsoft resources?

I’m trying to find any list which can help finding if particular ASP.NET version has known vulnerabilities by version-build number. Googling doesn’t help. Is there a known list by microsoft which can help me, containing all existing build numbers (like “ASP.NET Version:2.0.50727.8813”), or any other way of checking if security patches has been already applied, for example the list of security patches with build numbers to which it updates the components? doesn’t help because it doesn’t contain build information, only lists major versions.

Microsoft DS vulnerability?

simply asking this out of curiosity I heard that Microsoft DS is a port that is commonly used by hackers to hack computers with due to its ability to transfer files. Two questions first, how do they transfer files with Microsoft DS and do they need an exploit to be able to have the malware run?

i like to know when microsoft going stop montoring our computers, and takeing files that they no right to

do u know how impossable it is to disable windows tracking. most u think just moveing few setting u done, currently there is over 100 gpo settings that must be eather turn on of off, then gpo must be appled to computer, forget firewall microsoft servers are hardcoded in the os, u must disable all task,in trasmiting information, go to regisitery disable termaml server setting start up to 4 and if this not enouf u have block access to rdp, ftp as on all computers there is a active ftp server weather or not u installed it and a acktive http server, now we have other probems remote cmd, remote power shell. all office sends out to microsoft servers, currently there over 7000 data centers that some share with apple and cisco, microsoft will take passwords user names and encription certifices i have logs showing they do just this, that they tied linux in to windows was better way to access bouth os, as there servers gose on and off line takeing bits of infomraiton, over time they can vr your hole system and wach all u do and they do have abuilt to wach what u do and recored it, micrsofot admited to hacking with nsa they was supose to remove remote desktop but the move past this they found new way accessing all the computers, worse is nsa not only ones gets all your information, most gose to chana u all did know most all the code is writen in chana so is apple and cisco, and we ask why is it so easy to get hack, these busness would never pay to have a hack proof software as i did offer a way for them to do it, that system would be totaly trasparnet, but then microsoft could not get the files eather, so how beat microsoft at there own game, what i do is find microsoft certifices and remove remote access and access to the encraption system and to athenacattion, but they can target any server or pc, and sence they recored what u do they undo just about anything, so why trust micrsoft now i can prove microsoft did for two years target my network, i do have logs to prove it, was no hacker and microsoft them selfs said yes they was on my network logs prove it , as they work with cisco becomes hard to block them , now i like know why micrsooft keeps changeing sercruty settings on my network i do have there remote login certifices and ip address and they montor all gpo set ups why, u all have no right to this informaton so why are u takeing it, so again why trust microsoft

How do I use Mathematica computation of special functions in Microsoft Excel computation?

I have a model equation which I find somehow easier to compute with some experimental data in Microsoft Excel. I had an initial model which is basically a Bessel function. In Mathematica, I was able to compute the model equation with this code:

With[{s = {i, 0, 15, 0.5}}, Table[{i^2, i^3, BesselJ[i, 5.2]}, s]] 

I was as well able to compute the model for experimental data without smooth ranges. The current model is essentially a Legendre equation which I could not find in the Excel formula bar. The challenge I have with the current model is that I have experimental data (of 300 rows) which do not have smooth ranges and I need to use them to determine the model function using Legendre function (a special function). Hence, is it possible to use the incredible computational power of Wolfram Mathematica within the formula bar of Excel or vice versa? Your kind suggestions would be greatly appreciated.

How exactly does Windows Defender in Windows 10 determine when to upload your local files to Microsoft?

Every time I install Windows 10, I painstakingly go through every setting that can be found in any GUI setting for the OS, disabling everything that sounds creepy.

One of the most disturbing things I’ve found is what I believe is called “automatic sample submission“, which means that the built-in anti-virus tool in Windows 10 can, by default, decide to upload any file it deems “potentially risky” to Microsoft, “for further analysis”. It also mentions that it doesn’t do this for files which “may contain personal data”.

But how can it know that? Does it:

  1. Simply look at the file extension and only upload .EXE and other “obvious binaries”?
  2. Does it ignore the file extension and instead look inside the file to check if it contains executable code?
  3. A combination of both?

What happens if I have a word processing document full of private information, but which also has a malicious macro or something accidentally baked (embedded) into it?

What happens if I have an EXE which actually has had all data files baked into it while I’m developing a game as to be a single file? (This is an actual situation I’ve been in in the past.)

Does it deem the data files for my local PostgreSQL database full of ultra-private information as “potentially dangerous” and upload those?

I can think of numerous situations where even the smartest code in the world would not be able to determine what contains private data or not. And, frankly, I have virtually zero confidence left in Microsoft’s judgment at this point, having wasted a huge amount of my life fighting the OS to be able to use it at all. I’ve found numerous typos in their “stable” releases, making me extremely scared of how much data has been uploaded in spite of all the care I’ve tried to take to avoid it.

I also remember that it eagerly wanted to re-enable this feature, even harassing me about it. I can imagine that the vast majority of users have no idea about this, let alone have gone through the trouble of force-disabling it.