Connecting Technology and Business.

Microsoft InfoPath

Microsoft InfoPath enables you to design and fill out electronic forms, such as expense reports, time cards, surveys, and insurance forms. You can do this by using standard form controls, such as text boxes or list boxes, or insert controls that offer users the flexibility to add, remove, replace, or hide sections of a form to make a richer user experience. The forms that you design can range from simple forms for collecting data from your immediate team to complex forms that are part of a much larger business process. InfoPath forms can be used on their own, or you can design them to work with existing databases or Web services. Forms can be published to and accessed from a common location on a company network, such as a shared folder, a Web server, or a library located on a Microsoft SharePoint Server  or Microsoft SharePoint Foundation site.

When filling out a form in InfoPath, users can use familiar, document-like features. For example, they can check spelling in their form or insert formatted text and graphics into certain fields. Depending on the design of the form template, users may also be able to merge the data from multiple forms into a single form or export the data to other programs. If a form template is browser-enabled, users who don't have InfoPath installed on their computer can fill out the form in a Web browser or on a mobile device instead.

If you use InfoPath and Microsoft SharePoint Server running InfoPath Forms Services, you can design browser-compatible form templates in InfoPath and enable them for use on internal and external Web sites. This lets you share business forms with a variety of users, including employees, customers, suppliers, and partners. Users aren't required to have InfoPath installed on their computers to fill out a form, nor are they required to download anything extra from the Web. All users need is access to a browser, such as Windows Internet Explorer, Apple Safari, or Mozilla Firefox. If users do have InfoPath installed on their computers, they can display and fill out the form in InfoPath rather than a browser.

InfoPath consists of the following components: InfoPath Designer 2010, InfoPath Filler, and SharePoint Server running InfoPath Forms Services. InfoPath Designer and InfoPath Filler are installed on client computers as part of Microsoft Office Professional Plus. If you want to publish InfoPath forms as browser-compatible forms, you must have access to an installation of SharePoint Server running InfoPath Forms Services.

InfoPath Designer

To create and publish an InfoPath form template (.xsn), you use InfoPath Designer. When you design a form template (.xsn) file, you create a single file that contains the supporting files that implement the layout, views, and logic upon which a particular InfoPath form solution depends. When users fill out a form, they are actually filling out a form (.xml) file instance, which is based on the associated form template. Using InfoPath Designer you can quickly create forms that include pre-built layout sections, out-of-the-box rules, improved rules management, and varied styles. In addition, InfoPath Designer now includes a number of different form templates, so you don't need to define all parts of the form from scratch.

InfoPath Filler

With InfoPath Filler, people who are filling out forms have a simple and easy-to-use UI and can choose to save a draft, save a local copy, or save as a PDF and have a local record of the form. All the unnecessary functionality for designing forms has been removed for people who just want to open and fill out a form. 

InfoPath Forms Services   

Improved parity between InfoPath Filler forms and InfoPath browser forms in SharePoint Server ensures greater consistency for users who are filling out forms. For example, functionality available in both environments includes: Bulleted, numbered, and plain lists; Multiple selection list boxes; Combo boxes; Picture buttons; Hyperlink capabilities; Choice group and section; Filtering functionality; Date and time controls; and People pickers. 

Additionally, InfoPath is integrated with SharePoint Designer to enable you to create and customize the forms associated with Business Connectivity Services (BCS) external lists and workflow solutions.

- inputs from Office Support pages

Microsoft Azure Compliances and Certifications

ISO 27001-2013

ISO 27001 is an information security standard that is published by the International Organization for Standardization (ISO) and the International Electro-technical Commission (IEC) under the joint ISO and IEC subcommittee, ISO/IEC JTC 1/SC 27. It is a specification for an information security management system (ISMS). Organizations which meet the standard may gain an official certification issued by an independent and accredited certification body on successful completion of a formal audit process.


Payment Card Industry Data Security Standard is a proprietary information security standard for organizations that handle branded credit cards from the major card brands including Visa, MasterCard, American Express, Discover, and JCB. Private label cards --those without a logo from a major card brand are not included in the scope of the PCI DSS.

The PCI Standards is mandated by the card brands and run by the Payment Card Industry Security Standards Council. The standard was created to increase controls around cardholder data to reduce credit card fraud via its exposure. Validation of compliance is performed annually, either by an external Qualified Security Assessor (QSA) that creates a Report on Compliance (ROC) for organizations handling large volumes of transactions, or by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes.


The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by the United States Congress and signed by President Bill Clinton in 1996. It has been known as the Kennedy–Kassebaum Act or Kassebaum-Kennedy Act after two of its leading sponsors. Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers.

SOC 1 & SOC 2

Service Organization Controls are a series of accounting standards that measure the control of financial information for a service organization. They are covered under both the SSAE 16 and the ISAE 3402 professional standards.

SOC 1 reports will be prepared in accordance with Statement on Standards for Attestation Engagements (SSAE) No. 16, Reporting on Controls at a Service Organization. SOC 1 reports provide a means of reporting on the system of internal control for purposes of complying with internal control over financial reporting.

For reports that are not specifically focused on internal controls over financial reporting, SOC 2 and SOC 3 reports should be used. These reports will focus on controls at a service organization relevant to security, availability, processing integrity, confidentiality, and/or privacy.


Federal Risk and Authorization Management Program – FedRAMP - is a U.S. government program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud services used by the federal government.

UK G-Cloud

The UK Government G-Cloud is an initiative targeted at easing procurement by public sector bodies in departments of the United Kingdom Government of commodity information technology services that use cloud computing. The G-Cloud consists of:

  • A series of framework agreements with suppliers, from which public sector organizations can call off services without needing to run a full tender or competition procurement process
  • An online store - the "Digital Marketplace" (previously "CloudStore") that allows public sector bodies to search for services that are covered by the G-Cloud frameworks.


The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is designed to provide fundamental security principles to guide cloud vendors and to assist prospective customers in assessing the overall security risk of a cloud provider.


The Federal Information Security Management Act of 2002 was implemented to provide agencies the ability to document and implement information security programmes within their operational systems.


Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) is available to authorized local, state, and federal law enforcement and criminal justice agencies via any of the three law enforcement communication systems – National Law Enforcement Telecommunications System (NLETS), a more localized state criminal information system (name varies by state), and the International Law Enforcement Telecommunications System (INLETS). CJIS consists of several databases and one subsystem, and its retrieval and update capabilities are online.


Information Security Registered Assessors Program of the Australian Government assess the implementation, appropriateness and effectiveness of a system's security controls.


Multi-Tier Cloud Security Standard for Singapore (MTCS SS) is a cloud security standard, developed under the Singapore Information Technology Standards Committee (ITSC) to provide businesses with greater clarity on the levels of security offered by different cloud service providers. The standard covers areas such as data retention, data sovereignty, data portability, liability, availability, business continuity, disaster recovery and incident management.

FDA 21 CFR Part 11

The Food and Drug Administration Part 11 of Title 21 Code of Federal Regulations, Electronic Records; Electronic Signatures (21 CFR Part 11) applies to entities that maintain records or submit information to include records in electronic form that are created, modified, maintained, archived, retrieved or transmitted under any records requirements set forth in FDA regulations. Part 11 also applies to electronic records submitted to the Agency under the Federal Food, Drug and Cosmetic Act (the Act) and the Public Health Service Act (the PHS Act).


Family Educational Rights and Privacy Act is a Federal law that protects the privacy of student education records and imposes requirements on U.S. educational organizations regarding the use and disclosure of student education records. Restrictions imposed by FERPA include scanning Customer Data for advertising purposes.


The Federal Information Processing Standard (FIPS) Publication 140-2 is a US government security standard that specifies the security requirements for cryptographic modules protecting sensitive information.


China Cloud Computing Promotion and Policy Forum developed the Trusted Cloud Service Certification tests and evaluates a cloud service within an SLA framework in terms of 16 indexes including data management, service quality and rights protection. The test results issued by the CCCPPF are publically available.


Multi-Level Protection Scheme is based on the Chinese state standard (GB/T 22239-2008) and issued by the Ministry of Public Security. The certification labels target systems from level 1 to 5 (with 5 being the highest) based on their risk profiles. The MLPS provides assurance for both the management and technical security of the target system.

3 things you need to know in Outlook app for iOs and Android

Manage your Inbox effectively

The new Outlook app separates your mail into two tabs — Focused and Other. Important emails appear in your Focused inbox, while the rest remain easily accessible—but out of the way. If you move email in or out of your Focused inbox, Outlook learns this about you and gets even more tailored to your priorities. Outlook has a one-click unsubscribe to help you stop unwanted mail.

Outlook Inbox in iOS and Android.png 

The Focused Inbox works across all of your email accounts to help you focus on what matters.

With Outlook's customizable swipe gestures, rapid email triage is literally a one touch experience. You can swipe right or left to take actions like archive, delete, move, flag, mark as read/unread or schedule. Unlike other email apps, Outlook lets you personalize these swipe gestures to match your unique email habits. For email that you want to handle later, the 'Schedule Email' feature temporarily removes email from your inbox, to return at the time you choose.

Outlook Inbox in iOS and Android 2.png 

Schedule messages to temporarily leave your inbox and return at the time you choose.

Finding important emails is now lightning fast. Outlook's predictive search quickly finds the right emails, people and files as you type just a few letters. Outlook also lets you pivot on People, so you can see the people you email with most often and easily find all the emails, meetings and files shared with those people.

Outlook Inbox in iOS and Android 3.png 

People view shows people you email with most often and lets you conveniently drill down to see all related emails, meetings and shared files.

Best of all, these features work across your favorite email accounts, including Office 365, Exchange, Outlook.com, iCloud, Gmail and Yahoo! Mail.

Schedule a meeting quickly

In Outlook, your calendars are available right within the app, allowing direct interaction with your email, including features like viewing meeting details, invitees and their attendance status. The 'Quick RSVP' feature lets you respond to meetings (Accept / Tentative / Decline) right from your inbox, without even opening the mail.

The 'Send Availability' feature lets you find and share available meeting times in email with ease. Once you've settled on a time, you can even create a meeting invitation—all handled without leaving the app.

Outlook Calendar in iOS and Android 3.png 

With a few clicks, you can highlight available times on your calendar and insert a list into the body of your email.

Attach files easily


Outlook File attachments in iOS and Android.png 

Insert a link to file in the body of your email.R ecipients automatically are permissioned to view the file.

Outlook makes it simple to share files stored in the cloud.  With just a few taps, you can insert a link to any file from OneDrive, Dropbox and other popular accounts in your email message. Recipients are automatically granted permission to view these files, with no extra steps.

Need to find a file quickly? No problem. Outlook provides a view of your recently received email attachments, so you don't have to go searching through email to find that document you need. Outlook also lets you search across both your cloud storage and your email attachments at once, with Quick Filters to let you quickly sort by file type.

Designed for iOS and Android

The Outlook app feels natural on both iOS and Android. For example, on iOS, you will notice familiar icons and actions for creating new messages, identifying new mail and taking actions like archive and delete. On Android, we use the Navigation Drawer to house the multiple tools offered in the app and have common actions like settings available in the App Overflow menu.

Outlook Inbox in iOS and Android 4.png 

Outlook was built with the unique design principles of iOS and Android in mind.

Across both iOS and Android, the Outlook app works great on phone or tablet. For both the iPad and larger Android devices, additional screen size is used to unlock additional views like a two paned email list, week view in calendar and the ability to see a preview of your files.

Outlook Inbox in iOS and Android 5.png 

Outlook is adaptive to fit the device you are using, especially larger devices like the iPad and Android tablets.

-inputss from Office Blog