summaryrefslogtreecommitdiff
path: root/data/tests/example-gdpr.metainfo.xml
blob: 2bac8fc149bd5c73206624777a116ae0f16f583f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
<?xml version="1.0" encoding="UTF-8"?>
<!-- Copyright 2018 Richard Hughes <richard@hughsie.com> -->

<component type="general">
  <id>org.fwupd.lvfs</id>
  <name>Linux Vendor Firmware Service</name>
  <metadata_license>CC0</metadata_license>

  <agreement type="privacy" version_id="1.0">

    <agreement_section type="introduction">
      <name>Introduction</name>
      <description>
        <p>
          We hold personal data about vendors, administrators, clients and other
          individuals for a variety of purposes.
          This policy sets out how we seek to protect personal data and ensure that
          administrators understand the rules governing their use of personal data to
          which they have access in the course of their work.
          In particular, this policy requires that the Data Protection Officer (DPO) be
          consulted before any significant new data processing activity is initiated to
          ensure that relevant compliance steps are addressed.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="scope">
      <name>Scope</name>
      <description>
        <p>
          This policy applies to all users who have access to any of the personally
          identifiable data.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="dpo">
      <name>Who is responsible for this policy?</name>
      <description>
        <p>
          As the Data Protection Officer, Richard Hughes
          has overall responsibility for the day-to-day implementation of this policy.
          The DPO is registered with the Information Commissioner’s Office (ICO) in the
          United Kingdom as a registered data controller.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="processing">
      <name>Fair and lawful processing</name>
      <description>
        <p>
          We must process personal data fairly and lawfully in accordance with individuals’ rights.
          This generally means that we should not process personal data unless the
          individual whose details we are processing has consented to this happening,
          or where such collection is unavoidable and/or considered pragmatic in the
          context, e.g. logging the number of downloads of a particular file.
        </p>
        <p>
          We do not consider an IP address to represent a single user (due to NAT or VPN use),
          and as such metadata requests are not considered personal data using the draft GDPR guidelines.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="accuracy">
      <name>Accuracy and relevance</name>
      <description>
        <p>
          We will ensure that any personal data we process is accurate, adequate,
          relevant and not excessive, given the purpose for which it was obtained.
          We will not process personal data obtained for one purpose for any unconnected
          purpose unless the individual concerned has agreed to this or would otherwise
          reasonably expect this.
          Individuals may ask that we correct inaccurate personal data relating to them.
          If you believe that information is inaccurate you should inform the DPO.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="personal">
      <name>Your personal data</name>
      <description>
        <p>
          You must take reasonable steps to ensure that personal data we hold about
          hardware vendors is accurate and updated as required.
          For example, if your personal circumstances change, please update them using
          the profile pages or inform the Data Protection Officer.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="security">
      <name>Data security</name>
      <description>
        <p>
          We keep personal data secure against loss or misuse.
          Where other organisations process personal data as a service on our behalf,
          the DPO will establish what, if any, additional specific data security
          arrangements need to be implemented in contracts with those third party
          organisations.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="storage">
      <name>Storing data securely</name>
      <description>
        <p>
        All data is stored electronically.
        All documents and code are held on a locked LUKS partition with a password
        adhering to security best practices.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="retention">
      <name>Data retention</name>
      <description>
        <p>
          We must retain personal data for no longer than is necessary.
          What is necessary will depend on the circumstances of each case, taking into
          account the reasons that the personal data was obtained, but should be
          determined in a manner consistent with our data retention guidelines.
          Anonymized user data (e.g. metadata requests) will be kept for a maximum of
          5 years which allows us to project future service requirements and provide
          usage graphs to the vendor.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="transfer">
      <name>Transferring data internationally</name>
      <description>
        <p>
          There are restrictions on international transfers of personal data.
          We do not transfer personal data anywhere outside the EU without the approval
          of the Data Protection Officer, unless required to do so by law.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="access-requests">
      <name>Subject Access Requests</name>
      <description>
        <p>
          Please note that under the Data Protection Act 1998, individuals are entitled,
          subject to certain exceptions, to request access to information held about them.
        </p>
        <p>
          On receiving a subject access request, we will refer that request immediately
          to the DPO. We may ask you to help us comply with those requests.
          Please also contact the Data Protection Officer if you would like to correct
          or request information that we hold about you.
          There are also restrictions on the information to which you are entitled under
          applicable law.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="processing">
      <name>Processing data in accordance with your rights</name>
      <description>
        <p>
          We will never use identifiable vendor data for direct marketing purposes.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="transparency">
      <name>Transparency of data protection</name>
      <description>
        <p>
          Being transparent and providing accessible information to individuals about how
          we will use their personal data is important for our project.
        </p>
        <p>
          We will ensure any use of personal data is justified using at least one of
          the conditions for processing and this had been specifically documented.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="consent">
      <name>Consent</name>
      <description>
        <p>
          The data that we collect is subject to active consent by the data subject.
          This consent can be revoked at any time, but would end any vendor
          relationship with the LVFS.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="portability">
      <name>Data portability</name>
      <description>
        <p>
          Upon request, a data subject should have the right to receive a copy of their
          data in a structured format, typically an SQL export.
          These requests should be processed within one month, provided there is no
          undue burden and it does not compromise the privacy of other individuals.
          A data subject may also request that their data is transferred directly to
          another system. This is available for free.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="forgotten">
      <name>Right to be forgotten</name>
      <description>
        <p>
          A vendor may request that any information held on them is deleted or removed,
          and any third parties who process or use that data must also comply with the request.
          An erasure request can only be refused if an exemption applies.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="design">
      <name>Privacy by design and default</name>
      <description>
        <p>
          Privacy by design is an approach to projects that promote privacy and data
          protection compliance from the start.
          The DPO will be responsible for conducting Privacy Impact Assessments and
          ensuring that all changes commence with a privacy plan.
          When relevant, and when it does not have a negative impact on the data subject,
          privacy settings will be set to the most private by default.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="audit">
      <name>Data audit and register</name>
      <description>
        <p>
          Regular data audits to manage and mitigate risks will inform the data register.
          This contains information on what data is held, where it is stored,
          how it is used, who is responsible and any further regulations or retention
          timescales that may be relevant.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="breaches">
      <name>Reporting breaches</name>
      <description>
        <p>
          All users of the LVFS have an obligation to report actual or potential data
          protection compliance failures. This allows us to:
        </p>
        <ul>
          <li>Investigate the failure and take remedial steps if necessary</li>
          <li>Maintain a register of compliance failures</li>
          <li>
            Notify the Supervisory Authority (SA) of any compliance failures that are
            material either in their own right or as part of a pattern of failures
          </li>
        </ul>
        <p>
          Please refer to the DPO for our reporting procedure.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="monitoring">
      <name>Monitoring</name>
      <description>
        <p>
          Everyone who actively uses the LVFS must observe this policy.
          The DPO has overall responsibility for this policy.
          They will monitor it regularly to make sure it is being adhered to.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="consequences">
      <name>Consequences of Failing to Comply</name>
      <description>
        <p>
          We take compliance with this policy very seriously.
          Failure to comply puts both you and us at risk.
          The importance of this policy means that failure to comply with any requirement
          may lead to disciplinary action under our procedures.
          If you have any questions or concerns about anything in this policy,
          do not hesitate to contact the DPO.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="detail-misc">
      <name>Details: Firmware Vendor Information</name>
      <description>
        <p>
          What: The hardware vendor name, password, GPG public key and content of original
        uploaded firmware files..
        </p>
        <p>
          Why colected: Secure authentication, to allow any possible future audit and to provide
          authorised users access to signed firmware files.
        </p>
        <p>
          Where stored: MySQL database on fwupd.org.
        </p>
        <p>
          When copied: Backed up to off-site secure LUKS partition weekly.
        </p>
        <p>
          Who has access: The hardware vendor (filtered by the QA group) and the DPO.
        </p>
        <p>
          Wiped: When the vendor requests deletion of the user account.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="detail-misc">
      <name>Details: Service Event Log</name>
      <description>
        <p>
          What: IP address (unhashed) and REST method requested, along with any error.
        </p>
        <p>
          Why colected: Providing an event log for checking what the various hardware vendors are
          doing, or trying to do..
        </p>
        <p>
          Where stored: MySQL database on fwupd.org.
        </p>
        <p>
          When copied: Backed up to off-site secure LUKS partition weekly.
        </p>
        <p>
          Who has access: The hardware vendor (filtered by the QA group) and the DPO.
        </p>
        <p>
          Wiped: When the QA group is deleted.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="detail-misc">
      <name>Details: Firmware Download Log</name>
      <description>
        <p>
          What: IP address (hashed), timestamp, filename of firmware, user-agent of client.
        </p>
        <p>
          Why colected: To know what client versions are being used for download, and to provide
          a download count over time for a specific firmware file.
        </p>
        <p>
          Where stored: MySQL database on fwupd.org.
        </p>
        <p>
          When copied: Backed up to off-site secure LUKS partition weekly.
        </p>
        <p>
          Who has access: The hardware vendor (filtered by the QA group) and the DPO.
        </p>
        <p>
          Wiped: When the firmware is deleted.
        </p>
      </description>
    </agreement_section>

    <agreement_section type="detail-misc">
      <name>Details: Firmware Reports</name>
      <description>
        <p>
          What: Machine ID (hashed), failure string and checksum of failing file,
          OS distribution name and version.
        </p>
        <p>
          Why colected: Allows the hardware vendor to assess if the firmware update is working on
        real hardware.
        </p>
        <p>
          Where stored: MySQL database on fwupd.org.
        </p>
        <p>
          When copied: Backed up to off-site secure LUKS partition weekly.
        </p>
        <p>
          Who has access: The hardware vendor (filtered by the QA group) and the DPO.
        </p>
        <p>
          Wiped: When the firmware is deleted.
        </p>
      </description>
    </agreement_section>

  </agreement>

</component>