Ethics Report

Ref. Ares(2016)6212092 - 31/10/2016
Joss Wright—Ed. (Oxford Internet Institute, Ethics Advisor)
Aggelos Kiayias (University of Edinburgh)
Thomas Zacharias (University of Edinburgh)
George Danezis (University College London)
Ethics Report
Deliverable D1.4
31st October 2016
PANORAMIX Project, # 653497, Horizon 2020
http://www.panoramix-project.eu
Revision History
Revision
0.5
1.0
1.5
1.7
Date
2016-07-31
2016-08-31
2016-10-03
2016-10-10
Author(s)
JW (OII)
JW (OII)
TZ (UEDIN)
GD (UCL)
1.5
2016-10-17
TZ (UEDIN)
1.8
2.0
2016-10-20
2016-10-31
JW (OII)
AK (UEDIN)
Description
Initial draft
Final version and submission to the EC
Requirements tables for each partner
Detailed procedures for UCL ethics review process.
Integrated input from partners regarding implementation.
Minor edits
Revised final version and submission to the EC
Executive Summary
Following the grant agreement the ethics report has a three-fold objective.
1. It details all procedures that will be implemented for data collection, storage, protection,
retention and destruction and confirmation of personal information by PANORAMIX
partners.
2. It provides copies of ethical approvals by the competent Ethics Committee and copies
of approvals for the collection of personal data by the competent University Data Protection Officer or National Data Protection authority and any relevant authorisations, if
applicable.
3. It contains templates of the informed consent form to be used.
The document is structured in three chapters, reflecting the above objectives.
Contents
Executive Summary
5
1 Introduction
1.1 Purpose of document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Project Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9
9
9
2 Procedures
2.1 Legal Framework . . . . . . . . . . . . . . . . . . . . . .
2.2 Personal Data . . . . . . . . . . . . . . . . . . . . . . . .
2.3 Data Management . . . . . . . . . . . . . . . . . . . . .
2.3.1 Data Collection . . . . . . . . . . . . . . . . . . .
2.3.2 Data Storage . . . . . . . . . . . . . . . . . . . .
2.3.3 Data Protection . . . . . . . . . . . . . . . . . .
2.3.4 Data Retention . . . . . . . . . . . . . . . . . . .
2.3.5 Data Destruction . . . . . . . . . . . . . . . . . .
2.3.6 Data Confirmation . . . . . . . . . . . . . . . . .
2.4 Implementation - Academic Partners . . . . . . . . . . .
2.5 Implementation - Industry Partners . . . . . . . . . . .
2.5.1 Private Electronic Voting Protocols (GRNET) .
2.5.2 Privacy-Aware Cloud Data Handling (SAP) . . .
2.5.3 Private-Preserving Messaging (Greenhost, Mobile
2.6 Notes on Data Procedures . . . . . . . . . . . . . . . . .
2.6.1 Loss of Personal Data . . . . . . . . . . . . . . .
2.6.2 Data Retention . . . . . . . . . . . . . . . . . . .
2.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
Vikings)
. . . . . .
. . . . . .
. . . . . .
. . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
11
11
11
11
11
11
12
12
12
12
12
15
16
17
17
19
19
19
20
3 Approvals
21
3.1 Academic partners (UCL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.2 Industry partners (GRNET, SAP, Greenhost, Mobile Vikings) . . . . . . . . . . . 23
4 Informed Consent
25
4.1 Academic partners (UCL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2 Industry partners (GRNET, SAP, Greenhost, Mobile Vikings) . . . . . . . . . . . 26
4.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
5 Conclusions
29
A Data Usage Agreements
A.1 GRNET Terms and Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A.2 SAP Terms and Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A.3 Greenhost Terms and Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
32
36
47
A.4 Mobile Vikings Terms and Conditions . . . . . . . . . . . . . . . . . . . . . . . . 54
D1.4 - ETHICS REPORT
1. Introduction
1.1
Purpose of document
This document sets out ethical considerations raised by the PANORAMIX project, and identifies
areas in which attention should be focused. Whilst a number of ethical issues in PANORAMIX
relate to data protection requirements, this document is not focused on legal compliance with
European data protection regulations. This document does not set out a proscriptive guide to
research ethics or attempt to enforce an idea of correct ethical behaviour. Instead this document
identifies ethical questions raised by the project, with the intention that these questions will be
considered by project researchers, rather than to define the answers to those questions.
1.2
Project Goals
PANORAMIX aims to develop a privacy-preserving communications infrastructure based on
mix networks that can be exploited by European businesses. The core goal of the project is to
develop a practical and scalable underlying mix-net infrastructure that will support a range of
possible future applications; in the project itself this infrastructure is to be applied to three specific use-cases. The example applications in the project comprise: mix-nets for electronic voting,
privacy-preserving cloud service provision with support for anonymised aggregate surveys and
statistical analysis, and privacy-preserving messaging. Each of these example applications is
supported by a partner with an existing customer base that provides the initial test-bed for the
technology.
In each of these cases the goals of PANORAMIX are to add or improve a privacy layer
over services that are already offered by the commercial partners. Due to this, data protection
requirements will, in each case, fall under the existing relationship that those partners have
with their users unless significant alterations are made to the service or if extra user data are
gathered, stored, or processed. There are some key clarifications to this, which will be discussed
below, however it is worth noting that for each partner, procedures for storage and processing of
personal data are already in place, and the projects use cases are not anticipated to gather any
extra data or require further procedures. Existing policies for handling of data are appended
to this document.
– 9 of 57 –
D1.4 - ETHICS REPORT
– 10 of 57 –
D1.4 - ETHICS REPORT
2. Procedures
2.1
Legal Framework
The European Data Protection Directive [Directive 95/46/EC] sets out a key element of the
ethical considerations for a project such as PANORAMIX, in which the major concerns are
the storing, handling, and processing of data concerning European citizens. It is worth noting
that Directive 95/46/EC is due to be replaced by the recently-adopted General Data Protection Regulation (GDPR) [Regulation (EU) 2016/679] in mid-2018. The modifications in data
management regulation that are put in place by the GDPR are reflected in this report so that
it is ensured the outcome of the project will be compliant with the new regulation.
2.2
Personal Data
Personal data are defined as: any information relating to an identified or identifiable natural
person (“data subject”); an identifiable person is one who can be identified, directly or indirectly,
in particular by reference to an identification number or to one or more factors specific to his
physical, physiological, mental, economic, cultural or social identity;” (Directive 95/46/EC
Article 2(a)) Within the context of PANORAMIX, this refers to identifiers such as names,
email addresses, and user accounts; messages, stored documents, and other data linked directly
to individual users of the services involved in the case studies. Personal data may also be
encountered by academic partners in the course of research on live internet trace. This second
case will be discussed in greater detail below.
2.3
Data Management
We provide the background principles for all the data management procedures of concern with
respect to the PANORAMIX project, namely, data collection, storage, protection, retention,
destruction and confirmation.
2.3.1
Data Collection
Data should be collected for specified, explicit and legitimate purposes. The data collection
process should allow the data subjects to give their consent. The purpose of data collection
should be explicitly determined at the time of the collection. In case of statistical purposes, the
result of processing is aggregate data and not personal.
2.3.2
Data Storage
The storage period should be reasonable with respect to the processing purposes. The data
should not be stored more than necessary and solely for the purposes for which they were
collected. In case of any detected data loss, the data subject should be informed without delay.
– 11 of 57 –
D1.4 - ETHICS REPORT
2.3.3
Data Protection
The key principles that apply to personal data protection are detailed here
• data processing should be authorised and executed fairly and lawfully. In case of any detected alteration or unauthorised disclosure, the data subject should be informed without
delay.
• special categories of processing: it is forbidden to process personal data revealing racial or
ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership,
and the processing of data concerning health or sex life. This provision comes with certain
qualifications concerning, for example, cases where processing is necessary to protect the
vital interests of the data subject or for the purposes of preventive medicine and medical
diagnosis.
• the data subject should have the right to object, on legitimate grounds, to the processing
of data relating to him/her. He/she should also have the right to object, on request and
free of charge, to the processing of personal data that the controller anticipates being
processed for the purposes of direct marketing. He/she should finally be informed before
personal data are disclosed to third parties for the purposes of direct marketing, and be
expressly offered the right to object to such disclosures.
2.3.4
Data Retention
The data controller should facilitate the data subject to access, rectify their data and practice
his/her ’right to be forgotten’ [GDPR, Article 17]. In addition, the controller should not hinder
any attempt of the data subject to transfer the collected data to another controller [GDPR,
Article 20].
2.3.5
Data Destruction
The data controller should evaluate the risks of accidental or unlawful data destruction. In case
of any detected destruction the data subject should be informed without delay.
2.3.6
Data Confirmation
Data processing should be performed transparently with respect to the natural persons concerned. The data controller must provide the data subject from whom data are collected with
certain information relating to himself/herself (the identity of the controller, the purposes of
the processing, recipients of the data, etc.). The data subject should be able to receive confirmation of their data processing. Easy-to-understand information on processing details should
be available to the data subject.
2.4
Implementation - Academic Partners
The academic partners in the project, with the exception of UCL, do not collect personal
data for experiments, research or any other purpose within the PANORAMIX consortium.
For this reason, this report does not provide any information about the data management
implementation procedures carried out by partners UEDIN, UoA, UoT, KUL.
Partner UCL, as part of WP3, designs and evaluates new designs for mix network, especially
for messaging (to support WP7), as well as novel techniques for privacy preserving statistics
and data collection (to support WP6). As part of these activities, UCL may request some data
from other user-facing partners, that is derived from users, and thus personal data, to evaluate
designs under realistic and ecologically valid usage loads.
– 12 of 57 –
D1.4 - ETHICS REPORT
We note that the purpose of some data collection will be the development of privacy-friendly
statistics collection and aggregation. Thus, the processing of personal data themselves will be
the first to benefit, in terms of privacy, from the PANORAMIX advances. Such procedures were
already researched as part of WP3 for the purpose of collecting distributions of data items, such
as the aggregate statistics discussed in
Luca Melis, George Danezis, Emiliano De Cristofaro: Efficient Private Statistics
with Succinct Sketches. 23rd Annual Network and Distributed System Security
Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016.
Two key categories of user derived data are foreseen to be of use to the activities of the UCL
partner:
1. Aggregate statistics: Those relate to the dynamics of the traffic in messaging systems,
such as those managed by Mobile Vikings. Those statistics, include the distribution of
message sizes, the distribution of the length of conversations, the distribution of latencies
of message delivery and responses, and distributions of media or attachment sizes. The
purpose of this collection is to evidence and evaluate mix networks and anonymisation
procedures as part of the PANORAMIX project and its outputs.
2. Granular anonymised traffic records: For the purpose of testing the performance of
designed mix systems, as well as anonymisation procedures, granular anonymised traffic
records may be requested from user-facing partners to act as (i) test and evaluation inputs
to the private statistics procedures, and (ii) loads for the evaluation of mix systems. The
granular records will be anonymised by removing identifiers and replacing them with
tokens unlinkable to the accounts concerned. However, unlike the aggregate statistics
above for which we can guarantee with high assurance a good degree of unlinkability to
raw data records, those granular records may be used alongside side information to deanonymise them. Since we treat anonymised granular records as personal information, the
full UCL Ethics approval process will have to be invoked for UCL to process such data.
More information about this process is provided in Section 3.1.
The implementation procedures for academic partner UCL for the two key categories are presented in the following tables:
– 13 of 57 –
D1.4 - ETHICS REPORT
Procedure
Collection
Storage
Protection
Retention
Destruction
Confirmation
Academic Partner UCL - Aggregate statistics:
The aggregate statistics are based on raw existing business records
collected by user-facing partners (such as Mobile Vikings). Those
raw records are aggregated at the point of collection to produce distributions, and provided as such to UCL. The aggregation will be
appropriate to ensure no information any single individual is linkable
back to that individual thus rendering them anonymised statistics at
the point UCL collects them.
Given the low-sensitivity in terms of the Data Protection Act of
anonymised aggregate statistics the datasets will be stored on researchers’ main computers, and protected in-line with other business
confidential data.
Anonymisation is applied at the point of collection as the key protection mechanism. Concepts and mechanisms implementing differential
privacy properties will be used to ensure no individual information
leaks from the dataset.
The data has to be retained until the publication of all scientific
articles output from the project, possibly up to 12 months after the
end of the PANORAMIX project, to ensure any requested revisions to
the works can be carried out. Subject to a discussion related to the
quality of protection and the strength of differential privacy, some
of the aggregated anonymised data may be made available to the
scientific community for the purposes of scientific reproducibility.
In case aggregates are not needed after the above retention period,
and those that are deemed either still sensitive or not needed for
further scientific inquiry, the data will be deleted using the safe delete
option offered by commodity operating systems.
Since the data are anonymised and aggregated users cannot be individually notified of the deletion, but the partners will be notified of
the deletion and consulted before any sharing (even for aggregated
and anonymised data, that may still be business sensitive).
– 14 of 57 –
D1.4 - ETHICS REPORT
Academic Partner UCL - Granular anonymised traffic
records:
Procedure
Collection
Storage
Protection
Retention
Destruction
Confirmation
2.5
The collected data concerns business and traffic records that are already being collected from user-facing partners for the purpose of
managing and improving their services. The purpose of this collection is compatible with the aims of PANORAMIX WP3 and WP6 /
WP7 for which we propose to collect the data. This will have to be
confimed by the legal department of partners, once the exact nature
of data needed is clear (Year 2 and Year 3), and the UCL Ethics
committee.
The data will be stored on an encrypted external hard disk that is
maintained in locked facilities at UCL. Access to the hard disk (physical) and cryptographic keys (logical) will be controlled by the UCL
PI and only given to staff directly working on WP3 and WP7.
The granular traffic records will be protected, at the point of collection, by replacing all identifiers with tokens to ensure that incidental
re-identification is not easy. However, we note that such a protection protects against UCL researchers that do not have access to
side-information, but may not protect anonymity sufficiently against
others that have access to enough side information to de-anonymise
the records. For this reason we will impose a security policy that
forbids the sharing of the granular data.
The granular data will be retained until all publications relating to
PANORAMIX have gone through peer review, to ensure repeatability
of experiments and results, and changes requested by the scientific
community can be implemented. We foresee that this will be no
longer than 12 months after the conclusion of the project.
Once the retention period has passed the logical hard disk key will
be deleted making the data unusable. The hard disk will be deleted
using the secure deletion facility of commodity operating systems.
Since the granular records are anonymised, it is not possible to notify
end-users users of the deletion of specific records. However, UCL will
notify the partners from which the data was collected that the data
was deleted. Under no circumstances UCL will share the data with
other parties.
Implementation - Industry Partners
The industry partners of the consortium that handle personal data are connected with the three
use-cases, which are associated with an industry partner, as shown in the table below.1
Case Study
Private Electronic Voting Protocols
Privacy-Aware Cloud Data Handling
Privacy-Preserving Messaging
Consortium
Partner
GRNET
SAP
Mobile Vikings,
Greenhost
In each case, the partner has a pre-established relation with its customers and is engaged with
PANORAMIX with the only objective to improve the privacy protection of the existing services
that are provided to its customers. This will not result to any fundamentally new provision for
1
The industry partner Mobile Vikings has been removed from the consortium on September 27th, 2016,
however, the ethics report was performed based on information collected in Year-1 of the project.
– 15 of 57 –
D1.4 - ETHICS REPORT
their users, and as such the underlying data protection agreements are not affected by the new
service. Thus, in the below sections we report on the existing data management procedures that
are used stressing that these procedures were not put in place for the purpose of PANORAMIX.
2.5.1
Private Electronic Voting Protocols (GRNET)
GRNET operates the Zeus electronic voting platform, which has been in use for over two years.
This platform already provides privacy-preserving electronic voting through a specific mix-net
implementation. The goals of PANORAMIX are to scale and improve the privacy protections
of this platform.
The Zeus platform administers the generation and distribution of voters’ credentials, vote
collection, and posting of the tallying authorities’ public data and all other information required
for monitoring the election. The implementation procedures are presented in the following table:
Procedure
Collection
Storage
Protection
Retention
Destruction
Confirmation
Private Electronic Voting Protocols (GRNET)
The electoral committee is responsible for entering the voter registration data (that is, the electoral register). This contains name,
surname, father/mothers name, e-mail, phone number. It may also
contain an eduGain principal ID. The electoral committee asks the
users consent to vote electronically, informing them that their registration data will be stored in an electronic electoral register. The
web server hosting Zeus (Apache) keeps a log of accesses and IP addresses. The information on which voters have voted is available to
the electoral committee through the Zeus interface, and is consistent
with the standard practice in paper ballots, where voter names are
stricken off the electoral roll. The web server logs can provide only
the access patterns and cannot violate anonymity as everything is
encrypted with the election keys. The access patterns may reveal the
location of the user when voting.
The voter registration data are stored in unencrypted form only to
be used for future elections.
The data are protected according to the procedures set by GRNET’s
Networks Operations Centre; this does not offer any extra protection
to voting data, but the voting data that is stored consists only of web
server logs, as explained above, and anonymised (through mixnets)
ballots and proofs. This information is also downloadable by the
electoral committee and could be be published without any inherent
privacy risk.
The users of the system (voters and electoral committee) can access
their data (ballots, voter voting data) and download them. GRNET
does not have a formal retention or erasure policy yet as such is
still subject to regulation for e-voting in Greece; in fact, the to date
experience shows that electoral committees request that GRNET will
retain voting data, even though no such commitment has been made.
As voting data accumulates with the increasing number of elections,
a formal GRNET retention policy will be adopted and will be in
compliance with e-voting regulation (when legislated).
The data are protected by unlawful destruction in the same way that
all data in GRNET services are. As explained above, voting data are
not treated separately.
The user is informed of every election procedure that his/her data
are processed. This is supported via the user’s personal mail and
verification of the public election transcript.
– 16 of 57 –
D1.4 - ETHICS REPORT
2.5.2
Privacy-Aware Cloud Data Handling (SAP)
SAP currently offers an encrypted database solution called SEEED. PANORAMIX research
will improve the ability of SAP to extract key performance indicators (KPIs) from this existing
encrypted service. The key performance indicators will be gathered at an aggregate statistical
level, with strict privacy guarantees.
Data (survey answers) are collected and provided as input to standard big data type of
aggregate analysis. In surveys, customers are often asked to provide sensitive data (e.g. health,
religion, business secrets, etc.) which need to be strongly protected. This is currently carried
out according to SAPs existing Global Data Protection and Privacy Policy, reproduced in Appendix A.2 of this document. The procedures’ implementation under the agreement’s conditions
are summarised in the following table.
Procedure
Collection
Storage
Protection
Retention
Destruction
Confirmation
2.5.3
Privacy-Aware Cloud Data Handling (SAP)
Data are collected only after the customer’s consent and only for
fulfilling the specified processing purposes.
Personal data are stored only for as long as is absolutely necessary for
the purposes specified or other legal requirements. Thereafter, personal data are deleted or anonymised. Inaccurate data are corrected
or deleted as soon as possible.
There is continuous monitoring that data processing is in line with
applicable law. Every employee and every third party acting on behalf
of SAP are instructed that they are not permitted to process personal
data without authorisation. If personal data is to be exchanged within
the SAP Group or with other companies, it must first be checked
whether contractual agreements on data protection and privacy and
data security are required.
Continuous legal monitoring is applied to ensure compliance with any
data retention requirements that arise in a case-by-case basis.
Continuous legal monitoring is applied to ensure compliance with any
data destruction requirements that arise in a case-by-case basis.
Following the terms of agreement, a person affected may, at any time,
request information about the data stored on them, its origin, purpose
for storing, and recipients to whom the data is passed on.
Private-Preserving Messaging (Greenhost, Mobile Vikings)
Greenhost
Currently, for the purposes of PANORAMIX data collection has only been performed on
anonymized metadata, with no personally identifying information. The data collection was
email metadata over a four hour time period that was provided to UCL in order to help parameterise and design the PANORAMIX mix network. See Deliverable 7.1 for instructions on how
the data was collected in aggregate and anonymised. In PANORAMIX, Greenhost will continue
work with the PrivEx-based approach of UCL keeps data provably anonymized and not maintain entire databases, but only “succinct sketches” of databases2 that cannot be de-anonymized
but maintain the crucial information needed for PANORAMIX such as average delivery time
and average number of messages per epoch.
We will inform users via a PANORAMIX-specific special agreement if individual outbound
or inbound email is logged. In this case, the customer will be bound by Article 6 “Experimental
2
Luca Melis, George Danezis, Emiliano De Cristofaro: Efficient Private Statistics, with Succinct Sketches.
NDSS 2016.
– 17 of 57 –
D1.4 - ETHICS REPORT
Software” of the terms of agreement. More information about Greenhost procedures are shown
in the table below.
Procedure
Collection
Storage
Protection
Retention
Destruction
Confirmation
Private-Preserving Messaging (Greenhost)
Data collection is never performed on an individual, but Greenhost
does use statistics on data in order to both identify what services are
working and how they are performing. This is captured in article 5.4
of Greenhost’s customer agreement, which is explicitly agreed with
by every customer of Greenhost.
Data collected for measuring the performance of PANORAMIX is
kept for 30 days. The data is then sent to UCL for analysis, but
locally the data are then deleted. An archival copy may be captured
by regular back-ups of the Greenhost system, but archives are only
kept in general for 6 months. Thus, there is no long-term storage of
even anonymised data for PANORAMIX analysis by Greenhost.
Article 10 states that data will not be gathered without consent and
Greenhost is governed by Dutch law which includes the Dutch data
protection act. In detail, in Article 10.2 “Greenhost will not take cognizance of data stored by the customer...unless with the Customer’s
consent, access has been necessary for performance of the contract or
Greenhost is required to do so under a statutory provision or authorized order by the authorities. In that case Greenhost will endeavour
cognizance of the data to minimize, to the extent with its power and,
if possible, inform the customer of this application in an up to date
manner.”
Greenhost follows the current Data Protection Regulation, and will
continue to follow the GDPR. This gives customers the ability to
demand deletion or modification of their data. Greenhost will comply
with all Dutch data retention laws. However, currently although it
has been debated in the Dutch parliament, there is currently not a
Dutch Data Retention directive and so data retention is covered, as
noted earlier, by Article 5 of the customer agreement and so data is
only retained to optimise services. In general, Greenhost does not
retain individual traffic or even IP addresses of its customers.
The data destruction policy is covered in Article 10 of the agreement.
Note that this right continues after the customer has left Greenhost,
as Article 10 states that “The obligation of this article will remain
after the termination of the Agreement for any reason, and so much
for so long as the providing party can reasonably claim to the confidentiality of the information. Although this is not explicit, “Unlawful
destruction” would be a violation of the Contract by Greenhost, as
the service contract requires the data be available to the customer by
the definition of the Service.
Greenhost logs data automatically when needed in terms of performance, but only in aggregate without individual logs (See Deliverable
7.1 for details). Therefore, Greenhost does not ask the individual customer to confirm if the data is original or correct. However, if a sample
of data is collected for performance, any deviations would be detected
from other samples and could lead to an investigation. Also, in terms
of PANORAMIX, the aggregate anonymized data are also being analyzed by UCL, who should detect anomalies and help confirm our
analysis of how email traffic can work with a PANORAMIX-enabled
mix net.
– 18 of 57 –
D1.4 - ETHICS REPORT
Mobile Vikings
Mobile Vikings offer mobile phone services to users, with the option to sign up to an active
Viking Lab that allows participation in developing mobile technologies and services. This existing user base, who make an explicit choice to engage in individual experimental services, will
be the target of the developed PANORAMIX messaging application.
The customers of Mobile Vikings are granting the management of their personal data under the Privacy Conditions Agreement reproduced in Appendix A.4 of this document. The
procedures implementation under the agreement’s conditions are summarised in the following
table.
Procedure
Collection
Storage
Protection
Retention
Destruction
Confirmation
2.6
Private-Preserving Messaging (Mobile Vikings)
Mobile Vikings keep record registration data that contain: first name,
last name, address, email address, date of birth, phone number. Information is requested from the customers when they send emails
to verify registration data. In case of customer contacting, Mobile
Vikings may link the contact to the customer’s registration file, if
necessary.
The registration data and the data regarding the customer’s transaction with Mobile Vikings are included in a permanent record.
Among a list of legitimate use purposes, customers consent that their
data are processed for handling their orders and bills, conducting
market research, Mobile Vikings management, resolution of legal disputes, etc. On simple request, the customers can oppose the use of
their private information for purposes of direct marketing.
On simple request, the customers can access, correct, rectify and/or
change their data.
The company is compliant with all regulations of Belgian law according to data destruction.
The customers are able to verify the validity of their personal record
on simple request.
Notes on Data Procedures
In this section, we provide comments on data processing issues directly related to the project
goals that could be given longer-term consideration.
2.6.1
Loss of Personal Data
Traditional messaging and storage services operate on the basis of trust in the provider to
maintain adequate protection for data whilst retaining the ability to access that data if required.
Encrypted storage and messaging removes both the requirement for trust in the operator, as
well as the ability of the operator to retrieve data on behalf of a user whose credentials have
been lost. Fundamentally, little can be done here beyond informing users of the inability of the
operator to retrieve private data. With increasing usage and awareness of encrypted storage,
such as full disk encryption for platforms such as Microsoft Window, Apple Mac OS, Android,
and iPhone iOS, users are increasingly aware of the inability of providers to retrieve correctly
encrypted data on demand.
2.6.2
Data Retention
Following the April 2014 decision of the Court of Justice of the European Union in a case brought
by Digital Rights Ireland (C-293/12), the EU Data Retention Directive (Directive 2006/24/EC)
– 19 of 57 –
D1.4 - ETHICS REPORT
was ruled unconstitutional on the grounds that bulk collection of personal data failed to be necessary and proportionate for the purposes of law enforcement. In light of this decision, prior
existing requirements for communication providers to store data regarding customer telecommunications are no longer in force at the European level, although the specific status of national
laws that transposed the Data Retention Directive is in some cases contested. As such, any
interaction that data retention requirements might have previously had with respect to the
services offered by PANORAMIX are no longer relevant.
2.7
Summary
This completes the description of data management procedures as implemented by the PANORAMIX
consortium partners. The academic partners, with the exception of UCL, do not engage in data
collection within the consortium and thus no information is provided regarding their procedures.
For the remaining partners, only UCL has specific procedures put in place for the purposes of the
PANORAMIX project. The industry partners, GRNET, SAP, Greenhost, and Mobile Vikings,
engage in the consortium under their pre-existing relationships in terms of data management
with their user base.
It is important to stress that the PANORAMIX system does not change the nature of
existing data management procedures (collection, storage, protection, retention, destruction
and confirmation) for these partners and neither poses a hindrance in terms of the ability to
comply with current and future regulations in data management. In fact, the employment of the
PANORAMIX system will be an argument assisting in compliance arguments, since it enables
data management procedures related to collection, storage and protection to enjoy an improved
anonymity profile in comparison to a non-PANORAMIX enhanced deployment.
– 20 of 57 –
D1.4 - ETHICS REPORT
3. Approvals
3.1
Academic partners (UCL)
The only academic partner engaging in data collection for research is UCL. All research proposals involving living human participants and the collection and/or study of data derived from
living human participants undertaken by UCL staff or students on the UCL premises and/or by
UCL staff or students elsewhere requires ethical approval to ensure that the research conforms
with general ethical principles and standards.
As documented on the UCL website relating to research Ethics, ethical approval at UCL
follows a 10 step process, dependant on the nature of the research undertaken. However, blanket
pre-approval is not possible (say for all potential activities in PANORAMIX), and individual
approvals will be necessary depending on the specifics of the data and research conducted. For
this reason, there is no copies of approval that can be supplied at this stage. Nevertheless, these
will be sought and acquired in year-2 and year-3 of the project as needed and following the
procedure outlined below.
- Step 1: Researchers are advised to submit approvals being mindful of the deadlines and
timelines necessary for the Ethics committee to consider the application. The committee meets
about once a month.
- Step 2: Researchers register within the Ethics database [5], with personal details, if not
already registered. If this is a first application to the Committee, a personal account will be
established. Otherwise, the proposal will be added to the researcher’s account which can be
viewed when they enter the site http://ethics.grad.ucl.ac.uk/new_user.php
A unique Project ID for the proposal will be issued. The finance department will require
this Project ID in order to process grant applications based on this research. Once a Project ID
has been issued, the application form and guidelines will be available for download. A sample
copy of the documentation can be viewed below.
- Step 3: (not required for PANORAMIX research) Formal Sponsorship Review for Clinical
Trials Conducted in Developing Countries.
- Step 4: (not required for PANORAMIX research) Disclosure and Barring Service (DBS)
Checks. A criminal record check will be required by law if the research includes working in
’Regulated’ activity with vulnerable groups as defined by the Safeguarding Vulnerable Groups
Act 2006 or in a position of trust as defined by the Rehabilitation of Offenders Act Exception
Order 1975. Please note that UCL, in accordance with DBS guidelines, does not accept portability of DBS checks which UCL staff or students may have from previous organisations as proof
of satisfactory clearance.
- Step 5: (required for PANORAMIX) Data Protection. The subject can register for Data
Protection on the website by downloading ‘Form 2: Research Registration Form’ [6]. The form
should be completed on-line and e-mailed to: [email protected]. The Legal Services
should be able to process your application within 5 days upon which time you will be issued
with a Data Protection Registration Number1 . Please quote your data protection registration
1
See https://www.ucl.ac.uk/finance/legal/dp-foi-overview
– 21 of 57 –
D1.4 - ETHICS REPORT
number in section A2 of the application form as evidence that the project has been registered
with the UCL Data Protection Officer.
- Step 6: Risk Assessment. In order to determine whether there are any risks associated
with your research i.e., risks to yourself as the researcher and to those you are researching, it is
important to carry out a risk assessment. It is a legal requirement that all research is assessed
for risk. Submitters can refer to UCL Safety Services guidance on how to carry out a risk
assessment. The guidance includes how to record the assessment which must be authorised by
your Supervisor and retained for the submitters’ records.
- Step 7: (not required for PANORAMIX): Insurance. The insurance for all UCL studies is
provided by a commercial insurer. For the majority of studies the cover is automatic. However,
for a minority of clinical research studies the insurer requires prior notification of the project
before cover can be provided. Travel Insurance arrangements for students conducting research
overseas — for studies conducted overseas an application form will need to be completed so
that an insurance cover note can be issued.
- Step 8: Completion of the application form and appendices that are applicable to the
study ensuring that both the Principal Researcher and the Head of Department have signed
the form. The Head of Department should also indicate on the form whether the application is
being submitted for (a) Chair’s action or (b) Full Committee Review based on the criteria of
minimal risk.
→ Application Form: http://ethics.grad.ucl.ac.uk/forms/appform_sample.pdf
→ Application Guidelines: http://ethics.grad.ucl.ac.uk/forms/guidelines.pdf
→ Model Participant Information Sheet and Guidance: http://ethics.grad.ucl.ac.uk/
forms/model-participant-information-sheet-and-guidance.pdf
Recruitment Documents for Participants. All studies that involve the recruitment of participants will use recruitment documents such as information sheets and consent forms. For example forms as well as guidance on formulating your participant information sheet (see Advice on
Formulating Participant Information Sheets http://ethics.grad.ucl.ac.uk/advice.php).
- Step 9: When the application is complete, submitters are strongly encouraged to mail
physical copies of their application and supporting documentation, either via the internal UCL
mail or externally to the following new address, rather than in person, as access will be an issue
at 1-19 Torrington Place. If the application is for full committee review 13 double-sided copies
will be required and for Chair’s review, 2 copies.
INTERNAL Mailing Address
EXTERNAL Mailing Address
Helen Dougal
Research Ethics Co-ordinator
Academic Services
1-19 Torrington Place (9th Floor)
UCL
Helen Dougal
Research Ethics Co-ordinator
Academic Services
UCL
Gower Street
London
WC1E 6BT
An electronic copy should be also submitted to [email protected]
- Step 10: Following Approval. The Principal Researcher must report any proposed
changes, any adverse events and if required report progress on an annual basis (see Key Responsibilities of the Principal Researcher following Approval http://ethics.grad.ucl.ac.uk/
responsibilities.php).
– 22 of 57 –
D1.4 - ETHICS REPORT
3.2
Industry partners (GRNET, SAP, Greenhost, Mobile Vikings)
As it will explained already in Section 2.7 (see also Section 4.2), for all of PANORAMIX
users engaged in the main case studies run by the Consortium industry partners, personal
data are processed in a fully consistent manner with respect to related partner’s Terms and
Conditions that the users have already consented. Therefore, further approval documents for
data processing by industry partners are not applicable.
– 23 of 57 –
D1.4 - ETHICS REPORT
– 24 of 57 –
D1.4 - ETHICS REPORT
4. Informed Consent
Informed consent is a key principle of ethical research, ensuring that research participants are
adequately informed of the risks of taking part in experimental studies, that their participation
is voluntary, and that the information about them gathered remains under their control. The
two key principles of informed consent, taken here from the ESRC Framework for Research
Ethics (http://www.ethicsguidebook.ac.uk/consent-72), can be defined as:
- Principle 1: Research subjects must be informed fully about the purpose, methods and
intended possible uses of the research, what their participation in the research entails and
what risks, if any, are involved.
- Principle 2: Research participants must participate in a voluntary way, free from any
coercion.
We analyse how PANORAMIX project data processing activities comply with the two key
principles separately for the involved academic and industry partners.
4.1
Academic partners (UCL)
As mentioned in Section 2.5, the academic partners in the project, with the exception of UCL,
do not collect personal data for experiments, research or any other purpose.
Regarding partner UCL, all experiments that may result in data capturing due to measurement of internet traces, will be performed only after the approval of UCL’s Ethical Committee
(see Section 3.1), whose standards not only respect informed consent (hence Principles 1 and 2)
but also the participants’ right to confidentiality and the balancing of their involvement against
the potential benefit of the conducted research to the overall community.
The UCL partner does not collect data directly from users, but only indirectly though the
user-facing partners of the project. We foresee such collection is lawful under the existing Privacy
Statements of the partners (such as Mobile Vikings) allowing the collection of information for
the purposes of monitoring and improving their services.
All the data collected is anonymised, at the point UCL receives it – in a very strong sense
when it comes to aggregate data, and in a sufficient manner with respect to data protection
when it comes to granular records – thus making the legality of the collection a matter for the
user-facing partner and placing UCL in a role of Personal Data Processor rather than Personal
Data Controller. Thus UCL will have to abide by the privacy statement of the partners.
In extremis, in case specific and identifiable data needs to be collected, UCL will advise the
user-facing partners about the form user notice and consent needs to take. UCL has clear guidelines on how to formulate such consent forms as documented in http://ethics.grad.ucl.ac.
uk/forms/model-participant-information-sheet-and-guidance.pdf and http://ethics.
grad.ucl.ac.uk/advice.php
In all cases, and in the spirit of the UCL Ethics approval which requires strong data minimization and purpose limitation, such consent forms can only be drafted once the exact nature of
– 25 of 57 –
D1.4 - ETHICS REPORT
the collection and processing purpose is known in Year 2 and Year 3. However, all institutional
procedures and processes are in place once this is necessary.
4.2
Industry partners (GRNET, SAP, Greenhost, Mobile Vikings)
All subjects that engage as customers in the standard activities of the partners GRNET, SAP,
Greenhost and Mobile Vikings consent to their data processing according to the terms and
conditions agreement of each partner, provided in Appendices A.1, A.2, A.3 and A.4 respectively.
As presented in Subsections 2.5.1 2.5.2 and 2.5.3 all three agreements are consistent with EU
data protection and privacy regulations, therefore preserve Principles 1 and 2. PANORAMIX
project activities related to industry partners comply with the said principles by being fully
consistent with the terms and conditions of each partner’s agreements. In particular,
• GRNET’s existing data protection and usage agreement, “Terms and Conditions”, are
specified with respect to the existing electronic platform. Applying PANORAMIX mixnet into the Zeus e-voting system and combined with the privacy protections already
in place that anonymise personal data with respect to the use of the service, GRNETs
existing data protection and usage agreements do not need alteration for the purposes of
PANORAMIX.
• In surveys, SAP customers are often asked to provide sensitive data (e.g. health, religion,
business secrets, etc.) which need to be strongly protected. Beyond existing customer
data covered by SAPs existing Global Data Protection and Privacy Policy, no personal
information processing will be carried out for the purposes of PANORAMIX.
• The customers of Greenhost are providing data based on the existing “Usage Terms and
Conditions.” The type of data collection for PANORAMIX purposes is consented as
part of “Article 6. Experimental Software” in the agreement and are used solely for the
optimisation of the operation of the messaging system.
• The customers of Mobile Vikings are granting the management of their personal data
under the Privacy Conditions Agreement. The user base for the PANORAMIX PrivatePreserving Messaging use case consists only of already existing customers of Mobile
Vikings. Consequently, the customers’ relationship with Mobile Vikings as a data controller, in combination with their explicit consent to make use of the service, do not require
alteration to existing agreements.
4.3
Summary
As far as academic partners are concerned, only partner UCL’s foreseen engagement may result
in data processing and this will be done under the restrictions of UCL Ethical Committee’s
approval, see Sections 3.2, and 4.1.
Apart from the UCL partner’s upcoming activities, the research in PANORAMIX, and
certainly in the main case studies developed by industry partners, does not involve the gathering
of personal data in the form envisioned by traditional informed consent scenarios in research. In
these case studies, direct user experimentation is limited to the extension and improvement of
privacy protections in systems with which users are already familiar, and for which users have
made an active decision to take part.
Ethics Advisor Statement. Users in PANORAMIX are not directly studied,
subjected to treatment, asked to complete tasks, surveyed, or analysed individually.
As such, as ethics advisor I am of the opinion that seeking additional informed
– 26 of 57 –
D1.4 - ETHICS REPORT
consent for participation in the main case study research is unnecessary unless the
specific details of the research are later determined to place users at extra risk with
respect to the exposure of their personal data.
– 27 of 57 –
D1.4 - ETHICS REPORT
– 28 of 57 –
D1.4 - ETHICS REPORT
5. Conclusions
The PANORAMIX project is chiefly concerned with adding enhanced privacy considerations
to existing services. In each of the use cases electronic voting, cloud platforms, and mobile
messaging the experimental privacy enhancements do not entail a new service or experiment
in which new forms of personally-identifying information are gathered, but instead make use
of existing services. As such, the existing data protection agreements and procedures for those
services do not require amendment.
Academic work at partner UCL may utilise data collected by partner Greenhost to improve
the efficiency and fine tune the messaging application. Researchers at UCL will engage with
their institutional research ethics committees, and will practice data minimisation and anonymisation techniques to remove or delete immediately all data beyond that required to test their
techniques. The procedures to be followed have been thoroughly documented in this report.
Ethics Advisor Statement. As ethics advisor to the project, I am satisfied
that the research in the project has been designed with full consideration for ethical concerns, and that the appropriate measures are in place for compliance with
data protection and informed consent of users to participate in the research. The
PANORAMIX project is unusual, in some senses, in that the goals of the project
intrinsically aim to improve many of the traditionally-considered ethical concerns
related to data privacy and security. Further, the research of the project relies on
modifications to existing services that improve, rather than compromise, the protections of users. Despite this, the nature of the project does raise some broader
ethical considerations beyond the basic compliance with data protection. These considerations, relating to the provision of strongly-anonymous services, with the accompanying potential for untraceable abuse and criminal activity, have been raised
and actively discussed at project meetings. While such questions do not admit to
easy answers, as ethical advisor I am satisfied that consideration of these questions
have been fundamentally incorporated into the research of the project and in fact an
upcoming deliverable (D1.5, “System Abuse / Misuse and Mitigation Strategies”)
will address them.
– 29 of 57 –
D1.4 - ETHICS REPORT
– 30 of 57 –
D1.4 - ETHICS REPORT
A. Data Usage Agreements
This section reproduces the applicable data usage agreements, terms of service, or privacy
policies in place for the commercial project partners.
– 31 of 57 –
D1.4 - ETHICS REPORT
A.1
GRNET Terms and Conditions
– 32 of 57 –
GRNETTe
r
msa
ndCondi
t
i
ons(
Le
g
a
lRe
por
t
)
#Ge
ne
r
a
l
GRNETS
.
A.ha
sp
r
i
v
a
c
ypo
l
i
c
ydo
c
ume
nt
sf
o
rpa
r
t
i
c
ul
a
rs
e
r
v
i
c
e
si
t
o
,e
r
s
.Thede
t
a
i
l
sa
nds
pe
c
i
fic
so
ft
hepr
i
v
a
c
ypo
l
i
c
yo
fe
a
c
hs
e
r
v
i
c
e
a
r
ede
fine
da
c
c
o
r
di
ng
l
y
,i
nc
l
o
s
ec
o
o
pe
r
a
t
i
o
nwi
t
ht
heHe
l
l
e
ni
cDa
t
a
Pr
o
t
e
c
t
i
o
nAut
ho
r
i
t
y(
HDPA)
,
de
pe
ndi
ngo
nt
hena
t
ur
ea
ndt
he
r
e
q
ui
r
e
me
nt
so
fe
a
c
hs
e
r
v
i
c
e
.
Ane
x
a
mpl
eo
fs
uc
haPr
i
v
a
c
yP
o
l
i
c
ydo
c
ume
nt
,
t
ha
ta
ppl
i
e
st
oGRNET
S
.
A.
I
a
a
SS
e
r
v
i
c
e~o
k
e
a
no
s(
ht
t
p:
/
/
o
k
e
a
no
s
.
g
r
ne
t
.
g
r
)
,a
ndi
spa
r
to
f
i
t
sTe
r
msOfUs
ei
sa
sf
o
l
l
o
ws
:
"
I
no
r
de
rf
o
rGRNETS
At
opr
o
v
i
dei
t
ss
e
r
v
i
c
e
swi
t
ho
uta
nyi
mpe
di
me
nt
s
,
GRNETS
.
A.c
a
nc
o
l
l
e
c
tg
e
ne
r
a
l
s
t
a
t
i
s
t
i
c
a
l
da
t
ar
e
g
a
r
di
ngt
heflo
wa
nd
o
pt
i
mi
z
a
t
i
o
n/d
e
v
e
l
o
pme
nto
ft
hene
t
wo
r
ka
ndc
o
mput
e
rr
e
s
o
ur
c
e
so
ft
he
i
nf
r
a
s
t
r
uc
t
ur
e
.
GRNETS
.
A.
do
e
sno
tha
v
edi
r
e
c
ta
c
c
e
s
s
,
ha
snoi
nt
e
r
e
s
ti
n
a
ndwi
l
l
no
tc
o
l
l
e
c
ta
nys
pe
c
i
ficda
t
awi
t
hr
e
g
a
r
dt
os
pe
c
i
fics
e
r
v
i
c
e
s
whi
c
ha
r
eho
s
t
e
di
nv
i
r
t
ua
l
ma
c
hi
ne
so
rb
yt
hefina
l
u
s
e
r
so
ft
heho
s
t
e
d
s
e
r
v
i
c
e
s
.Thei
nf
o
r
ma
t
i
o
nwhi
c
hwi
l
l
e
v
e
nt
ua
l
l
yb
ec
o
l
l
e
c
t
e
dt
hr
o
ug
ht
he
s
e
r
v
i
c
e
sb
yGRNETS
.
A.
wi
l
l
b
eus
e
da
c
c
o
r
di
ngt
ot
hei
ns
t
i
t
ut
i
o
na
l
f
r
a
me
wo
r
ki
nf
o
r
c
ei
nGr
e
e
c
ea
ndi
nt
heEur
o
pe
a
nUni
o
n.
Thi
sda
t
ac
a
nb
eus
e
di
no
r
de
rt
omo
ni
t
o
rt
hef
unc
t
i
o
no
ft
hes
e
r
v
i
c
e
s
,
t
oi
mp
r
o
v
et
heq
ua
l
i
t
yo
fi
t
sf
unc
t
i
o
n,o
rf
o
rr
e
s
e
a
r
c
hpur
po
s
e
s
,a
nd
c
a
nb
epub
l
i
s
he
do
rdi
s
t
r
i
but
e
dt
ot
hi
r
dpa
r
t
i
e
sa
f
t
e
rapr
i
o
r
a
ppr
o
pr
i
a
t
ee
l
a
b
o
r
a
t
i
o
ns
ot
ha
tpe
r
s
o
na
l
da
t
ao
ft
hema
na
g
e
r
sa
nd/o
r
o
ft
hefina
l
us
e
r
sa
r
eno
tdi
s
c
l
o
s
e
d
.GRNETS
.
A.
c
a
ndi
s
c
l
o
s
ei
nf
o
r
ma
t
i
o
n
r
e
g
a
r
di
ngt
heus
eo
fv
i
r
t
ua
l
ma
c
hi
ne
swhe
ni
ti
sde
ma
nde
db
yt
hel
a
wa
nd
t
hec
o
mp
e
t
e
nts
e
r
v
i
c
e
s
.
"
#D eZe
use
v
ot
i
ngs
y
s
t
e
m
I
nt
hePANORAMI
Xpr
o
j
e
c
tGRNETwi
l
l
wo
r
ko
ni
t
sZe
use
v
o
t
i
ngs
y
s
t
e
m
(
ht
t
p:
/
/
z
e
us
.
g
r
ne
t
.
g
r
)
.TheZe
uss
y
s
t
e
mi
sus
e
db
ybo
t
he
l
e
c
t
i
o
n
c
o
mmi
t
t
e
e
s
,
whoa
dmi
ni
s
t
e
re
l
e
c
t
i
o
ns
,a
ndv
o
t
e
r
s
,
whoc
a
s
tt
he
i
r
v
o
t
e
s
.
Theus
e
r
sa
r
ec
ur
r
e
nt
l
yno
ta
s
k
e
dt
oa
c
c
e
p
tapr
i
v
a
c
ypo
l
i
c
y
.
Fr
o
m aus
e
r
e
x
p
e
r
i
e
nc
epo
i
nto
fv
i
e
wt
hi
si
sac
o
mpl
i
c
a
t
e
di
s
s
ue
,
a
s
v
o
t
e
r
si
nt
e
r
a
c
twi
t
has
y
s
t
e
mo
nl
yi
nt
hec
o
nt
e
x
to
fa
ne
l
e
c
t
i
o
n.
As
k
i
ngv
o
t
e
r
st
oa
c
c
e
ptado
c
ume
nti
no
r
de
rt
ov
o
t
ee
nt
a
i
l
st
he
po
s
s
i
b
i
l
i
t
yo
fv
o
t
e
r
sno
tv
o
t
i
ngb
yno
ta
c
c
e
pt
i
ng
.
Att
hes
a
met
i
me
,
no
ti
nf
o
r
mi
ngv
o
t
e
r
sa
ta
l
l
a
bo
utt
e
r
mso
fus
ei
sf
a
rf
r
o
mi
de
a
l
;
GRNETS
.
A.wi
l
l
wo
r
ko
nt
ha
ti
nt
hec
o
ur
s
eo
ft
hep
r
o
j
e
c
t
.
##Ze
usI
nf
or
ma
t
i
onCol
l
e
c
t
i
ng
Vo
t
e
r
sa
r
el
i
s
t
e
dwi
t
ht
he
i
rc
o
nt
a
c
tde
t
a
i
l
ss
ot
ha
tZe
usc
a
ns
e
ndt
he
m
a
ni
nv
i
t
a
t
i
o
nt
oc
a
s
tt
he
i
rb
a
l
l
o
t
.The
s
ede
t
a
i
l
s
,e
ma
i
l
a
nd/
o
rpho
ne
numb
e
r
sa
r
ep
r
o
v
i
de
db
ye
l
e
c
t
i
o
na
ut
ho
r
i
t
i
e
sa
ndZe
uss
t
o
r
e
st
he
m
i
nde
fine
t
e
l
ya
spa
r
to
ft
hee
l
e
c
t
i
o
na
ut
ho
r
i
t
i
e
sa
c
c
o
untwi
t
ht
he
s
y
s
t
e
m,
b
utdo
e
sno
tus
ei
ti
na
nyo
t
he
rwa
y
.
Ze
usl
o
g
se
v
e
r
ya
c
t
i
o
no
fa
ut
he
nt
i
c
a
t
e
dv
o
t
e
r
s
,
t
r
us
t
e
e
s
,a
nde
l
e
c
t
i
o
n
a
dmi
ni
s
t
r
a
t
o
r
sf
o
ra
udi
tpur
po
s
e
s
.Thi
si
nf
o
r
ma
t
i
o
ni
sus
e
dwhe
n
e
l
e
c
t
i
o
na
ut
ho
r
i
t
i
e
so
r
de
ra
udi
t
so
ri
nv
e
s
t
i
g
a
t
i
o
nsa
sar
e
s
po
ns
et
o
i
nc
i
de
nt
so
rc
l
a
i
msa
ndc
ha
l
l
e
ng
e
sf
r
o
mv
o
t
e
r
sa
ndc
a
ndi
da
t
e
s
.
Byt
hede
s
i
g
no
ft
hec
r
y
pt
o
g
r
a
phi
cpr
o
c
e
s
sa
ndt
hee
l
e
c
t
i
o
npr
o
t
o
c
o
l
,
Ze
us
a
c
t
sa
sa
na
ut
o
ma
t
i
ct
r
us
t
e
ef
o
ra
l
l
e
l
e
c
t
i
o
nst
huspr
e
v
e
nt
i
nga
ny
ma
ni
pul
a
t
i
o
nf
r
o
me
l
e
c
t
i
o
na
ut
ho
r
i
t
i
e
s
.
##Cooki
e
s
Ze
usus
e
sc
o
o
k
i
e
so
nl
yf
o
re
s
t
a
bl
i
s
hi
ngat
e
mpo
r
a
r
ys
e
s
s
i
o
nwi
t
ht
he
us
e
ra
nddo
e
sno
ta
s
kt
os
t
o
r
ec
o
o
k
i
e
sf
o
rl
o
ngt
e
r
m.
D1.4 - ETHICS REPORT
A.2
SAP Terms and Conditions
– 36 of 57 –
SAP Global Data Protection and Privacy Policy
Version 2.0
December 2015
Public
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
I
Contents
1.
INTRODUCTION .......................................................................................................................3
2.
DEFINITIONS............................................................................................................................1
3.
BASIC PRINCIPLES OF PROTECTING PERSONAL DATA .....................................................3
4.
RESPONSIBILITIES FOR DATA PROTECTION AND PRIVACY ..............................................3
A.
MANAGEMENT ........................................................................................................................3
B.
GLOBAL HUMAN RESOURCES ..............................................................................................3
C.
EMPLOYEES ............................................................................................................................4
5.
DETAILS ...................................................................................................................................4
A.
NOTIFICATION, ACCURACY OF DATA, AND INSPECTION ...................................................4
B.
DURATION OF STORAGE, DATA DELETION .........................................................................4
C.
ADDITIONAL RULES FOR SPECIAL TYPES OF PERSONAL DATA ......................................4
D.
TRANSFER OF PERSONAL DATA/COMMISSIONED DATA PROCESSING ...........................5
6.
TRANSFER OF CUSTOMER DATA..........................................................................................6
7.
DATA PROTECTION AND PRIVACY SUPERVISORY AUTHORITIES .....................................6
8.
DATA PROTECTION AND PRIVACY AND DATA SECURITY ..................................................6
9.
DATA PROTECTION AND PRIVACY ORGANIZATION ............................................................6
A.
POSITION OF THE DATA PROTECTION OFFICER AND GLOBAL ORGANIZATION .............6
B.
ORGANIZATION AT LOCAL, REGIONAL, AND LINE-OF-BUSINESS LEVEL .........................7
10.
DATA PROTECTION AND PRIVACY STANDARDS .................................................................7
11.
RAISING AWARENESS ............................................................................................................7
ANNEX 1
TASKS OF THE GLOBAL SAP DATA PROTECTION AND PRIVACY ORGANIZATION
ANNEX 2
TASKS OF THE LOCAL, REGIONAL, AND LINE-OF-BUSINESS-SPECIFIC DATA
PROTECTION AND PRIVACY ORGANIZATION
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
II
This page is intentionally empty in the PUBLIC version of the Policy.
Additionally the annexes with internal content are not provided.
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
1
1. Introduction
SAP is bound by data protection and privacy laws. SAP respects and protects the rights of individuals, in particular
the right to data protection and privacy during the processing and use of information as well as the right to privacy.
The protection of information comprises the personal data of employees, applicants, customers, suppliers, partners,
and all other persons within SAP's area of responsibility. To adhere to this obligation, SAP has adopted an SAP
Global Data Protection and Privacy Policy (“Policy”), and reviews it regularly.
The Policy outlines a group-wide minimum standard for handling personal data in compliance with data protection
and privacy laws. It defines requirements for all operational processes that affect personal data, as well as clear
responsibilities and organizational structures. As soon as a process at SAP involves collecting, processing, or using
personal data, the provisions of this Policy are to be adhered to. Management of the individual SAP group companies
and the relevant process owners are responsible for ensuring that all processes during which personal data is
collected, processed, or used, are designed such that the provisions of this Policy are fulfilled. It is the duty of all SAP
employees to comply with the provisions of this Policy when handling personal data in their daily work for SAP.
SAP is a global company with headquarters in Germany, a member state of the European Union (EU). Therefore,
the basic principles established through this Policy are based on the requirements of European data protection and
privacy legislation. If, on a case-by-case basis, applicable local law outlines stricter data protection and privacy
requirements than this Policy, personal data must be handled in compliance with those stricter laws. Additional
standards and/or guidelines within the SAP Group that are issued as a result of this Policy must also take the
applicable law into account in this respect. Questions on applicable law can be directed to the Data Protection and
Privacy Office (“DPPO”) (mail:[email protected]) and/or the appointed Data Protection and Privacy Coordinators
(“DPPC”).
Data protection and privacy rights of employees must be guaranteed in accordance with the law of the country in
which the employment contract with the respective SAP Group company was concluded, notwithstanding the local
law of the country in which the employee data is actually processed or used. The legal responsibility for collecting,
processing, and/or using the personal data of SAP employees always lies with the respective employer. It is the
employer's duty to inform other SAP Group companies (for example, if the manager is an employee of a different
SAP company), if within the scope of processing and using personal data for their employees, different provisions
apply for the protection of personal data from those defined in this Policy.
This Policy shall not restrict SAP's right to use employee personal data to the fullest extent legally possible in order
to preserve its position during any legal action or official proceedings. However, the applicable data protection and
privacy law must be observed by SAP generally.
2. Definitions
Anonymized data
Anonymous data
Anonymized data is data in a form that makes the direct or indirect identification of an
individual person impossible, even with the aid of other data or information. Anonymous
data does not have any reference to a person when it is collected. Anonymous and
anonymized data is no longer subject to the internal or external data protection and
privacy regulations.
Commissioned data
processor
A natural or legal person, authority, institution, or any other office that processes
personal data on behalf of the data controller, for example, an external company or an
SAP company that is not the data controller itself.
Special categories of
personal data
Contain data on the racial or ethnic origin, political views, religious or philosophical
beliefs, union membership, felonies, penal convictions, health, or sexual preferences of
persons, as well as data that can be misused for identity theft, for example, social
security numbers, credit card and bank account numbers, as well as passport or driver's
license numbers.
Person affected
An identified or identifiable natural person whose personal data is affected by a data
processing action. A person is deemed identifiable if he or she can be identified directly
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
2
or indirectly, in particular by reference to an identity number or to one or more factors
specific to that person's physical, physiological, psychological, economic, cultural, or
social identity.
Data processing actions
(collecting, processing,
and/or using)
Third-party
Collecting means procuring data on the person affected. Processing describes any
operation performed with or without the aid of an automatic procedure, or any set of
operations connected with personal data, for example, collecting, saving, modifying,
storing, changing, transferring, locking, or deleting personal data. Using means any
usage of personal data except for processing.
A natural or legal person, authority, institution, or any other office, except for the
following:
·
·
·
·
The person affected
The office responsible
The commissioned data processor
The persons who, under the direct responsibility of the data controller or the
commissioned data processor, are authorized to process the data
For the purposes of this Policy as well as applicable data protection and privacy laws,
different companies within the SAP Group are classified as third-parties in relation to
each other.
Consent
This may be explicit or implicit. Explicit consent generally requires an action by the
person affected, through which they allow the processing of data, for example, the
declaration of consent with the sending of e-mails, or entering of personal data (opt-in).
Explicit consent granted without duress is deemed to be the legal basis for the
processing of personal data, provided no other legal provision is in force. Implicit
consent (for example, via opt-out) allows processing provided the person affected does
not object.
Deletion
Either the physical destruction of data or the anonymization of data in such a way that
makes it impossible to relate the data to a natural person.
Personal data
All information on an identified or identifiable natural person (person affected). A person
is deemed identifiable if he or she can be directly or indirectly identified, in particular by
reference to an identity number or to one or more factors specific to that person's
physical, physiological, psychological, economic, cultural, or social identity.
For example, persons can be identified directly on the basis of names, telephone
numbers, e-mail addresses, postal addresses, user IDs, tax numbers, or social security
numbers, or indirectly on the basis of a combination of any information. Personal data
that is subject to this Policy includes data on employees, applicants, former employees,
customers, interested parties, suppliers, partners, users of SAP websites and services,
and any other persons. The data may be contained in an SAP system, or in systems of
third parties, who operate these on behalf of SAP. Customer systems that SAP or third
parties on behalf of SAP operate are also relevant, as are systems operated by
customers themselves if SAP employees can access the personal data stored in these
systems while providing services, support, or consulting services.
SAP
SAP SE and its global offices and subsidiaries (and 'affiliates’ as defined by the German
Stock Corporation Act (AktG), article 15 ff).
Data controller
(controller)
A natural or legal person, authority, institution, or any other office that, either alone or
in collaboration with others, makes decisions on the purposes and means of processing
personal data (general legal definition). In the case of SAP, an SAP company is always
the controller for the personal data of its employees, customers, suppliers, partners, or
other persons. SAP employees, internal units, or organizations cannot be controllers.
The controller is represented by the management legally responsible, for example, by
the members of the SAP SE Executive Board, or the directors of other SAP companies.
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
3
3. Basic Principles of Protecting Personal Data
During every process that includes collecting, processing, or using personal data, personal data may be processed
or used only in accordance with this Policy and to the extent permitted by law.
Processing is only allowed in the following cases:
·
If a person affected freely gave their consent, for example, when registering on a website
·
If required to fulfill contracts with the person affected, for example, for an employment contract or a service
contract
·
If legally required or permitted, for example, due to tax or social security laws.
Personal data may be collected and processed for lawful purposes only. The respective purpose must be defined
before the time at which the data is collected. Processing for a purpose other than the one defined before the data
was collected is permitted in exceptional circumstances only if the person affected consents to the processing or if
stipulated by law.
Personal data is to be collected directly from the person affected. Otherwise, the person affected must be at least
informed of which types of personal data will be collected, processed, and/or used, and for which specific purposes.
Data may only ever be collected to the extent absolutely necessary for fulfilling the purpose specified before it is
processed or used; any other processing is not permitted.
Personal data must be accurate at all times and corrected where necessary.
Personal data may be retained only for as long as is absolutely necessary for the purposes specified or other legal
requirements. Thereafter, personal data must be deleted or anonymized (for more information, see section 5b).
4.
Responsibilities for Data Protection and Privacy
a.
Management
The legal responsibility for collecting, processing, and using personal data within SAP lies with the executives of the
SAP company that collects, processes, or uses the personal data for their business purposes.
Within SAP, responsibility can be delegated along the organizational structure of SAP by means of documented
instructions from management, guidelines, and business processes that involve the explicit transfer of responsibility
to managers at different levels as well as employees.
Management is responsible for structuring all processes during which personal data is collected, processed, or used
in such a way that the requirements of this Policy are fulfilled.
The following tasks are the responsibility of management in every SAP company:
b.
·
Continuous monitoring of the applicable law
·
Ensuring that processes during which personal data is collected, processed, and/or used are in line with
applicable law, and that local and global process owners are informed of necessary changes
·
Ensuring that all approvals required by the supervisory authorities for collecting, processing, using, and
transferring personal data have been granted, and that the necessary notifications have been sent to the
supervisory authorities
Global Human Resources
Before commencing an activity during which access to personal data cannot be excluded, every employee and every
third party acting on behalf of SAP are to be instructed that they are not permitted to collect, process, or use personal
data without authorization (data protection) and that this data must be handled confidentially (confidentiality).
Employees are to be made aware of the consequences of violating data protection and confidentiality. This Policy
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
4
and other internal company guidelines that govern the handling of personal data are to be brought to employees'
attention. The instruction must be documented in writing or in another form. Furthermore, every employee can access
additional information on the Data Protection and Privacy Office portal page.
SAP Global Human Resources is responsible for providing the instruction.
c.
Employees
It is the duty of all SAP employees to treat personal data to which they have access in the course of fulfilling their
contractual duties with SAP as confidential.
SAP employees may collect, process, and/or use personal data only to the extent required to fulfill their duties, and
in accordance with approved processes. If collecting, processing, or using personal data is not recognizably
prohibited for the employee, he or she can refer to the legality of the management's instructions. In case of doubt,
employees may contact the DPPO for clarification (mail: [email protected]).
5.
Details
a.
Notification, Accuracy of Data, and Inspection
A person affected must be informed in a suitable manner that their personal data is being collected, processed,
and/or used. Usually, they are to be informed before the time at which data is collected.
The person affected must be informed of the SAP company collecting the data, the purpose for collecting, processing,
or using the data, as well as other recipients to whom their data will be transferred. The information must be provided
in a way that is easy to understand.
Stored personal data must be accurate. Inaccurate data must be corrected or deleted as soon as practicably possible.
All processes for collecting, processing, and/or using personal data must contain an option for correcting, updating,
and, where required by applicable law, deleting or blocking.
A person affected may, at any time, request information about the data stored on them, its origin, purpose for storing,
and recipients to whom the data is passed on. Queries or complaints submitted by a person affected must be
processed by the SAP company responsible without undue delay or according to those timeframes imposed by local
law, whichever is the earlier. Objections from a person affected with regard to the processing of personal data must
be investigated and, if necessary, remedial action must be taken.
b.
Duration of Storage, Data Deletion
For every process in which personal data is collected, processed, or used, a schedule must be defined for the regular
deletion of personal data after the specified purpose has been fulfilled or if the legal basis no longer applies.
Instead of deleting the personal data, it may also be irreversibly anonymized, meaning retained in such a way that
makes it no longer possible to identify individual persons. If, for technical or legal reasons (for example, if the retention
of data is legally required for tax purposes), it is not possible to either delete or anonymize personal data, this personal
data must be blocked for any further processing and/or use, as well as for further access.
c.
Additional Rules for Special Types of Personal Data
Special types of personal data are details on racial and ethnic origin, political views, religious or philosophical
beliefs, union membership, health, or sexual preferences. Special types of personal data are equal to such personal
data that requires special sensitivity for the persons affected (sensitive data). For example, this is the case for data
on criminal activities, as well as on those individuals who in their respective country fall below the age legally deemed
as adult i.e. minors.
In the instances in which SAP, or third parties acting on behalf of SAP, collect special types of personal data,
management must ensure that the persons affected have been informed in advance and have given their consent
for this. Provided that applicable law does not determine otherwise, special types of personal data may be collected,
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
5
stored, processed, and transferred only with the explicit consent of the persons affected. Increased precautions (for
example, physical safety features, encryption, and access restrictions) that are appropriate for the special sensitivity
are to be taken for collecting, storing, processing, and transferring this data.
The following additional rules apply for these special categories of data:
· The collection, processing, and/or use of this data must be transparent for the persons affected at all times.
· Consent given by persons affected must refer explicitly to these special categories of data.
· Processes that involve collecting or using special types of personal data may be configured only with a
prior check performed by the DPPO, or in consultation with the local DPPC.
d.
Transfer of personal data/Commissioned Data Processing
If personal data is to be exchanged within the SAP Group or with other companies, it must first be checked whether
contractual agreements on data protection and privacy and data security are required. Such a check is always
required if an SAP Group company is to process data on behalf of another SAP Group company, or if an external
service provider is to process data on behalf of an SAP company (“transfer for processing purposes”). A check is
also necessary if an SAP Group company transfers data to another SAP Group company or an external company
(for example, a service provider, partner, or customer), and the receiving company wishes to use the data for its own
business purposes (“transfer for own purposes”). The legally compliant transfer of personal data within the SAP
Group is ensured based on internal company commissioned data processing agreements (intra-group data transfer
agreements or an ‘IGA’).
If personal data under SAP’s legal responsibility is transferred to an SAP company located in the European Union or
in Switzerland, Liechtenstein, Iceland, or Norway, or in a country not mentioned, it must also be ensured in advance
that a suitable level of protection in accordance with Articles 25 and 26 of the EU Data Protection Directive (95/46/EC)
is guaranteed.
If personal data is transferred, the following rules apply:
Transfer for commissioned processing:
The SAP company that commissions or instructs another SAP company or an external company to collect, process,
or store personal data is responsible for compliance with the requirements of data protection and privacy regulations.
This responsibility does not cease with the transfer to the other SAP or external company.
Every SAP company must ensure that external companies who are to collect, process, or store personal data on
their behalf, are reviewed in advance and then regularly to ensure that they comply with the requirements of data
protection and privacy regulations, and that the necessary contracts with these companies have been concluded.
The review can be delegated to central units within the SAP Group. A regular review also takes place within the
companies of the SAP Group.
Transfer for recipient's own purposes:
The transfer of personal data to another company within the SAP Group or an external company for their own
purposes is allowed only if this is permitted or required by law, or if the persons affected have given their prior consent.
The transferring SAP company must ensure that the legal requirements are checked before the data is transferred.
Transfer to state agencies (authorities and courts):
SAP will transfer personal data to governmental agencies only on the basis of applicable law and after the DPPO
and Global Legal have performed a prior check, and taking into account other required areas within the SAP Group.
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
6
In the event of a request for information from a governmental authority or a court of competent jurisdiction, SAP will
inform the person affected of this without undue delay.
6. Transfer of Customer Data
SAP processes customer personal data. This means not only the personal data of a customer’s employees/business
partners etc. but also the personal data belonging to SAP’s customer’s own customers. The transfer and use of such
customer data must be performed in full compliance with applicable law and those additional obligations agreed in
the contract between us. Personal data of customers may never be passed on to third parties without an appropriate
legal or contractual basis.
In this respect, SAP works with its customers to support them in complying with the applicable data protection and
privacy legislation; however, this does not include providing our customers with any legal advice or giving them any
guarantee that their legal compliance with data protection and privacy laws are guaranteed.
7. Data Protection and Privacy Supervisory Authorities
If so required by law, contract and/or the obligations set down in this Policy, SAP companies must always cooperate
with any data protection and privacy supervisory authority irrespective of whether such authoritative entity is based
within the EEA or outside the EEA.
If a data protection and privacy supervisory authority requests information or otherwise exercises their right of
investigation, the DPPO must be informed without delay (mail: [email protected]). The DPPO shall then act as
primary coordinator to formulate an appropriate response to the query in consultation with the other responsible
departments (for example, Global Legal, Legal Compliance & Integrity, IT Security, Global GRC), and acts as a direct
contact person with the respective data protection and privacy supervisory authorities.
8.
Data Protection and Privacy and Data Security
Certain data protection and privacy laws require special security measures to be implemented when collecting,
processing, and/or using personal data. SAP shall define such measures in compliance with the legal requirements
in the SAP Security Policy and the related Security Standards and Guidelines. The DPPO shall assist in defining and
updating these standards and guidelines.
9.
Data Protection and Privacy Organization
a.
Position of the Data Protection Officer and Global Organization
The DPPO is an appointed organizational unit within SAP SE. It reports directly to the responsible board member
and is managed by the SAP SE Data Protection Officer.
The DPPO determines the SAP Group's data protection and privacy strategy in accordance with the strategic
objectives of the SAP Group and ensures that the SAP Group companies adhere to the applicable provisions of the
data protection and privacy regulations. The DPPO is to be supported in performing its tasks. In particular, the DPPO
is to be provided with the resources required to perform its tasks and is to be provided with any requested information
fully and without undue delay.
The Data Protection Officer is free to exercise his/her tasks as they see fit. The DPPO employees are only bound by
the instructions of the Data Protection Officer. The Data Protection Officer and the DPPO employees must not be
discriminated against for performing their tasks.
The DPPO maintains a network of data protection and privacy coordinators, who, in accordance with section 9b of
this Policy, are to be appointed by the respective SAP companies and central organizations. The tasks of the global
organization are defined in Annex 1. The DPPCs are to be supported by their respective SAP companies in
performing their tasks and must not be discriminated against for performing their tasks.
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
SAP Global Data Protection and Privacy Policy Version 2.0 PUBLIC
b.
7
Organization at Local, Regional, and Line-of-Business Level
This obligation is broken down into 2 key subsections, as follows:
(1) It is the duty of every SAP company to appoint a DPPC for their business unit, and to inform the DPPO the name
of the the personnel appointed. More than one SAP company can also appoint the same DPPC jointly.
All DPPCs must have a direct functional reporting line to the head of the relevant SAP unit to which they have been
appointed. They must ensure compliance with relevant data protection and privacy laws and the provisions of this
Policy. They shall regularly align their activities with the DPPO, but are otherwise free to exercise their expertise in
the area of data protection and privacy as they see fit, and must not be discriminated against for performing their
tasks.
The appointment as DPPC can only be revoked in agreement with the SAP SE Data Protection Officer. If a DPPC's
appointment comes to an end or is otherwise terminated, the respective SAP company must appoint a new DPPC in
good time and inform the DPPO.
The respective business units to which the DPPCs are appointed shall provide the DPPCs with reasonable time to
work required by the DPPC to administer its DPPC duties and suitable resources shall be allocated to the DPPC in
order for them to perform its tasks. To ensure that the DPPC retains and benefits from learning resources to ensure
the necessary expertise to fulfil their duties, they shall be permitted to participate in further education and professional
development funded by SAP upon mutual agreement with their managers.
A DPPC shall undertake those tasks outlined at Annex 2. In the event of any query regarding the nature and scope
of such tasks, the DPPC (or manager responsible for the DPPC) may contact the DPPO for further clarification.
(2) Organizations and/or business units of an SAP company who do not in their daily tasks administer personal data
are also, at the request of the DPPO, obliged to appoint a DPPC responsible for the respective organization.
Accordingly, the provisions of section 9b (1) apply to the DPPCs.
10.
Data Protection and Privacy Standards
The requirements under this Policy can be specified and enhanced through data protection and privacy standards.
Such data protection and privacy standards may only come into effect after the DPPO has reviewed and approved
their compatibility with this Policy.
11.
Raising Awareness
The DPPO and DPPCs shall take measures to raise awareness at regular intervals. All employees and third parties
acting on behalf of SAP are regularly informed about both their duties and their rights within the scope of this Policy
and applicable laws.
This attached Policy is provided to you as an information only. It shall have no binding effect on SAP or SAP’s course of business
and SAP reserves the right to change the Policy at any time without giving notice.
D1.4 - ETHICS REPORT
A.3
Greenhost Terms and Conditions
– 47 of 57 –
Gr
e
e
nhos
tUs
a
g
eTe
r
msa
ndCondi
t
i
ons
Te
r
msa
ndCondi
t
i
ons
The
s
eg
e
ne
r
a
l
t
e
r
msa
ndc
o
ndi
t
i
o
nsa
ppl
yt
oa
l
l
o
,e
r
sa
nda
g
r
e
e
me
nt
sb
e
t
we
e
nGr
e
e
nho
s
tB.
V.Ams
t
e
r
da
m,
Cha
mb
e
ro
fCo
mme
r
c
e62
576
59
3(
“
Gr
e
e
nho
s
t
”
)a
ndi
t
sc
o
unt
e
rpa
r
t
i
e
s(
“
Cus
t
o
me
r
”
)
.
Te
r
mso
rc
o
ndi
t
i
o
nss
e
t
b
yc
us
t
o
me
rt
ha
tde
v
i
a
t
ef
r
o
mo
rdono
ta
ppe
a
ri
nt
he
s
eg
e
ne
r
a
l
t
e
r
msa
ndc
o
ndi
t
i
o
nsa
r
eo
nl
yb
i
ndi
ngf
o
r
Gr
e
e
nho
s
ti
fi
tha
sb
e
e
na
g
r
e
e
dupo
ne
x
pl
i
c
i
t
l
yi
nwr
i
t
i
ng
.
Ar
t
i
c
l
e1.
O8e
ra
nda
c
c
e
pt
a
nc
e
1.
1
.Cus
t
o
me
rc
a
nma
k
eas
e
l
e
c
t
i
o
nv
i
at
heGr
e
e
nho
s
ts
i
t
ef
r
o
mt
hev
a
r
i
o
uspa
c
k
a
g
e
so
fs
e
r
v
i
c
e
s
,
s
uc
ha
swe
b
ho
s
t
i
ng
,me
di
a
t
i
o
nf
o
rr
e
g
i
s
t
r
a
t
i
o
no
fdo
ma
i
nna
me
s
,pr
o
v
i
s
i
o
no
fS
S
Lc
e
r
t
i
fic
a
t
e
s
,i
ns
t
a
l
l
a
t
i
o
no
fs
o
f
t
wa
r
ef
o
r
v
i
r
t
ua
l
s
e
r
v
e
r
s(
t
he“
S
e
r
v
i
c
e
s
”
)t
ha
tGr
e
e
nho
s
ti
swi
l
l
i
ngt
ode
l
i
v
e
r
.Ex
c
l
us
i
v
e
l
yo
nt
hewe
b
s
i
t
ede
s
c
r
i
be
dpa
c
k
a
g
e
de
s
c
r
i
pt
i
o
no
ft
heS
e
r
v
i
c
e
si
sb
i
ndi
ng
.
1.
2
.I
fCus
t
o
me
rma
k
e
sas
e
l
e
c
t
i
o
no
fde
s
i
r
e
ds
e
r
v
i
c
e
sv
i
aa
no
t
he
rc
ha
nne
l
(
s
uc
ha
st
e
l
e
pho
ne
,
l
e
t
t
e
ro
ri
npe
r
s
o
n),
Gr
e
e
nho
s
twi
l
l
ma
k
eaq
uo
t
a
t
i
o
no
ft
hes
e
r
v
i
c
e
sr
e
q
ui
r
e
d,
t
hepr
i
c
e
sa
ndho
wt
he
s
es
e
r
v
i
c
e
sa
r
ede
l
i
v
e
r
e
d.
1.
3
.Thes
ub
mi
t
t
e
ds
e
l
e
c
t
i
o
nf
r
o
m pa
r
a
g
r
a
ph1o
rt
hea
c
c
e
pt
a
nc
eo
ft
heq
uo
t
a
t
i
o
nf
r
o
m pa
r
a
g
r
a
ph2l
e
a
dst
oa
n
a
g
r
e
e
me
ntb
e
t
we
e
nGr
e
e
nho
s
ta
ndCl
i
e
nta
tt
het
i
meo
fi
t
sr
e
c
e
i
ptb
yGr
e
e
nho
s
t
.Gr
e
e
nho
s
twi
l
l
Cu
s
t
o
me
ra
c
o
nfir
ma
t
i
o
ne
ma
i
l
r
e
c
e
i
v
e
d.
Cus
t
o
me
rc
a
nunt
i
l
t
het
i
meo
fr
e
c
e
i
pto
ft
hi
se
ma
i
l
c
a
nc
e
l
t
hea
g
r
e
e
me
nt
.
1.
4
.I
fCus
t
o
me
ri
sana
t
ur
a
l
pe
r
s
o
nno
ta
c
t
i
ngi
nt
hee
x
e
r
c
i
s
eo
fpr
o
f
e
s
s
i
o
no
rbus
i
ne
s
s
,
Cus
t
o
me
rma
y
,wi
t
hi
n
s
e
v
e
nda
y
sa
f
t
e
rc
o
mpl
e
t
i
o
no
ft
hea
g
r
e
e
me
ntt
e
r
mi
na
t
et
hi
sb
yno
t
i
f
y
i
ngGr
e
e
nho
s
t
.Thi
sr
i
g
htl
a
ps
e
sa
ss
o
o
na
sa
Cus
t
o
me
rS
e
r
v
i
c
et
i
meo
rGr
e
e
nho
s
tpe
r
mi
s
s
i
o
nt
odowo
r
ko
nb
e
ha
l
fo
faS
e
r
v
i
c
e
.Thel
a
wdo
e
sno
te
x
i
s
ti
n
me
di
a
t
i
ngr
e
g
i
s
t
r
a
t
i
o
no
fdo
ma
i
nna
me
s
,
a
si
ta
l
wa
y
si
spe
r
f
o
r
me
di
mme
di
a
t
e
l
ya
f
t
e
ra
ppl
i
c
a
t
i
o
na
ndwi
t
ht
he
c
o
ns
e
nto
fCus
t
o
me
r
.
1.
5
.Al
l
c
ha
ng
e
si
nt
hei
mpl
e
me
nt
a
t
i
o
no
faS
e
r
v
i
c
ea
tCus
t
o
me
r
’
sr
e
q
ue
s
ta
r
ec
o
ns
i
de
r
e
da
ddi
t
i
o
na
l
wo
r
kwhe
ni
t
a
dde
dc
o
s
tc
o
ns
i
de
r
e
da
ddi
t
i
o
na
l
wo
r
ka
nda
sar
e
s
ul
tl
e
s
swo
r
kwhe
nt
he
r
ei
sl
e
s
sc
o
s
t
.
Thes
a
mea
ppl
i
e
swhe
na
c
ha
ng
ei
nc
i
r
c
ums
t
a
nc
e
s
,
adi
,e
r
e
nti
mpl
e
me
nt
a
t
i
o
ni
sr
e
q
ui
r
e
d
.Gr
e
e
nho
s
tma
ya
dj
us
tt
hepr
i
c
e
sa
c
c
o
r
di
ng
l
y
uni
l
a
t
e
r
a
l
l
y
,b
uto
nl
ya
f
t
e
rc
o
ns
ul
t
a
t
i
o
nwi
t
hCu
s
t
o
me
r
.
Ar
t
i
c
l
e2.
I
mpl
e
me
nt
a
t
i
onoft
heS
e
r
v
i
c
e
s
2.
1
.Af
t
e
rt
hec
o
nc
l
us
i
o
no
ft
hea
g
r
e
e
me
nta
ss
o
o
na
spo
s
s
i
bl
eGr
e
e
nho
s
twi
l
l
p
r
o
v
i
det
heS
e
r
v
i
c
e
si
na
c
c
o
r
da
nc
e
wi
t
ht
hea
g
r
e
e
me
nt
,
t
a
k
i
ngi
nt
oa
c
c
o
untr
e
a
s
o
na
bl
ef
ur
t
he
rwi
s
he
so
fCus
t
o
me
r
.
Gr
e
e
nho
s
tg
ua
r
a
nt
e
e
st
ha
tt
he
S
e
r
v
i
c
e
st
ot
heb
e
s
tc
a
nbepe
r
f
o
r
me
dus
i
ngduec
a
r
ea
ndwo
r
k
ma
ns
hi
p
.Thef
o
l
l
o
wi
nga
ppl
i
e
st
ode
l
i
v
e
r
yt
i
me
s
a
r
ei
ndi
c
a
t
i
v
eunl
e
s
so
t
he
r
wi
s
ei
ndi
c
a
t
e
d.
2.
3
.I
fa
ndi
ns
o
f
a
ra
st
hep
r
o
pe
ri
mpl
e
me
nt
a
t
i
o
no
ft
heS
e
r
v
i
c
e
sr
e
q
ui
r
e
s
,Gr
e
e
nho
s
tha
st
her
i
g
htt
oc
o
mmi
s
s
i
o
n
c
e
r
t
a
i
na
c
t
i
v
i
t
i
e
sb
yt
hi
r
dpa
r
t
i
e
s
.
The
s
et
hi
r
dpa
r
t
i
e
so
pe
r
a
t
eunde
rt
her
e
s
po
ns
i
bi
l
i
t
ya
nds
upe
r
v
i
s
i
o
no
f
Gr
e
e
nho
s
t
.
2.
4
.Cus
t
o
me
rwi
l
l
a
l
r
e
a
dydoa
l
l
t
ha
ti
sr
e
a
s
o
na
bl
yne
c
e
s
s
a
r
ya
ndd
e
s
i
r
a
bl
et
oa
l
l
o
wat
i
me
l
ya
ndpr
o
pe
re
x
e
c
ut
i
o
n
o
ft
hea
g
r
e
e
me
nt
.
I
npa
r
t
i
c
ul
a
rc
o
nt
r
i
b
ut
e
sCus
t
o
me
re
ns
ur
et
ha
ta
l
l
bus
i
ne
s
sa
ndda
t
awhi
c
hGr
e
e
nho
s
ti
ndi
c
a
t
e
s
a
r
ene
c
e
s
s
a
r
yo
rwhi
c
ht
heCl
i
e
ntr
e
a
s
o
na
b
l
yunde
r
s
t
a
ndt
obene
c
e
s
s
a
r
yt
opr
o
v
i
det
heS
e
r
v
i
c
e
swi
l
l
b
epr
o
v
i
de
d
t
oGr
e
e
nho
s
t
.
2.
5
.Gr
e
e
nho
s
tha
st
her
i
g
htt
op
r
o
v
i
det
heS
e
r
v
i
c
e
st
os
us
pe
ndo
rr
e
s
t
r
i
c
ts
uppl
yi
fi
tt
u
r
nso
utt
ha
tt
heCus
t
o
me
r
i
nr
e
s
pe
c
to
ft
hec
o
nt
r
a
c
ta
no
bl
i
g
a
t
i
o
nt
oGr
e
e
nho
s
tno
tc
o
mea
f
t
e
ro
ra
c
t
si
nv
i
o
l
a
t
i
o
no
ft
he
s
et
e
r
mso
rt
hel
a
w.
2.
6
.Cus
t
o
me
rs
ha
l
l
a
te
nt
e
r
i
ngi
nt
ot
hea
g
r
e
e
me
ntawo
r
k
i
nge
ma
i
l
a
ddr
e
s
st
og
i
v
eup
.Gr
e
e
nho
s
tma
ys
e
nda
l
l
c
o
mmuni
c
a
t
i
o
nsc
o
nc
e
r
ni
ngt
hea
g
r
e
e
me
ntt
ot
hi
se
ma
i
l
a
ddr
e
s
s
.Thi
se
ma
i
l
a
ddr
e
s
ss
ho
ul
dwo
r
kt
hr
o
ug
ho
utt
he
c
o
nt
r
a
c
t
.I
ft
hec
ha
ng
ee
ma
i
l
a
ddr
e
s
s
,
Cus
t
o
me
rmu
s
tno
t
i
f
yt
hec
ha
ng
ef
r
o
mt
hi
se
ma
i
l
a
ddr
e
s
s
.Re
q
ue
s
t
sf
o
r
i
nf
o
r
ma
t
i
o
no
ra
c
c
e
s
st
oc
us
t
o
me
rda
t
as
ho
ul
da
l
s
ob
edo
nef
r
o
mt
hi
se
ma
i
l
a
ddr
e
s
s
.
2.
7
.Gr
e
e
nho
s
tf
o
c
us
e
so
ne
ne
r
g
ys
a
v
i
ng
,“
g
r
e
e
n
”ho
s
t
i
nga
ndo
t
he
rs
e
r
v
i
c
e
s
.Asus
e
dGr
e
e
nho
s
to
nl
yr
e
ne
wa
b
l
e
e
ne
r
g
ys
o
ur
c
e
s
.Gr
e
e
nho
s
ts
t
r
i
v
et
oi
mpr
o
v
ei
nt
hi
sa
r
e
awi
t
hi
t
ss
e
r
v
i
c
e
.
TheI
S
O 26
000s
t
a
nda
r
df
o
rs
o
c
i
a
l
r
e
s
po
ns
i
bi
l
i
t
yo
fo
r
g
a
ni
z
a
t
i
o
nsi
sl
e
a
di
ngi
nt
hi
s
.
Ar
t
i
c
l
e3.
S
uppor
tbyGr
e
e
nhos
t
3.
1
.Gr
e
e
nho
s
twi
l
l
r
e
ma
i
na
v
a
i
l
a
b
l
ef
o
rar
e
a
s
o
na
bl
el
e
v
e
l
o
fr
e
mo
t
es
uppo
r
tb
ypho
neo
re
ma
i
l
.Thet
i
me
so
f
a
v
a
i
l
a
bi
l
i
t
ya
nda
nyr
e
s
po
ns
et
i
me
swi
l
l
bepub
l
i
s
he
do
rwi
l
l
bec
o
mmuni
c
a
t
e
dma
nne
rt
obea
g
r
e
e
do
nt
he
we
b
s
i
t
eo
fGr
e
e
nho
s
t
.
3.
2
.Gr
e
e
nho
s
twi
l
l
t
hene
c
e
s
s
a
r
ys
o
f
t
wa
r
e(
l
i
k
eVPSe
nv
i
r
o
nme
nt
s
,
Apa
c
he
,
My
S
QL,
e
t
c
.
)i
ns
t
a
l
l
a
nd/o
r
c
o
nfig
ur
eo
ns
y
s
t
e
msma
na
g
e
db
yGr
e
e
nho
s
t
.
3.
3
.Addi
t
i
o
na
l
s
o
f
t
wa
r
emus
tbei
ns
t
a
l
l
e
db
yt
heCu
s
t
o
me
rhi
ms
e
l
f
.Cus
t
o
me
rwi
l
l
e
ns
ur
et
ha
tt
hi
ss
o
f
t
wa
r
eupt
o
da
t
e
,
pa
r
t
i
c
ul
a
r
l
ywi
t
hr
e
g
a
r
dt
os
e
c
ur
i
t
y
.Onr
e
q
ue
s
tGr
e
e
nho
s
tc
a
nb
eo
fhe
l
p
,whi
c
hGr
e
e
nho
s
te
nt
i
t
l
e
dt
o
c
ha
r
g
ei
t
sus
ua
l
ho
ur
l
yr
a
t
e
.
I
fGr
e
e
nho
s
tfindst
ha
tCus
t
o
me
rdo
e
sno
tpr
o
pe
r
l
yupda
t
et
hes
e
c
ur
i
t
ys
o
f
t
wa
r
e
Gr
e
e
nho
s
tc
a
ni
nt
e
r
v
e
nei
na
c
c
o
r
da
nc
ewi
t
hAr
t
i
c
l
e5.
3.
4
.I
fne
c
e
s
s
a
r
yf
o
rt
heus
eo
fs
o
f
t
wa
r
el
i
c
e
ns
e
sf
r
o
mt
hi
r
dpa
r
t
i
e
s
,Cu
s
t
o
me
rwi
l
l
de
c
r
e
a
s
et
he
s
el
i
c
e
ns
e
sa
nd
e
ns
ur
et
ha
ti
t
spr
o
v
i
s
i
o
nsa
r
es
t
r
i
c
t
l
yc
o
mpl
i
e
dwi
t
h.Onr
e
q
ue
s
tGr
e
e
nho
s
tma
yde
c
r
e
a
s
ec
e
r
t
a
i
nl
i
c
e
ns
e
sa
nd
t
r
a
ns
f
e
rt
ot
heCus
t
o
me
r
,a
g
a
i
ns
tmut
ua
l
l
ya
g
r
e
e
df
e
e
.
Cus
t
o
me
ri
nde
mni
fie
sGr
e
e
nho
s
tc
l
a
i
msb
yt
hi
r
dpa
r
t
i
e
s
r
e
l
a
t
i
ngt
oi
ns
t
a
l
l
a
t
i
o
na
ndl
i
c
e
ns
i
ngo
fs
o
f
t
wa
r
e
,
e
x
c
e
pti
ns
o
f
a
ra
st
hec
l
a
i
msa
r
et
her
e
s
ul
to
fi
nf
o
r
ma
t
i
o
no
r
l
i
c
e
ns
e
sa
r
ede
l
i
v
e
r
e
db
yGr
e
e
nho
s
t
.
3.
5
.
Whe
nCus
t
o
me
rb
e
l
i
e
v
e
st
ha
ts
o
f
t
wa
r
edo
e
sno
two
r
ko
rno
ta
de
q
ua
t
e(
e
g
.
Al
o
wpe
r
f
o
r
ma
nc
e
)Gr
e
e
nho
s
ti
s
r
e
a
dyt
oe
x
a
mi
net
hi
sf
ur
t
he
ra
ndpr
o
po
s
eapl
a
nf
o
ri
mp
r
o
v
e
me
nt
.
Toc
o
nduc
to
ft
hes
t
udya
ndt
hei
mpr
o
v
e
me
nt
c
ha
r
g
e
sa
r
ea
ppl
i
c
a
bl
e
,unl
e
s
si
ta
ppe
a
r
st
ha
tt
hec
a
us
eo
ff
a
i
l
ur
eo
rno
two
r
k
i
ngpr
o
pe
r
l
yduet
oGr
e
e
nho
s
ti
t
s
e
l
f
.
Ar
t
i
c
l
e4.
Av
a
i
l
a
bi
l
i
t
yofs
y
s
t
e
ms
4.
1
.I
faS
e
r
v
i
c
e(
pa
r
t
l
y
)s
uppl
i
e
dt
hr
o
ug
hs
y
s
t
e
msa
nd/o
rne
t
wo
r
k
sma
na
g
e
db
yGr
e
e
nho
s
t
,s
uc
ha
swe
bho
s
t
i
ng
,
e
ma
i
l
t
r
a
ns
mi
s
s
i
o
n/r
e
c
e
pt
i
o
no
ra
c
c
e
s
st
oo
nl
i
nes
o
f
t
wa
r
eo
rma
na
g
e
me
ntt
o
o
l
s
,
Gr
e
e
nho
s
twi
l
l
e
nde
a
v
o
ri
nt
hi
s
S
e
r
v
i
c
et
ouni
nt
e
r
r
upt
e
da
v
a
i
l
a
bi
l
i
t
yo
ft
he
s
es
y
s
t
e
msa
ndt
oc
r
e
a
t
ene
t
wo
r
k
sa
ndt
or
e
a
l
i
z
ea
c
c
e
s
st
oda
t
as
t
o
r
e
db
y
Gr
e
e
nho
s
t
.
4.
2
.Gr
e
e
nho
s
tdo
e
sno
tg
ua
r
a
nt
e
et
hec
o
nt
i
nuo
usa
v
a
i
l
a
bi
l
i
t
y
,
unl
e
s
so
t
he
r
wi
s
ea
g
r
e
e
db
yme
a
nso
fas
o
c
a
l
l
e
d
S
e
r
v
i
c
eLe
v
e
l
Ag
r
e
e
me
nt
.
4.
3
.Gr
e
e
nho
s
twi
l
l
e
nde
a
v
o
rt
ok
e
e
pt
hes
y
s
t
e
msi
tus
e
sa
nds
o
f
t
wa
r
eupt
oda
t
e
.
Gr
e
e
nho
s
the
r
ei
sho
we
v
e
r
de
pe
nde
nto
ni
t
ss
uppl
i
e
r(
s
)
.
Gr
e
e
nho
s
ti
se
nt
i
t
l
e
dt
oi
ns
t
a
l
l
a
nupda
t
eo
rpo
s
t
po
nepa
t
c
hunt
i
l
t
he
yc
a
nt
e
s
ti
t
ha
sbe
e
na
de
q
ua
t
e
l
ya
nde
v
a
l
ua
t
e
.
4.
4
.I
fa
c
c
e
s
st
oa
na
dmi
ni
s
t
r
a
t
i
v
ea
c
c
o
unta
nd/o
rama
na
g
e
me
nta
g
r
e
e
ds
ot
oc
o
meCu
s
t
o
me
rma
ybea
g
r
e
e
d
a
s
pe
c
t
so
fma
na
g
i
ngt
heS
e
r
v
i
c
e
,
Gr
e
e
nho
s
twi
l
l
pr
o
v
i
det
heCus
t
o
me
rwi
t
ha
na
dmi
ni
s
t
r
a
t
i
v
eus
e
r
na
mea
nd
pa
s
s
wo
r
d.
Ev
e
r
ya
c
t
i
o
nt
ha
to
c
c
ur
sv
i
at
hea
dmi
ni
s
t
r
a
t
i
v
ea
c
c
o
unto
ra
na
c
c
o
unto
fa
ni
ndi
v
i
dua
l
us
e
ro
ft
he
Cus
t
o
me
ri
sc
o
ns
i
de
r
e
dt
ob
eunde
rt
her
e
s
po
ns
i
b
i
l
i
t
ya
ndr
i
s
ko
ft
heCus
t
o
me
r
.
I
nc
a
s
e
so
fs
us
pe
c
t
e
da
bus
eo
fa
n
a
c
c
o
untCus
t
o
me
rmus
tr
e
po
r
tt
hi
sa
ss
o
o
na
spo
s
s
i
b
l
es
ot
ha
tGr
e
e
nho
s
tc
a
nt
a
k
et
he
s
eme
a
s
ur
e
s
.
4.
5
.Gr
e
e
nho
s
twi
l
l
ma
k
er
e
g
ul
a
rba
c
k
upso
fCus
t
o
me
r
’
ss
y
s
t
e
mso
fGr
e
e
nho
s
ts
t
o
r
e
dda
t
af
o
rc
o
nt
i
nui
t
y
pur
po
s
e
s
.The
s
eba
c
k
upsa
r
eno
tma
d
ea
v
a
i
l
a
b
l
et
oCus
t
o
me
ro
nl
yb
yGr
e
e
nho
s
tus
e
df
o
rda
t
ar
e
c
o
v
e
r
yt
o
c
o
nt
i
nui
t
ypr
o
b
l
e
ms
.
Thepr
o
v
i
s
i
o
no
ft
heb
a
c
k
upso
ri
ndi
v
i
dua
l
fil
e
sf
r
o
mi
ti
spo
s
s
i
bl
eo
nl
yi
ns
p
e
c
i
a
l
c
a
s
e
sa
nd
upo
npa
y
me
nto
ft
het
he
nc
ur
r
e
nts
t
a
nda
r
dr
a
t
e
.
4.
6
.I
ft
heb
a
c
k
ups
e
r
v
i
c
ea
sa
g
r
e
e
dGr
e
e
nho
s
twi
l
l
p
r
o
v
i
d
et
hec
r
e
a
t
e
db
a
c
k
upt
oCus
t
o
me
rf
o
runme
di
a
t
e
d
a
c
c
e
s
s
.
4.
7
.Cus
t
o
me
r
’
so
bl
i
g
a
t
i
o
nt
ome
e
tt
hea
g
r
e
e
dl
i
mi
t
sf
o
rda
t
at
r
a
ns
f
e
r
,s
t
o
r
a
g
ea
nd/o
rpr
o
c
e
s
s
i
ngc
a
pa
c
i
t
y
.
Ex
c
e
e
di
ngi
sGr
e
e
nho
s
ta
ut
ho
r
i
z
e
df
ur
t
he
ru
s
et
or
e
s
t
r
i
c
to
rbl
o
c
kt
heS
e
r
v
i
c
e
,
o
rt
ob
r
i
nga
na
ddi
t
i
o
na
l
a
mo
unt
i
na
c
c
o
r
da
nc
ewi
t
ht
het
he
na
ppl
i
c
a
bl
ea
mo
unt
sf
o
ra
ddi
t
i
o
na
l
pr
o
c
e
s
s
o
rc
a
pa
c
i
t
y
,da
t
at
r
a
ns
f
e
ro
rs
t
o
r
a
g
e
.
Gr
e
e
nho
s
twi
l
l
wa
r
nt
hec
us
t
o
me
ri
nt
i
meb
e
f
o
r
eb
r
i
ng
i
nga
ddi
t
i
o
na
l
us
e
dc
a
pi
c
i
t
e
i
tc
ha
r
g
e
d.
Ar
t
i
c
l
e5.
Rul
e
sofc
onduc
tonc
ont
e
nt
5.
1
.Cus
t
o
me
rma
yno
ts
t
o
r
eo
rdi
s
t
r
i
but
ei
nf
o
r
ma
t
i
o
ni
nv
i
o
l
a
t
i
o
no
ft
hel
a
wo
rt
het
e
r
msa
ndc
o
ndi
t
i
o
ns
.
5.
2
.I
npa
r
t
i
c
ul
a
r
,
Cus
t
o
me
rma
yno
ts
t
o
r
eo
rdi
s
t
r
i
but
ei
nf
o
r
ma
t
i
o
nt
ha
t
o
,e
ns
ei
nv
o
l
v
e
sf
o
r
mso
fpo
r
no
g
r
a
phyo
rl
i
be
l
o
us
,de
f
a
ma
t
o
r
y
,r
a
c
i
s
t
,
di
s
c
r
i
mi
na
t
o
r
y
,ha
t
e
f
ul
,
i
nf
r
i
ng
e
st
her
i
g
ht
so
ft
hi
r
dpa
r
t
i
e
s
,i
na
nyc
a
s
e
,butno
tl
i
mi
t
e
dt
oc
o
py
r
i
g
ht
s
,t
r
a
de
ma
r
kr
i
g
ht
sa
ndpo
r
t
r
a
i
t
r
i
g
ht
s
,
c
o
nt
a
i
nsuns
o
l
i
c
i
t
e
dc
o
mme
r
c
i
a
l
,
c
ha
r
i
t
a
bl
eo
rp
hi
l
a
nt
hr
o
pi
cc
o
mmuni
c
a
t
i
o
n.
5.
3
.I
ti
sp
r
o
hi
bi
t
e
dt
os
t
o
r
eo
rt
r
a
ns
mi
tda
t
ao
rpr
o
c
e
s
s
e
so
rs
o
f
t
wa
r
e
,
whe
t
he
rt
hr
o
ug
ht
hes
y
s
t
e
mso
fGr
e
e
nho
s
t
bo
o
twhi
c
hCus
t
o
me
rk
no
wso
rc
a
nr
e
a
s
o
na
bl
ys
u
s
pe
c
tt
ha
tt
hi
sGr
e
e
nho
s
t
,o
t
he
rus
e
r
so
ft
heS
e
r
v
i
c
e
so
rI
nt
e
r
ne
t
us
e
r
so
rda
ma
g
ec
a
ni
nfli
c
t
.
5.
4
.Gr
e
e
nho
s
tc
a
nl
o
g
sa
ndma
i
nt
a
i
nr
e
c
o
r
dso
ft
heus
eo
ft
heS
e
r
v
i
c
e
si
no
r
de
rt
ome
a
s
ur
et
hep
e
r
f
o
r
ma
nc
eo
fi
t
s
s
y
s
t
e
msa
ndt
oi
de
nt
i
f
yv
i
o
l
a
t
i
o
nso
ft
hi
sa
r
t
i
c
l
e
.
Gr
e
e
nho
s
twi
l
l
ho
we
v
e
rno
tk
e
e
pl
o
g
so
ni
ndi
v
i
dua
l
o
ut
bo
und
e
ma
i
l
t
r
a
Ecwi
t
ho
uts
pe
c
i
a
l
pe
r
mi
s
s
i
o
nf
r
o
mt
heCu
s
t
o
me
r
.
5.
5
.I
fi
nt
heo
pi
ni
o
no
fGr
e
e
nho
s
tha
sb
e
e
nav
i
o
l
a
t
i
o
no
ft
hi
sa
r
t
i
c
l
e
,Gr
e
e
nho
s
ti
se
nt
i
t
l
e
dt
ot
a
k
ea
l
l
me
a
s
ur
e
si
t
de
e
msr
e
a
s
o
na
b
l
yne
c
e
s
s
a
r
yt
ot
e
r
mi
na
t
eo
rr
e
duc
et
hei
mpa
c
t
.
The
s
eme
a
s
ur
e
sa
r
ee
l
a
bo
r
a
t
e
di
nt
he“
no
t
i
c
ea
nd
t
a
k
e
do
wn
”po
l
i
c
ya
ss
t
a
t
e
do
nt
heGr
e
e
nho
s
twe
bs
i
t
e
.
Thi
swi
l
l
i
nc
l
udet
hel
o
c
kma
yo
rdi
s
a
b
l
i
nga
c
c
e
s
st
o
i
nf
o
r
ma
t
i
o
no
rdi
s
a
bl
i
ngs
o
f
t
wa
r
e
.Gr
e
e
nho
s
twi
l
l
no
t
i
f
yCus
t
o
me
ro
fa
nya
c
t
i
o
nunde
rt
hi
sAr
t
i
c
l
e
.I
fGr
e
e
nho
s
t
c
o
s
t
smu
s
tma
k
et
oe
ndav
i
o
l
a
t
i
o
no
rt
omi
ni
mi
z
et
hei
mpa
c
t
,i
twi
l
l
ber
e
c
o
v
e
r
e
df
r
o
mt
heCl
i
e
nt
.
5.
6
.
Whe
ns
uEc
i
e
nt
l
ypl
a
us
i
b
l
et
ha
tt
he
r
ei
sawr
o
ng
f
ul
a
c
ta
g
a
i
ns
tat
hi
r
dpa
r
t
ya
ndt
ha
tt
hi
r
dpa
r
t
yha
sar
e
a
l
i
nt
e
r
e
s
ti
nt
hei
s
s
u
eo
fp
e
r
s
o
na
l
da
t
ao
fCus
t
o
me
ro
ra
nyus
e
ro
faS
e
r
v
i
c
e
,Gr
e
e
nho
s
ti
sa
l
s
oe
nt
i
t
l
e
dt
ot
hi
sda
t
a
t
oma
k
et
he
s
et
hi
r
da
v
a
i
l
a
bl
e
.
Gr
e
e
nho
s
ti
nt
hi
ss
i
t
ua
t
i
o
nwi
l
l
c
r
e
a
t
eaba
l
a
nc
eo
fi
nt
e
r
e
s
t
sa
ndi
ff
e
a
s
i
b
l
eCus
t
o
me
r
pr
i
o
rno
t
i
c
eo
fi
t
si
nt
e
nt
i
o
n.S
t
a
t
et
hepr
o
c
e
dur
et
ob
ewo
r
k
e
do
uti
nt
heNo
t
i
c
e
Ta
k
e
do
wnP
o
l
i
c
yGr
e
e
nho
s
ta
nd
t
r
a
ns
pa
r
e
ntf
o
re
a
c
hc
us
t
o
me
r
.
Ar
t
i
c
l
e6.
Ex
pe
r
i
me
nt
a
lS
of
t
wa
r
e
6.
1
.Gr
e
e
nho
s
tma
yma
k
ea
v
a
i
l
a
bl
ec
e
r
t
a
i
ns
o
f
t
wa
r
ea
sa
ne
x
p
e
r
i
me
nta
sas
e
r
v
i
c
e
.
TheCus
t
o
me
ri
sf
r
e
ehe
r
eo
r
no
tt
ou
s
e
.
6.
2
.I
fCus
t
o
me
rc
ho
o
s
e
st
ous
et
hi
ss
o
f
t
wa
r
e
,
Cus
t
o
me
runde
r
s
t
a
ndsa
nda
g
r
e
e
st
ha
t
,t
ha
tt
hes
o
f
t
wa
r
ei
s
e
x
pe
r
i
me
nt
a
l
a
ndwi
t
ho
uta
nywa
r
r
a
nt
yo
rc
l
a
i
mt
of
unc
t
i
o
npr
o
pe
r
l
yo
rb
ea
v
a
i
l
a
b
l
ei
so
,e
r
e
d.
6.
3
.Gr
e
e
nho
s
tma
ya
ta
nyt
i
mea
ndwi
t
ho
utf
ur
t
he
rmo
di
fic
a
t
i
o
nt
oe
x
t
e
ndt
hee
x
pe
r
i
me
nt
a
l
s
o
f
t
wa
r
e
,
mo
di
f
yo
r
di
s
c
o
nt
i
nuet
hes
up
pl
yt
he
r
e
o
f
.F
o
rt
hi
s
,
nol
i
a
b
i
l
i
t
yi
sa
c
c
e
pt
e
dr
e
g
a
r
dl
e
s
so
fho
wl
o
ngt
hes
o
f
t
wa
r
ei
sa
v
a
i
l
a
b
l
e
a
ndi
fCus
t
o
me
rha
sa
nno
unc
e
dt
ha
thewi
l
l
c
o
nt
i
nuet
ous
et
hee
x
pe
r
i
me
nt
a
l
s
o
f
t
wa
r
e
.
6.
4
.Onr
e
q
ue
s
t
,e
x
pe
r
i
me
nt
a
l
s
o
f
t
wa
r
ei
nc
l
ude
da
spa
r
to
faS
e
r
v
i
c
e
.I
nt
ha
tc
a
s
enol
o
ng
e
ra
ppl
i
e
st
hepr
o
v
i
s
i
o
ns
o
ft
hi
sAr
t
i
c
l
e
.
Gr
e
e
nho
s
twi
l
l
i
nt
ha
tc
a
s
ebe
f
o
r
eaq
uo
t
ef
o
rt
hec
o
s
to
ft
hi
si
s
s
ue
,whi
c
hCus
t
o
me
rmus
ta
ppr
o
v
e
t
ot
hee
x
p
e
r
i
me
nt
a
l
s
o
f
t
wa
r
epa
r
to
faS
e
r
v
i
c
e
.
Ar
t
i
c
l
e7.
Doma
i
nna
me
s
,
I
Pa
ddr
e
s
s
e
sa
ndSSLc
e
r
t
i
fic
a
t
e
s
7.
1
.Appl
i
c
a
t
i
o
n,a
l
l
o
c
a
t
i
o
na
ndpo
s
s
i
bl
eus
eo
fado
ma
i
nna
me
,
I
Pa
ddr
e
s
sa
nd/o
rS
S
Lc
e
r
t
i
fic
a
t
ede
p
e
ndo
na
nd
a
r
es
ubj
e
c
tt
ot
her
ul
e
sa
ndpr
o
c
e
dur
e
so
ft
her
e
g
i
s
t
e
r
i
nga
ut
ho
r
i
t
i
e
s
,s
uc
ha
st
heFo
unda
t
i
o
nf
o
rI
nt
e
r
ne
tDo
ma
i
n
Re
g
i
s
t
r
a
t
i
o
ni
nt
heNe
t
he
r
l
a
ndso
rt
hei
s
s
ui
ngc
e
r
t
i
fic
a
t
i
o
na
ut
ho
r
i
t
y
.Ther
e
l
e
v
a
nta
ut
ho
r
i
t
yd
e
c
i
de
so
nt
he
a
l
l
o
c
a
t
i
o
n.
Gr
e
e
nho
s
tpe
r
f
o
r
mst
hea
p
pl
i
c
a
t
i
o
no
nl
ya
ni
nt
e
r
me
di
a
r
yr
o
l
ea
nddo
e
sno
tg
ua
r
a
nt
e
et
ha
tar
e
q
ue
s
t
wi
l
l
beho
no
r
e
d.
7.
2
.Gr
e
e
nho
s
ti
se
nt
i
t
l
e
dt
oc
ha
r
g
ef
o
rt
heme
di
a
t
i
o
ns
e
r
v
i
c
ea
ndt
hes
e
r
v
i
c
eo
ft
hec
o
mmi
s
s
i
o
ni
ngo
ft
hedo
ma
i
n
na
me
,I
Pa
ddr
e
s
sa
ndS
S
Lc
e
r
t
i
fic
a
t
ea
dmi
ni
s
t
r
a
t
i
o
n.
The
s
ea
r
eno
t
i
fie
di
na
dv
a
nc
e
.
7.
3
.Onl
yt
hec
o
nfir
ma
t
i
o
no
fGr
e
e
nho
s
t
,s
t
a
t
i
ngt
ha
tado
ma
i
nna
me
,I
Pa
ddr
e
s
sa
nd/o
rS
S
Lc
e
r
t
i
fic
a
t
eha
s
be
e
ni
s
s
ue
d,o
ri
t
sc
o
mmi
s
s
i
o
ni
ngo
nb
e
ha
l
fo
faS
e
r
v
i
c
e
,i
spr
o
o
fo
fg
r
a
nt
.Abi
l
l
o
fGr
e
e
nho
s
ta
ppl
i
c
a
t
i
o
no
r
me
di
a
t
i
o
ni
sno
tac
o
nfir
ma
t
i
o
no
fr
e
g
i
s
t
r
a
t
i
o
n.
7.
4
.Gr
e
e
nho
s
twi
l
l
e
ns
ur
et
ha
tdo
ma
i
nna
me
sa
s
s
i
g
ne
db
yCus
t
o
me
rt
hr
o
ug
hGr
e
e
nho
s
t
,
I
Pa
ddr
e
s
s
e
sa
nd/o
r
S
S
Lc
e
r
t
i
fic
a
t
e
sf
o
rs
e
r
v
i
c
e
sus
a
bl
ea
nda
v
a
i
l
a
bl
ei
na
c
c
o
r
da
nc
ewi
t
hAr
t
i
c
l
e4
.Cus
t
o
me
ri
nd
e
mni
fie
sa
ndho
l
ds
Gr
e
e
nho
s
tha
r
ml
e
s
sf
o
ra
l
l
da
ma
g
e
sr
e
l
a
t
e
dt
o(
t
heus
eo
f
)do
ma
i
nna
me
,
I
Pa
ddr
e
s
sa
nd/o
rS
S
Lc
e
r
t
i
fic
a
t
eb
yo
r
o
nb
e
ha
l
fo
fCus
t
o
me
r
.
7.
5
.Gr
e
e
nho
s
ti
sno
tl
i
a
bl
ef
o
rt
hel
o
s
s
e
sc
a
us
e
db
yCu
s
t
o
me
ro
fhi
sr
i
g
ht(
s
)o
nado
ma
i
n,I
Pa
ddr
e
s
sa
nd/o
r
S
S
Lc
e
r
t
i
fic
a
t
e
,
o
rt
hef
a
c
tt
ha
tado
ma
i
nna
meo
rI
Pa
ddr
e
s
si
sa
c
q
ui
r
e
db
yat
hi
r
dpa
r
t
ya
nd/o
ro
bt
a
i
ne
d,
s
ub
j
e
c
ti
nc
a
s
eo
fi
nt
e
nto
rde
l
i
be
r
a
t
er
e
c
k
l
e
s
s
ne
s
so
fGr
e
e
nho
s
t
.
7.
6
.Unl
e
s
so
t
he
r
wi
s
ea
g
r
e
e
d,
o
nl
yde
pl
o
y
e
da
nI
Pa
ddr
e
s
sf
o
rt
hedur
a
t
i
o
no
ft
hea
g
r
e
e
me
nto
nb
e
ha
l
fo
f
Cus
t
o
me
r
.I
Pa
ddr
e
s
s
e
sc
a
nb
es
ha
r
e
dwi
t
ho
t
he
rc
l
i
e
nt
so
fGr
e
e
nho
s
t
,unl
e
s
st
hena
t
ur
eo
ft
hes
e
r
v
i
c
edo
e
sno
t
a
l
l
o
wo
rd
e
s
i
r
a
b
l
e
.Cus
t
o
me
rma
yno
tc
l
a
i
ma
nI
Pa
ddr
e
s
so
rt
a
k
eunl
e
s
se
x
pr
e
s
s
l
ya
g
r
e
e
di
nwr
i
t
i
ng
.
Fur
t
he
r
mo
r
e
Gr
e
e
nho
s
te
nt
i
t
l
e
dt
oc
ha
ng
eI
Pa
ddr
e
s
s
e
sa
sne
c
e
s
s
a
r
yf
o
rag
o
o
ds
u
ppl
yo
ft
heS
e
r
v
i
c
e(
s
)
.
Ar
t
i
c
l
e8.
I
nt
e
l
l
e
c
t
ua
lpr
ope
r
t
yr
i
g
ht
s
8.
1
.Al
l
i
nt
e
l
l
e
c
t
ua
l
pr
o
pe
r
t
yr
i
g
ht
sa
ta
l
l
i
nt
hec
o
nt
e
x
to
fas
e
r
v
i
c
ema
dea
v
a
i
l
a
bl
et
owo
r
k(
s
uc
ha
ss
o
f
t
wa
r
e
,
s
c
r
i
pt
s
,t
e
x
t
so
ri
ma
g
e
s
)a
r
ehe
l
de
x
c
l
us
i
v
e
l
yb
yGr
e
e
nho
s
to
ri
t
ss
u
ppl
i
e
r
s
.
Cus
t
o
me
ra
c
q
ui
r
e
so
nl
yt
heus
e
rr
i
g
ht
s
a
ndr
e
s
po
ns
i
b
i
l
i
t
i
e
sa
r
i
s
i
ngf
r
o
mt
hes
c
o
peo
ft
hea
g
r
e
e
me
nto
rg
r
a
nt
e
di
nwr
i
t
i
nga
ndt
heCus
t
o
me
rwi
l
l
wo
r
k
no
tr
e
pr
o
duc
eo
rpubl
i
s
h.
8.
2
.I
fa
nyi
nt
e
l
l
e
c
t
ua
l
pr
o
pe
r
t
yr
i
g
hti
st
r
a
ns
f
e
r
r
e
dt
oawo
r
ko
fGr
e
e
nho
s
tt
oCus
t
o
me
r
,Gr
e
e
nho
s
tr
e
t
a
i
nsa
n
unl
i
mi
t
e
da
ndpe
r
pe
t
ua
l
l
i
c
e
ns
et
ous
et
hewo
r
ka
ndi
t
sc
o
mpo
ne
nt
si
ni
t
sb
us
i
ne
s
so
pe
r
a
t
i
o
nsa
ndde
l
i
v
e
rt
o
o
t
he
r
s
.Thi
sdo
e
sno
ta
,e
c
tt
hedut
yo
fGr
e
e
nho
s
tt
oc
o
nfide
nt
i
a
l
c
us
t
o
me
ri
nf
o
r
ma
t
i
o
nc
o
nfide
nt
i
a
l
.
8.
3
.Al
l
r
i
g
ht
so
fus
eo
fwo
r
k
sma
dea
v
a
i
l
a
bl
ee
x
pi
r
eupo
nt
e
r
mi
na
t
i
o
no
rr
e
s
c
i
s
s
i
o
no
ft
hec
o
nt
r
a
c
t
.
Ar
t
i
c
l
e9.
Pr
i
c
e
sa
ndpa
y
me
nt
9.
1
.Cus
t
o
me
rs
ha
l
l
pa
ya
nnua
l
l
yi
na
dv
a
nc
et
hea
mo
unto
fGr
e
e
nho
s
t
.
Va
r
i
a
bl
ea
mo
unt
smus
tb
eme
tmo
nt
hl
y
i
na
r
r
e
a
r
sGr
e
e
nho
s
t
.Gr
e
e
nho
s
twi
l
l
s
e
ndabi
l
l
f
o
rt
hea
mo
unto
we
db
yt
heCus
t
o
me
rt
oCus
t
o
me
r
.
Gr
e
e
nho
s
t
s
e
ndse
l
e
c
t
r
o
ni
ci
nv
o
i
c
e
sunl
e
s
so
t
he
r
wi
s
ea
g
r
e
e
d
.
9.
2
.I
fCus
t
o
me
rb
e
l
i
e
v
e
st
ha
t(
pa
r
to
f
)a
ni
nv
o
i
c
ei
si
nc
o
r
r
e
c
t
,hemu
s
tr
e
po
r
tt
hi
swi
t
hi
nt
hepa
y
me
ntt
oHo
s
t
Gr
e
e
n.
Thepa
y
me
nto
ft
hedi
s
put
e
d(
butno
to
t
he
r
wi
s
e
)s
ha
l
l
b
es
u
s
pe
nd
e
dunt
i
l
Gr
e
e
nho
s
ti
nv
e
s
t
i
g
a
t
e
dt
he
r
e
po
r
t
.I
fGr
e
e
nho
s
ta
f
t
e
rs
t
udyc
o
nc
l
ude
st
ha
tt
hec
o
mpl
a
i
ntwa
sunj
u
s
t
i
fie
d,
Cus
t
o
me
rs
ha
l
l
wi
t
hi
ns
e
v
e
nda
y
s
t
opa
yt
hedi
s
put
e
dy
e
t
.
9.
3
.Thei
nv
o
i
c
eo
fGr
e
e
nho
s
ti
s1
4da
y
sa
f
t
e
rt
hei
nv
o
i
c
eda
t
e
.
I
nal
a
t
epa
y
me
nt
,Cu
s
t
o
me
r
,
i
na
ddi
t
i
o
nt
ot
he
a
mo
untduea
ndt
hei
nt
e
r
e
s
tduet
he
r
e
o
n,
he
l
dt
oaf
ul
l
c
o
mpe
ns
a
t
i
o
no
fb
o
t
hj
udi
c
i
a
l
a
nde
x
t
r
a
j
udi
c
i
a
l
c
o
l
l
e
c
t
i
o
n
c
o
s
t
s
,i
nc
l
udi
ngc
o
s
t
sf
o
rl
a
wy
e
r
s
,
ba
i
l
i
,sa
ndde
b
tc
o
l
l
e
c
t
i
o
na
g
e
nc
i
e
s
.
5.
5
.9
.
4
.
Gr
e
e
nho
s
ti
se
nt
i
t
l
e
dt
oa
dj
us
tt
her
a
t
e
sc
ha
r
g
e
do
nc
epe
rc
a
l
e
nda
ry
e
a
r
.
Gr
e
e
nho
s
twi
l
l
Cl
i
e
nto
ft
hi
sa
t
l
e
a
s
t2(
t
wo
)mo
nt
hsi
nf
o
r
mi
na
dv
a
nc
e
.
Cus
t
o
me
rwi
t
hapr
i
c
et
her
i
g
htt
ot
e
r
mi
na
t
et
hec
o
nt
r
a
c
ta
tt
het
i
mei
t
e
nt
e
r
si
nt
of
o
r
c
e
.
Ar
t
i
c
l
e10.
Confide
nt
i
a
l
i
t
y
10
.
1
.P
a
r
t
i
e
swi
l
l
i
nf
o
r
ma
t
i
o
nt
he
yb
e
f
o
r
e
,dur
i
ngo
ra
f
t
e
rt
hee
x
e
c
ut
i
o
no
ft
hea
g
r
e
e
me
ntpr
o
v
i
det
oe
a
c
ho
t
he
ra
s
c
o
nfide
nt
i
a
l
i
ft
hi
si
nf
o
r
ma
t
i
o
ni
sma
r
k
e
da
sc
o
nfide
nt
i
a
l
o
ri
ft
her
e
c
e
i
v
i
ngpa
r
t
yk
no
wso
rs
ho
ul
dr
e
a
s
o
na
b
l
y
s
us
pe
c
tt
ha
tt
hei
nf
o
r
ma
t
i
o
nwa
si
nt
e
nde
da
sc
o
nfide
nt
i
a
l
.Pa
r
t
i
e
sa
l
s
oi
mpo
s
et
hi
so
bl
i
g
a
t
i
o
no
nt
he
i
re
mpl
o
y
e
e
s
a
ndt
hi
r
dpa
r
t
i
e
se
ng
a
g
e
db
yt
he
mt
oi
mpl
e
me
ntt
hea
g
r
e
e
me
nt
.
10
.
2
.Gr
e
e
nho
s
twi
l
l
no
tt
a
k
ec
o
g
ni
z
a
nc
eo
fda
t
ar
e
c
o
r
de
db
yCus
t
o
me
ra
nd/o
rdi
s
t
r
i
but
e
dt
hr
o
ug
ht
hes
y
s
t
e
ms
ma
na
g
e
db
yGr
e
e
nho
s
t
,unl
e
s
st
heCu
s
t
o
me
r
’
sc
o
ns
e
nt
,a
c
c
e
s
sha
sbe
e
nne
c
e
s
s
a
r
yf
o
rt
hep
r
o
pe
rpe
r
f
o
r
ma
nc
eo
f
t
hec
o
nt
r
a
c
to
rGr
e
e
nho
s
ti
sr
e
q
ui
r
e
dt
odos
ounde
ras
t
a
t
ut
o
r
ypr
o
v
i
s
i
o
no
ra
ut
ho
r
i
z
e
do
r
de
rb
yt
hea
ut
ho
r
i
t
i
e
s
.
I
nt
ha
tc
a
s
eGr
e
e
nho
s
twi
l
l
e
nde
a
v
o
rc
o
g
ni
z
a
nc
eo
ft
heda
t
at
omi
ni
mi
z
e
,
t
ot
hee
x
t
e
ntwi
t
hi
ni
t
spo
we
ra
nd,
i
f
po
s
s
i
b
l
e
,i
nf
o
r
mt
hec
us
t
o
me
ro
ft
hi
sa
ppl
i
c
a
t
i
o
nupt
oda
t
e
.
10
.
3
.Gr
e
e
nho
s
tr
e
s
e
r
v
e
st
her
i
g
hta
ta
l
l
t
i
me
si
nc
r
e
a
s
e
db
yt
hei
mpl
e
me
nt
a
t
i
o
no
ft
hea
g
r
e
e
me
ntt
ous
e
k
no
wl
e
dg
ef
o
ro
t
he
rc
l
i
e
nt
s
,p
r
o
v
i
de
dt
ha
tnoi
nf
o
r
ma
t
i
o
no
ft
heCu
s
t
o
me
ri
nbr
e
a
c
ho
fo
bl
i
g
a
t
i
o
nso
f
c
o
nfide
nt
i
a
l
i
t
yi
sma
dea
v
a
i
l
a
bl
et
ot
hi
r
dpa
r
t
i
e
s
.
10
.
4
.Theo
b
l
i
g
a
t
i
o
nso
ft
hi
sa
r
t
i
c
l
ewhi
c
hr
e
ma
i
na
f
t
e
rt
het
e
r
mi
na
t
i
o
no
ft
heAg
r
e
e
me
ntf
o
ra
nyr
e
a
s
o
n,
a
nds
o
muc
hf
o
rs
ol
o
nga
st
hepr
o
v
i
di
ngpa
r
t
yc
a
nr
e
a
s
o
na
bl
yc
l
a
i
mt
ot
hec
o
nfide
nt
i
a
l
i
t
yo
ft
hei
nf
o
r
ma
t
i
o
n.
Ar
t
i
c
l
e11.
Li
a
bi
l
i
t
y
11
.
1
.Gr
e
e
nho
s
ti
so
nl
yl
i
a
b
l
et
oCus
t
o
me
ri
nt
hee
v
e
nto
fac
ul
pa
bl
eb
r
e
a
c
ho
ft
hea
g
r
e
e
me
nta
ndo
nl
yf
o
r
c
o
mpe
ns
a
t
o
r
yda
ma
g
e
s
,
i
ec
o
mpe
ns
a
t
i
o
nf
o
rt
hev
a
l
ueo
ft
heo
mi
t
t
e
dpe
r
f
o
r
ma
nc
e
.
11
.
2
.Anyl
i
a
bi
l
i
t
yo
fGr
e
e
nho
s
ti
se
x
c
l
ude
df
o
ra
nyo
t
he
rf
o
r
mo
fda
ma
g
e
,i
nc
l
udi
nga
mo
ngo
t
he
rt
hi
ng
s
,
a
ddi
t
i
o
na
l
c
o
mpe
ns
a
t
i
o
ni
na
nyf
o
r
m wha
t
s
o
e
v
e
r
,c
o
mpe
ns
a
t
i
o
nf
o
ri
ndi
r
e
c
to
rc
o
ns
e
q
ue
nt
i
a
l
da
ma
g
e
s
,
l
o
s
so
f
r
e
v
e
nue
so
rpr
o
fit
s
,da
ma
g
e
sf
o
rl
o
s
so
fda
t
aa
ndda
ma
g
ef
o
re
x
c
e
e
di
ngt
e
r
msduet
oc
ha
ng
e
dc
i
r
c
ums
t
a
nc
e
s
.
11
.
3
.Thema
x
i
mum a
mo
untt
ha
tc
a
nb
epa
i
di
nc
a
s
eo
fl
i
a
b
i
l
i
t
yunde
rpa
r
a
g
r
a
ph1whi
c
hi
sbi
l
l
e
df
o
rt
hes
i
x
mo
nt
hspr
e
c
e
di
ngt
hemo
nt
hi
nwhi
c
ht
heda
ma
g
eo
c
c
ur
r
e
d.
Thi
sma
x
i
mum a
mo
untwi
l
l
l
a
ps
ei
fa
ndi
ns
o
f
a
ra
s
t
heda
ma
g
ei
sc
a
us
e
db
yi
nt
e
nto
rg
r
o
s
sne
g
l
i
g
e
nc
eo
fGr
e
e
nho
s
t
.
11
.
4
.Thel
i
a
bi
l
i
t
yo
fGr
e
e
nho
s
tduet
oc
ul
pa
bl
eb
r
e
a
c
ho
fc
o
nt
r
a
c
ta
r
i
s
e
so
nl
yi
fCus
t
o
me
rGr
e
e
nho
s
t
i
mme
di
a
t
e
l
ya
ndp
r
o
pe
r
l
yb
ei
nde
f
a
ul
t
,
s
t
a
t
i
ngar
e
a
s
o
na
b
l
ep
e
r
i
o
dt
or
e
me
dyt
hede
fic
i
e
nc
y
,
a
ndGr
e
e
nho
s
ta
f
t
e
r
t
ha
tpe
r
i
o
da
t
t
r
i
but
a
bl
et
of
ul
fil
l
i
t
so
bl
i
g
a
t
i
o
nsde
fic
i
tc
o
nt
i
nue
st
os
ho
o
t
.
Theno
t
i
c
emus
tc
o
nt
a
i
nade
t
a
i
l
e
d
de
s
c
r
i
pt
i
o
no
ft
hef
a
i
l
ur
e
,
s
oGr
e
e
nho
s
ti
sa
bl
et
or
e
s
po
nda
de
q
ua
t
e
l
y
.
11
.
5
.I
nc
a
s
eo
ff
o
r
c
ema
j
e
ur
e
,i
ee
v
e
r
ye
v
e
ntwhi
c
hf
ul
fil
l
me
nto
ft
hea
g
r
e
e
me
ntc
a
nno
tr
e
a
s
o
na
bl
yb
ede
ma
nd
e
d
o
fGr
e
e
nho
s
t
,
t
hei
mpl
e
me
nt
a
t
i
o
no
ft
hea
g
r
e
e
me
ntwi
l
l
bes
us
pe
nde
do
rt
e
r
mi
na
t
et
hea
g
r
e
e
me
nti
ft
hef
o
r
c
e
ma
j
e
ur
es
i
t
ua
t
i
o
nha
sl
a
s
t
e
dl
o
ng
e
rt
ha
ns
i
x
t
yda
y
s
,
a
l
l
wi
t
ho
uta
nyl
i
a
bi
l
i
t
yf
o
rda
ma
g
e
s
.
Ar
t
i
c
l
e12.
Te
r
ma
ndTe
r
mi
na
t
i
on
12
.
1
.Thi
sa
g
r
e
e
me
nti
sv
a
l
i
df
o
rami
ni
mum p
e
r
i
o
do
fo
ney
e
a
r
,unl
e
s
so
t
he
r
wi
s
ea
g
r
e
e
di
nwr
i
t
i
ng
.
The
a
g
r
e
e
me
ntc
a
no
nl
yb
et
e
r
mi
na
t
e
dpr
e
ma
t
ur
e
l
ya
spr
o
v
i
de
di
nt
he
s
eTe
r
msa
ndCo
ndi
t
i
o
ns
,o
rb
ymut
ua
l
c
o
ns
e
nt
.
12
.
2
.Thea
g
r
e
e
me
nti
si
nt
hea
b
s
e
nc
eo
fawr
i
t
t
e
nno
t
i
c
ei
ng
o
o
dt
i
mef
o
rat
hi
r
t
yda
yno
t
i
c
epe
r
i
o
di
s
a
ut
o
ma
t
i
c
a
l
l
yr
e
ne
we
df
o
rape
r
i
o
do
fo
ney
e
a
r
.
12
.
3
.I
fCu
s
t
o
me
ri
sac
o
ns
ume
r
,i
nde
r
o
g
a
t
i
o
no
ft
hepr
e
v
i
o
uspa
r
a
g
r
a
ph,t
hec
o
nt
r
a
c
ta
f
t
e
rt
hemi
ni
mum t
e
r
m
i
nt
oac
o
nt
r
a
c
to
fi
nde
fini
t
edur
a
t
i
o
n.
Cus
t
o
me
rc
a
na
l
wa
y
sc
a
nc
e
l
t
hec
o
nt
r
a
c
twi
t
hano
t
i
c
epe
r
i
o
do
fo
ne
mo
nt
h.No
t
i
c
et
he
r
e
o
fc
a
nt
hr
o
ug
ht
hes
a
mec
ha
nne
l
t
hr
o
ug
hwhi
c
hCus
t
o
me
rha
sno
t
i
fie
dt
hea
c
c
e
p
t
a
nc
e
,
a
s
we
l
l
a
si
nwr
i
t
i
ngo
rv
i
at
hec
o
nt
r
o
l
pa
ne
l
o
ra
dmi
ni
s
t
r
a
t
i
v
ea
c
c
o
unt(
i
fa
ny
)
.
12
.
4
.Upo
nc
a
nc
e
l
l
a
t
i
o
nr
e
f
e
r
r
e
dt
oi
nt
hepr
e
v
i
o
uspa
r
a
g
r
a
phGr
e
e
nho
s
twi
l
l
r
e
f
unda
nypa
i
dbutb
e
c
o
meundul
y
b
yt
e
r
mi
na
t
i
o
na
mo
unt
sf
o
r
wa
r
d.
Ar
t
i
c
l
e13.
Ame
ndme
nt
st
oAg
r
e
e
me
nt
13
.
1
.Af
t
e
ra
c
c
e
pt
a
nc
e
,t
hec
o
nt
r
a
c
tma
yo
nl
yb
ea
me
nde
db
ymut
ua
l
c
o
ns
e
nt
.
13
.
2
.Gr
e
e
nho
s
ti
so
nc
epe
rc
a
l
e
nda
re
nt
i
t
l
e
dt
he
s
et
e
r
mst
ouni
l
a
t
e
r
a
l
l
ymo
di
f
yo
re
x
pa
nd.
The
ymus
tdos
oa
t
l
e
a
s
tt
hi
r
t
yda
y
sbe
f
o
r
et
hemo
di
fic
a
t
i
o
nso
re
x
t
e
ns
i
o
nse
,e
c
twi
l
l
b
et
og
i
v
eno
t
i
c
et
ot
heCus
t
o
me
r
.
13
.
3
.I
ft
heCus
t
o
me
rwi
t
hi
nt
hi
spe
r
i
o
do
bj
e
c
t
o
rGr
e
e
nho
s
twi
l
l
c
o
ns
i
de
rwhe
t
he
rt
heo
bj
e
c
t
i
o
na
bl
ec
ha
ng
e
so
r
e
x
pa
ns
i
o
nswi
s
ht
owi
t
hdr
a
wo
rno
t
.
I
twi
l
l
ma
k
ei
t
sde
c
i
s
i
o
nno
t
i
c
et
oCus
t
o
me
r
.I
fGr
e
e
nho
s
to
bj
e
c
t
i
o
na
b
l
e
mo
di
fic
a
t
i
o
nso
re
x
t
e
ns
i
o
nsno
tt
or
e
v
o
k
e
,
t
heCus
t
o
me
rha
st
her
i
g
htt
ot
e
r
mi
na
t
et
hea
g
r
e
e
me
nta
so
ft
heda
t
e
t
ha
tt
hi
si
mpa
c
twi
l
l
be
.
13
.
4
.Gr
e
e
nho
s
tma
yma
k
ec
ha
ng
e
sa
ta
nyt
i
mei
nt
he
s
ec
o
ndi
t
i
o
nsi
ft
he
ya
r
ene
c
e
s
s
a
r
ybe
c
a
us
eo
fr
e
v
i
s
e
d
l
e
g
i
s
l
a
t
i
o
n.Ag
a
i
ns
ts
uc
hc
ha
ng
e
s
,
Cus
t
o
me
rma
yno
to
bj
e
c
t
.
Ar
t
i
c
l
e14.
Fi
na
lPr
o
v
i
s
i
ons
14
.
1
.Thi
sa
g
r
e
e
me
nti
sg
o
v
e
r
ne
db
yDut
c
hl
a
w.I
ns
o
f
a
ra
st
hema
nda
t
o
r
yl
a
wdo
e
sno
to
t
he
r
wi
s
e
,
a
l
l
di
s
put
e
st
ha
t
ma
ya
r
i
s
ea
sar
e
s
ul
to
ft
hi
sa
g
r
e
e
me
ntwi
l
l
b
es
ub
mi
t
t
e
dt
ot
hec
o
mpe
t
e
ntDut
c
hc
o
ur
tf
o
rt
hedi
s
t
r
i
c
ti
nwhi
c
h
Gr
e
e
nho
s
ti
sl
o
c
a
t
e
d
.
14
.
2
.I
fa
nypr
o
v
i
s
i
o
ni
sf
o
undt
obev
o
i
dunde
rt
hi
sc
o
nt
r
a
c
t
,
t
hi
swi
l
l
no
ta
,e
c
tt
hev
a
l
i
di
t
yo
ft
hee
nt
i
r
e
a
g
r
e
e
me
nt
.Thepa
r
t
i
e
ss
ha
l
l
i
nt
ha
tc
a
s
e
,r
e
pl
a
c
e(
a
)ne
wpr
o
v
i
s
i
o
n(
s
)
,whi
c
ha
sf
a
ra
sl
e
g
a
l
l
ypo
s
s
i
bl
et
ot
hei
nt
e
nt
o
ft
heo
r
i
g
i
na
l
a
g
r
e
e
me
nta
ndt
he
s
et
e
r
msa
ndc
o
ndi
t
i
o
nswi
l
l
ber
e
fle
c
t
e
d.
14
.
3
.“
I
nwr
i
t
i
ng
”i
nt
he
s
ec
o
ndi
t
i
o
nsa
l
s
oe
ma
i
l
a
ndf
a
xc
o
mmuni
c
a
t
i
o
n,
pr
o
v
i
de
dt
hei
de
nt
i
t
yo
ft
hes
e
nde
ra
nd
t
hei
nt
e
g
r
i
t
yo
ft
hec
o
nt
e
nt
ss
uEc
i
e
nt
l
ye
s
t
a
bl
i
s
he
d.
Thepa
r
t
i
e
swi
l
l
e
nd
e
a
v
o
rt
oc
o
nfir
mr
e
c
e
i
pta
ndc
o
nt
e
nto
f
c
o
mmuni
c
a
t
i
o
nb
ye
ma
i
l
.
14
.
4
.Re
c
e
i
v
e
db
yGr
e
e
nho
s
to
rs
a
v
e
dv
e
r
s
i
o
no
fa
nyc
o
mmuni
c
a
t
i
o
ns
ha
l
l
b
ed
e
e
me
da
ut
he
nt
i
c
,s
ub
j
e
c
tt
opr
o
o
f
t
ot
hec
o
nt
r
a
r
yb
yt
heCl
i
e
nt
.
14
.
5
.Ea
c
hpa
r
t
yi
so
nl
ye
nt
i
t
l
e
dt
oa
s
s
i
g
ni
t
sr
i
g
ht
sa
ndo
b
l
i
g
a
t
i
o
nsund
e
rt
hec
o
nt
r
a
c
tt
oat
hi
r
dpa
r
t
ywi
t
ho
ut
t
hewr
i
t
t
e
nc
o
ns
e
nto
ft
heo
t
he
rpa
r
t
y
.Ho
we
v
e
r
:Gr
e
e
nho
s
ta
l
wa
y
sbee
nt
i
t
l
e
dt
oa
s
s
i
g
ni
t
sr
i
g
ht
sa
ndo
bl
i
g
a
t
i
o
ns
unde
rt
hec
o
nt
r
a
c
tt
oapa
r
e
nt
,s
ub
s
i
di
a
r
yo
ra
El
i
a
t
e
dc
o
mpa
ny
.
D1.4 - ETHICS REPORT
A.4
Mobile Vikings Terms and Conditions
– 54 of 57 –
Privacy conditions
The explanation of the information we collect from you.
Definities
In these Privacy Conditions following terms are used.
"VikingCo NV" indicates VikingCo NV;
"Services" indicate the services offered for sale on this Website;
"Information" indicates the information concerning the visitors to this Website, as
described in article 4;
"VikingCo NV" / "us" indicates the VikingCo NV, Kempische Steenweg 309/1, B3500 Hasselt; email address: [email protected] ; V.A.T.: BE 0886.946.917;
"Products" indicate the services and products mentionned on this Website;
"Website" indicates the website of Mobile Vikings on the URL www.vikingco.com or
any other URL that leads to the same content.
Introduction
VikingCo NV strives to offer the highest possible standard of service to its customers. To be
able to guarantee this quality, VikingCo NV needs to collect certain information about you. In
this respect, VikingCo NV commits itself to protect your privacy and to follow the guidelines
from the Law issued on December 8, 1992 (“Wet van 8 december 1992 tot bescherming van
de persoonlijke levensfeer ten opzichte van de verwerking van persoonsgegevens”).
Your Permission
1. By using this WebSite you agree with these Privacy Conditions and the way
information can be collected and used by VikingCo NV, as with the possible transfer
of this information, as described below.
2. We are allowed to change these conditions in the future. In that case we will announce
the changed conditions on the Website.
Information Collecting
1. When you register, we need to collect certain information to complete the registration.
This infomation will be part of a permanent file regarding your transactions with
VikingCo NV. This file contains primarily following data: first name, last name,
address, email address, date of birth, phonenumber.
2. It is possible that – when sending us an email – we will request certain information
from you in order to be able to respond quickly and correctly to your questions, or to
verify the data of your permanent file. This information may be included in our
permanent file concerning you.
3. When contacting us, by any means, it is possible that we, if necessary, include certain
remarks with respect to this contact in your permanent file. This allows us to offer a
better service to our customer.
Cookies
1. The Website uses cookies to improve your experience when browsing the website. No
sensitive personal data is stored in these cookies, and the Website will remain fully
functional when disabling cookies in your browser.
2. From time to time VikingCo NV will use marketing agencies to insure our publicity
on the Internet. These companies use cookies to measure the effectiveness of the
publicity. For this purpose these companies may use information regarding your visit
to this or other websites. Unless otherwise stated, no names, addresses, email
addresses or phone numbers or used. No connection is made between internet usage or
cookies and identifiable persons.
3. You can disable cookies during your visit to the website. More information regarding
cookies can be found at www.allaboutcookies.org.
Usage and transfer of information
1. You agree that we and carefully selected others can contact you from time to time
using email, telephone, SMS or MMS regarding products or services that we believe
could be of interest to you.
2. You agree that VikingCo NV may send you emails and newsletters from time to time
with following contents: information about VikingCo NV products and services. At
any time, you have the right to ask VikingCo NV to stop sending these emails and
newsletters.
3. You agree that VikingCo NV uses this information for the following purposes:
1. Handling your orders and requests, managing bills and invoices, processing
invoices of service providers, managing questions, requests or complaints,
legal procedures or any other administrative or commercial activity;
2. Conducting market research to inform you about our products and services,
new features or improvements of products or services, special offers, discounts
and prices that VikingCo NV deems relevant;
3. Giving information according to legal, administrative or regulatory rules
applying to VikingCo NV or relating to legal disputes, fraude, criminal acts or
the prosecution of (alleged) forgers or relating to credit requests coming from
the User.
4. Performing activities relating to the management of VikingCo NV, like staff
training, quality control, network management, testing and maintaining
computers and other systems and relating the transfer of a part of VikingCo
NV.
Right to access
1. On request and without any additional costs, you have the right to oppose the use of
your private information for purposes of direct marketing. You can inform us of this
by sending a letter to the following address:
VikingCo NV, Kempische Steenweg 309/1, B-3500 Hasselt, Belgium or by sending
an e-mail to [email protected]
2. On simple request you have the right to access your personal information for free, and
the right to correct it. Please contact us on the (email) address mentioned above if you
wish to verify, change or alter your data.