EGI AAI "Check-in" Data Privacy Policy

This Privacy Policy explains how we, the EGI CheckIn Service (“We”), treat data by which you can be personally identified (“Personal Data”) as a result of your registration for and use of the EGI e-Infrastructure (“Infrastructure”).

To enable the Infrastructure to be safe and reliable for your use and to preserve your rights as a user we adhere to "The EGI Policy on the Processing of Personal Data" (“The Data Protection Policy”) available in the Appendix below. The Data Protection Policy should also be read with reference to other Infrastructure policies available at https://wiki.egi.eu/wiki/SPG:Documents.

What Personal Data do We process?

We collect and process the following Personal Data to identify you, thereby enabling us to grant you access to the services and resources provided by the Infrastructure:

Purposes of Processing

We process your personal data solely to manage your access to the EGI CheckIn service and other Infrastructure services, including those provided by User Communities, all bound to the same Infrastructure policies.

Your personal data will be used solely for administrative, operational, monitoring, security and dispute resolution purposes.

Your usage of the Infrastructure will be monitored and records of this use, containing your Personal Data, will be stored and used only for the same purposes.

Stored where?

The records of your use of the Infrastructure are stored in secure databases in various locations at EGI Resource Centres and EGI Operations and Accounting centres, all of whom are bound by the obligations of this Privacy Policy and the Data Protection Policy.

Accessed by whom?

The records of your use may only be accessed by appropriately authorised individuals in EGI/NGI Operations, in the EGI CSIRT and NGI security teams and authorised resource managers in your User Community.

Retained for how long?

The records of your use of the service(s) will be deleted or anonymised after, at latest, 18 months.

Sharing of your Personal Data with others

Your Personal Data will be shared with other authorised Infrastructure participants via secured mechanisms, only for the purposes given above, and only as far as necessary to manage your access to the service(s), any only where the recipient has agreed to abide by this Privacy Policy and the Data Protection Policy.

The records of your use may be shared for security incident response purposes with other authorised participants in the academic and research distributed digital infrastructures via secured mechanisms, only for the same purposes and only as far as necessary to provide the incident response capability where doing so is likely to assist in the investigation of suspected misuse of Infrastructure resources.

Name and Contact details of Data Processor

The EGI.eu Operations Team. (email: operations@egi.eu)

Name and Contact details of the EGI CheckIn Service Data Protection Officer

You can contact our Data Protection Officer (Matthew Viljoen, EGI Operations, email: matthew.viljoen@egi.eu) to obtain a copy of your Personal Data, request that it is corrected in case of factual error or if you suspect that it has been misused. You can also request that we stop using your Personal Data but this will affect your access to the Infrastructure.

Appendix: "The EGI Policy on the Processing of Personal Data"

Introduction

The "EGI Policy on the Processing of Personal Data" (hereafter referred to in this Appendix as this "Policy" or the "Policy") ensures that data collected as a result of the use of the Infrastructure is processed fairly and lawfully by Infrastructure participants. Some of this data, for example that relating to user registration, monitoring and accounting contains “personal data” as defined by the European Union (EU) [R1]. The collection and processing of personal data is subject to restrictions aimed at protecting the privacy of individuals.

Definitions

Infrastructure
The bounded collection of universities, laboratories, institutions or similar entities, which adhere to a common set of policies [R2] and together offer data processing and data storage services to End Users.
Participant
Any entity providing, managing, operating, supporting or coordinating one or more Infrastructure service(s).
Personal Data
Any information relating to an identified or identifiable natural person [R1].
Processing (Processed)
Any operation or set of operations, including collection and storage, which is performed upon Personal Data [R1].
End User
An individual who by virtue of their membership of a recognised research community is authorized to use Infrastructure services.

Scope

This Policy covers Personal Data that is Processed as a prerequisite for or as a result of an End User’s use of Infrastructure services. Examples of such Personal Data include registration information, credential identifiers and usage, accounting, security and monitoring records. This Policy does not cover Personal Data relating to third parties included in datasets provided by the End User or the research community to which they belong as part of their research activity. Examples of such data are medical datasets which may contain Personal Data.

Policy

By their activity in the Infrastructure, Participants:

  1. Declare that they have read, understood and will abide by the Principles of Personal Data Processing as set out below.
  2. Declare their acknowledgment that failure to abide by these Principles may result in exclusion from the Infrastructure, and that if such failure is thought to be the result of an unlawful act or results in unlawful information disclosure, they may be reported to the relevant legal authorities.

Principles of Data Processing

  1. The End User whose Personal Data is being Processed shall be treated fairly and in an open and transparent manner.
  2. Personal Data of End Users (hereinafter “Personal Data”) shall be Processed only for those administrative, operational, accounting, monitoring and security purposes that are necessary for the safe and reliable operation of Infrastructure services, without prejudice to the End Users’ rights under the relevant laws.
  3. Processing of Personal Data shall be adequate, relevant and not excessive in relation to the purposes for which they are Processed.
  4. Personal Data shall be accurate and, where necessary, kept up to date. Where Personal Data are found to be inaccurate or incomplete, having regard to the purposes for which they are Processed, they shall be rectified or purged.
  5. Personal Data Processed for the purposes listed under paragraph ii above shall not be kept for longer than the period defined in a relevant Infrastructure service policy governing the type of Personal Data record being Processed (e.g. registration, monitoring or accounting) and by default shall be anonymised or purged after a period of 18 months.
  6. Appropriate technical and organisational measures shall be taken against unauthorised disclosure or Processing of Personal Data and against accidental loss or destruction of, or damage to, Personal Data. As a minimum, Infrastructure Participants shall:
    1. Restrict access to stored Personal Data under their control to appropriate authorised individuals;
    2. Transmit Personal Data by network or other means in a manner to prevent disclosure to unauthorised individuals;
    3. Not disclose Personal Data unless in accordance with these Principals of Personal Data Processing;
    4. Appoint at least one Data Protection Officer (DPO) with appropriate training and publish to the Infrastructure a single contact point for the DPO to which End Users or other Infrastructure Participants can report suspected breaches of this Policy;
    5. Respond to suspected breaches of this Policy promptly and effectively and take the appropriate action where a breach is found to have occurred;
    6. Perform periodic audits of compliance to this Policy and make available the results of such audits to other Infrastructure Participants upon their request.
  7. Each Infrastructure service interface provided for the End User must provide, in a visible and accessible way, a Privacy Policy containing the following elements:
    1. Name and contact details of the Participant Processing Personal Data;
    2. Description of Personal Data being Processed;
    3. Purpose or purposes of Processing of Personal Data;
    4. Explanation of the rights of the End User to:
      1. Obtain a copy of their Personal Data being stored by the Participant without undue delay;
      2. Request that any Personal Data relating to them which is shown to be incomplete or inaccurate be rectified;
      3. Request that on compelling legitimate grounds Processing of their Personal Data should cease;
    5. The contact details of the Participant’s DPO to which the End User should direct requests in relation to their rights above;
    6. Retention period of the Personal Data Processed;
    7. Reference to this Policy.
  8. Personal Data may only be transferred to or otherwise shared with individuals or organisations where the recipient
    1. has agreed to be bound by this Policy and the set of common Infrastructure policies,
    2. or
    3. is part of a recognised Computer Incident Response Team framework and as part of an incident investigation to prevent active or suspected misuse of Infrastructure services,
    4. or
    5. presents an appropriately enforced legal request.

References