...
 
Commits (13)
Mozilla Public License Version 2.0
Memri Privacy Preserving License 0.6
==================================
(an MPL 2.0-based license)
1. Definitions
--------------
1.1. "Contributor"
1.1. "Adequately Encrypted"
means encrypted using encryption standards generally accepted for
encrypting sensitive (personal) information, whereby the decryption
keys may only be available to Subject.
1.2. "Aggregate Information"
means all information that is generated by combining Personal
Information about a group of individuals, that does no longer
directly contain such Personal Information, and which was created
for another purpose than extracting Personal information from that
information.
1.3. "Contributor"
means each individual or legal entity that creates, contributes to
the creation of, or owns Covered Software.
1.2. "Contributor Version"
1.4. "Contributor Version"
means the combination of the Contributions of others (if any) used
by a Contributor and that particular Contributor's Contribution.
1.3. "Contribution"
1.5. "Contribution"
means Covered Software of a particular Contributor.
1.4. "Covered Software"
1.6. "Covered Software"
means Source Code Form to which the initial Contributor has attached
the notice in Exhibit A, the Executable Form of such Source Code
Form, and Modifications of such Source Code Form, in each case
including portions thereof.
1.5. "Incompatible With Secondary Licenses"
1.7. "Incompatible With Secondary Licenses"
means
(a) that the initial Contributor has attached the notice described
......@@ -31,22 +44,26 @@ Mozilla Public License Version 2.0
version 1.1 or earlier of the License, but not also under the
terms of a Secondary License.
1.6. "Executable Form"
1.8. "Executable Form"
means any form of the work other than Source Code Form.
1.7. "Larger Work"
1.9. "Inferences"
means information resulting from combining Aggregate Information
with other information
1.10. "Larger Work"
means a work that combines Covered Software with other material, in
a separate file or files, that is not Covered Software.
1.8. "License"
1.11. "License"
means this document.
1.9. "Licensable"
1.12. "Licensable"
means having the right to grant, to the maximum extent possible,
whether at the time of the initial grant or subsequently, any and
all of the rights conveyed by this License.
1.10. "Modifications"
1.13. "Modifications"
means any of the following:
(a) any file in Source Code Form that results from an addition to,
......@@ -56,7 +73,7 @@ Mozilla Public License Version 2.0
(b) any new file in Source Code Form that contains any Covered
Software.
1.11. "Patent Claims" of a Contributor
1.14. "Patent Claims" of a Contributor
means any patent claim(s), including without limitation, method,
process, and apparatus claims, in any patent Licensable by such
Contributor that would be infringed, but for the grant of the
......@@ -64,16 +81,39 @@ Mozilla Public License Version 2.0
made, import, or transfer of either its Contributions or its
Contributor Version.
1.12. "Secondary License"
1.15. "Personal Information"
Means all information related to or generated by a Subject,
generated by the interaction between a Subject and a computer
system by means of input devices and/or sensors, or generated by
Processing Personal Information, excluding any Aggregate
Information.
1.16. "Process / Processing"
means any action, whether performed by a human or by a computing
device involving Personal Information. Such actions include, but
are not limited to, storing, retrieving, viewing, displaying,
copying, removing, editing, displaying, and showing.
1.17. "Secondary License"
means either the GNU General Public License, Version 2.0, the GNU
Lesser General Public License, Version 2.1, the GNU Affero General
Public License, Version 3.0, or any later versions of those
licenses.
1.13. "Source Code Form"
1.18. "Source Code Form"
means the form of the work preferred for making modifications.
1.14. "You" (or "Your")
1.19. "Static Data Set"
means a fixed amount of data that is provided at one, immediate
point in time.
1.20. "Subject"
means the person that is a user of Your Covered Software.
1.21. "Unencrypted"
means not Adequately Encrypted.
1.22. "You" (or "Your")
means an individual or a legal entity exercising rights under this
License. For legal entities, "You" includes any entity that
controls, is controlled by, or is under common control with You. For
......@@ -88,8 +128,9 @@ Mozilla Public License Version 2.0
2.1. Grants
Each Contributor hereby grants You a world-wide, royalty-free,
non-exclusive license:
Provided that You comply with all the terms of this License, each
Contributor hereby grants You a world-wide, royalty-free, non-exclusive
license:
(a) under intellectual property rights (other than patent or trademark)
Licensable by such Contributor to use, reproduce, make available,
......@@ -134,7 +175,7 @@ the notice requirements in Section 3.4).
No Contributor makes additional grants as a result of Your choice to
distribute the Covered Software under a subsequent version of this
License (see Section 10.2) or under the terms of a Secondary License (if
License (see Section 11.2) or under the terms of a Secondary License (if
permitted under the terms of Section 3.3).
2.5. Representation
......@@ -151,8 +192,8 @@ equivalents.
2.7. Conditions
Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
in Section 2.1.
Sections 3.1, 3.2, 3.3, 3.4, and 4 are conditions of the licenses
granted in Section 2.1.
3. Responsibilities
-------------------
......@@ -216,7 +257,139 @@ indemnity or liability terms You offer. You may include additional
disclaimers of warranty and limitations of liability specific to any
jurisdiction.
4. Inability to Comply Due to Statute or Regulation
4. Protecting privacy
---------------------
4.1. Protecting Personal Information
Personal Information is not subject to ownership, by either You or the
Subject. Instead, privacy is a fundamental human right. Determining if
and how Personal Information is Processed is an essential part of
privacy. This clause aims to guarantee that You respect this
fundamental human right.
You must ensure that Personal Information is Adequately Encrypted
wherever possible.
This clause 4 does not apply if and in so far as You are the Subject.
4.2. Processing Adequately Encrypted Personal Information
You may Process Personal Information by means of Covered Software, or
by means of a Larger Work, without obtaining the prior authorization of
clause 4.3, only if and in so far as necessary for providing Your
service to the Subject, and provided that this Personal Information is
Adequately Encrypted. In all other cases, the terms of clause 4.3
apply.
4.3. Processing Unencrypted Personal Information
You may not Process Unencrypted Personal Information by means of
Covered Software or by means of a Larger Work, unless You obtain prior
authorization from the Subject. You will ensure that such authorization
is always:
(a) For a specific period of time;
(b) For a specific, pre-determined, communicated and unchangeable
purpose;
(c) Based on clear and understandable information about the specific
period of time and the specific purpose;
(d) Based on a separate agreement, and not concealed in general terms
and conditions or click through agreements;
(e) Accompanied by an offer to fairly compensate the Subject for the
value derived from Processing Personal Information that is not
Adequately Encrypted, which value must be validated in hindsight;
The specific period of time listed under clause 4.3 (a) may be an
unlimited period of time only if and in so far as the Personal
Information is a Static Data Set. If the Personal Information is not a
Static Data Set, the specific period of time may not be longer than two
years, which term may be extended for another period of two years. Such
extension may not occur automatically, and requires renewed
authorization in accordance with this clause 4.3.
The terms of this clause 4.3 apply to Processing Adequately Encrypted
Personal Information for other purposes than the purposes described in
clause 4.2 as well.
4.4. Requirements for third party access
If You want to provide access to Personal Information to a third party,
then You must ensure that the Subject is a party to the transaction
(whether that transaction is for a fee, or not) with regard to their
Personal Information, so that the Subject can authorize that access.
The criteria for authorization listed in clause 4.3 apply in full.
In addition, you must ensure that the third party complies with the
obligations of clause 4.3 and 4.4, even if the third party does not use
Covered Software or a Larger Work to Process the acquired Personal
Information.
This Clause does not apply if and in so far as the Subject initiates
the process of providing access to such third party, for instance by
sending a limited Static Data Set to a recipient of their choice.
4.5. Revoking authorization
If a Subject does not extend the authorization previously given, You
will delete all their Personal Information and after deletion You must
send proof of deletion to the Subject and subsequently delete such
proof.
4.6. Control by Subject
You must ensure that a Subject has full control over their Personal
Information. This includes allowing the Subject to download all their
Personal Information in a format regularly used for such Personal
Information. The Subject is at all times responsible for safekeeping of
the encryption keys.
4.7 Restrictions for Processing Aggregate Information
If you want to Process Personal Information to generate Aggregate
Information, the terms of clause 4.3 apply. In addition:
You may only Process Personal Information to generate Aggregate
Information if and in so far as it’s reasonable to assume that the
chance of extracting Personal Information from the Aggregate
Information is negligible.
Creating Aggregate Information may not serve the purpose of obtaining
more Personal Information about a Subject or extracting Personal
Information from such Aggregate Information. Furthermore, You must do
everything in Your power to prevent anyone, including Yourself, from
trying to extract Personal Information about a Subject from Your
Aggregate Information or Your Inferences.
If you want to provide access to or sell Aggregate Information to a
third party, You must ensure that the terms of clause 4.7 (b) and (c)
apply in all material respects to such third party, even if the third
party does not use Covered Software or a Larger Work to Process the
Aggregate Information
Provided You comply with the terms of this clause 4.7, you may use
Aggregate Information to generate Inferences.
4.8 General Restrictions on Processing Personal Information
You may not Process Personal Information by means of Covered Software
or by means of a Larger Work, if the purpose of such Processing is:
(a) Surveillance;
(b) Tracking;
(c) Influencing or recording political views;
(d) identifying, or obtaining information about, other persons than the
Subject.
5. Inability to Comply Due to Statute or Regulation
---------------------------------------------------
If it is impossible for You to comply with any of the terms of this
......@@ -229,10 +402,10 @@ Software under this License. Except to the extent prohibited by statute
or regulation, such description must be sufficiently detailed for a
recipient of ordinary skill to be able to understand it.
5. Termination
6. Termination
--------------
5.1. The rights granted under this License will terminate automatically
6.1. The rights granted under this License will terminate automatically
if You fail to comply with any of its terms. However, if You become
compliant, then the rights granted under this License from a particular
Contributor are reinstated (a) provisionally, unless and until such
......@@ -246,14 +419,14 @@ first time You have received notice of non-compliance with this License
from such Contributor, and You become compliant prior to 30 days after
Your receipt of the notice.
5.2. If You initiate litigation against any entity by asserting a patent
6.2. If You initiate litigation against any entity by asserting a patent
infringement claim (excluding declaratory judgment actions,
counter-claims, and cross-claims) alleging that a Contributor Version
directly or indirectly infringes any patent, then the rights granted to
You by any and all Contributors for the Covered Software under Section
2.1 of this License shall terminate.
5.3. In the event of termination under Sections 5.1 or 5.2 above, all
6.3. In the event of termination under Sections 5.1 or 5.2 above, all
end user license agreements (excluding distributors and resellers) which
have been validly granted by You or Your distributors under this License
prior to termination shall survive termination.
......@@ -300,7 +473,7 @@ prior to termination shall survive termination.
* *
************************************************************************
8. Litigation
9. Litigation
-------------
Any litigation relating to this License may be brought only in the
......@@ -310,8 +483,8 @@ jurisdiction, without reference to its conflict-of-law provisions.
Nothing in this Section shall prevent a party's ability to bring
cross-claims or counter-claims.
9. Miscellaneous
----------------
10. Miscellaneous
-----------------
This License represents the complete agreement concerning the subject
matter hereof. If any provision of this License is held to be
......@@ -320,24 +493,24 @@ necessary to make it enforceable. Any law or regulation which provides
that the language of a contract shall be construed against the drafter
shall not be used to construe this License against a Contributor.
10. Versions of the License
11. Versions of the License
---------------------------
10.1. New Versions
11.1. New Versions
Mozilla Foundation is the license steward. Except as provided in Section
Memri Federation is the license steward. Except as provided in Section
10.3, no one other than the license steward has the right to modify or
publish new versions of this License. Each version will be given a
distinguishing version number.
10.2. Effect of New Versions
11.2. Effect of New Versions
You may distribute the Covered Software under the terms of the version
of the License under which You originally received the Covered Software,
or under the terms of any subsequent version published by the license
steward.
10.3. Modified Versions
11.3. Modified Versions
If you create software not governed by this License, and you want to
create a new license for such software, you may create and use a
......@@ -345,7 +518,7 @@ modified version of this License if you rename the license and remove
any references to the name of the license steward (except to note that
such modified license differs from this License).
10.4. Distributing Source Code Form that is Incompatible With Secondary
11.4. Distributing Source Code Form that is Incompatible With Secondary
Licenses
If You choose to distribute Source Code Form that is Incompatible With
......@@ -355,9 +528,10 @@ notice described in Exhibit B of this License must be attached.
Exhibit A - Source Code Form License Notice
-------------------------------------------
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0. If a copy of the MPL was not distributed with this
file, You can obtain one at http://mozilla.org/MPL/2.0/.
This Source Code Form is subject to the terms of the Memri Privacy
Preserving License, v. 1.0. If a copy of the Memri Privacy Preserving
License was not distributed with this file, You can obtain one at
https://memri.io/license.html.
If it is not possible or desirable to put the notice in a particular
file, then You may include the notice in a location (such as a LICENSE
......@@ -370,4 +544,5 @@ Exhibit B - "Incompatible With Secondary Licenses" Notice
---------------------------------------------------------
This Source Code Form is "Incompatible With Secondary Licenses", as
defined by the Mozilla Public License, v. 2.0.
defined by the Memri Privacy Preserving License, v. 0.6.