End User Privacy Policy
Authors: Margaret Johnson and Don Petravick
Information Classification: Public
Summary:
This document describes the Privacy Policy for personally identifiable information for users of SCiMMA infrastructure.
User Information
We create an account for you. We collect and persistently store the following information which might identify you. We hold onto this information until your account is cancelled and records are expunged from our system.
- First and Family Name
- Email Address
- The organizational identity source you use to create an account
- Kafka topics, Kafka groups you can access
- Logfile information about your use of the system.
Use of Information
- Your email address is used to administer access to Kafka topics.
- Your email address may be part of mailing lists the project maintains, and may be used as a username.
- All your information is potentially used by SCiMMA project administrators to support use of the system.
- Data you have injected into the HOPSKOTCH system is made available to authorized users.
Disclosure of Information
- Your email address is shared with other registered users of SCiMMA services.
- All user information, is potentially used by SCiMMA project administrators supporting use of the system.
- Data you have injected into the HOPSKOTCH is identified by topic. Data will carry personal identifiers only if you explicitly make them part of the payload you provided. Topic names will carry personal identifiers only if topic administrators explicitly make them part of the name.
- By publishing payload data to HOPSKOTCH, you delegate control of the data to Group Administrators. Scimma supplies mechanisms for topic owners to control access to topics, and to delete topics. Topic administrators are free to follow their own practices using these control mechanisms.
- Logged information, including information provided by you for registration purposes, is used for administrative, operational, accounting, monitoring and security purposes. This information may be disclosed, via a secure mechanism, only for the same purposes and only as far as necessary to other organizations cooperating with SCiMMA. SCiMMA reserves the right to have networks and systems audited on a periodic basis to ensure compliance with this policy.