mirror of
				https://github.com/iv-org/invidious.git
				synced 2025-11-03 13:48:29 -06:00 
			
		
		
		
	
		
			
				
	
	
		
			219 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			219 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
Do Not Track Compliance Policy 
 | 
						|
 | 
						|
Version 1.0
 | 
						|
 | 
						|
This domain complies with user opt-outs from tracking via the "Do Not Track"
 | 
						|
or "DNT" header  [http://www.w3.org/TR/tracking-dnt/].  This file will always
 | 
						|
be posted via HTTPS at https://example-domain.com/.well-known/dnt-policy.txt
 | 
						|
to indicate this fact.
 | 
						|
 | 
						|
SCOPE
 | 
						|
 | 
						|
This policy document allows an operator of a Fully Qualified Domain Name
 | 
						|
("domain") to declare that it respects Do Not Track as a meaningful privacy
 | 
						|
opt-out of tracking, so that privacy-protecting software can better determine
 | 
						|
whether to block or anonymize communications with this domain.  This policy is
 | 
						|
intended first and foremost to be posted on domains that publish ads, widgets,
 | 
						|
images, scripts and other third-party embedded hypertext (for instance on
 | 
						|
widgets.example.com), but it can be posted on any domain, including those users
 | 
						|
visit directly (such as www.example.com). The policy may be applied to some
 | 
						|
domains used by a company, site, or service, and not to others.  Do Not Track
 | 
						|
may be sent by any client that uses the HTTP protocol, including websites,
 | 
						|
mobile apps, and smart devices like TVs. Do Not Track also works with all
 | 
						|
protocols able to read HTTP headers, including SPDY.
 | 
						|
 | 
						|
NOTE: This policy contains both Requirements and Exceptions. Where possible
 | 
						|
terms are defined in the text, but a few additional definitions are included
 | 
						|
at the end.
 | 
						|
 | 
						|
REQUIREMENTS
 | 
						|
 | 
						|
When this domain receives Web requests from a user who enables DNT by actively
 | 
						|
choosing an opt-out setting in their browser or by installing software that is
 | 
						|
primarily designed to protect privacy ("DNT User"), we will take the following
 | 
						|
measures with respect to those users' data, subject to the Exceptions, also
 | 
						|
listed below:  
 | 
						|
 | 
						|
1. END USER IDENTIFIERS:         
 | 
						|
 | 
						|
  a. If a DNT User has logged in to our service, all user identifiers, such as
 | 
						|
     unique or nearly unique cookies, "supercookies" and fingerprints are 
 | 
						|
     discarded as soon as the HTTP(S) response is issued.                                    
 | 
						|
 | 
						|
     Data structures which associate user identifiers with accounts may be
 | 
						|
     employed to recognize logged in users per Exception 4 below, but may not
 | 
						|
     be associated with records of the user's activities unless otherwise
 | 
						|
     excepted.
 | 
						|
 | 
						|
  b. If a DNT User is not logged in to our service, we will take steps to ensure 
 | 
						|
     that no user identifiers are transmitted to us at all.         
 | 
						|
 | 
						|
2. LOG RETENTION: 
 | 
						|
 | 
						|
  a. Logs with DNT Users' identifiers removed (but including IP addresses and
 | 
						|
     User Agent strings) may be retained for a period of 10 days or less,
 | 
						|
     unless an Exception (below) applies. This period of time balances privacy
 | 
						|
     concerns with the need to ensure that log processing systems have time to
 | 
						|
     operate; that operations engineers have time to monitor and fix technical
 | 
						|
     and performance problems; and that security and data aggregation systems
 | 
						|
     have time to operate.
 | 
						|
 | 
						|
  b. These logs will not be used for any other purposes.         
 | 
						|
 | 
						|
3. OTHER DOMAINS: 
 | 
						|
 | 
						|
  a. If this domain transfers identifiable user data about DNT Users to
 | 
						|
     contractors, affiliates or other parties, or embeds from or posts data to
 | 
						|
     other domains, we will either:         
 | 
						|
 | 
						|
  b. ensure that the operators of those domains abide by this policy overall
 | 
						|
     by posting it at /.well-known/dnt-policy.txt via HTTPS on the domains in
 | 
						|
     question,
 | 
						|
 | 
						|
    OR
 | 
						|
 | 
						|
     ensure that the recipient's policies and practices require the recipient
 | 
						|
     to respect the policy for our DNT Users' data.
 | 
						|
 | 
						|
    OR  
 | 
						|
 | 
						|
     obtain a contractual commitment from the recipient to respect this policy
 | 
						|
     for our DNT Users' data.
 | 
						|
 | 
						|
    NOTE: if an “Other Domain” does not receive identifiable user information
 | 
						|
    from the domain because such information has been removed, because the
 | 
						|
    Other Domain does not log that information, or for some other reason, these
 | 
						|
    requirements do not apply.
 | 
						|
 | 
						|
  c. "Identifiable" means any records which are not Anonymized or otherwise
 | 
						|
     covered by the Exceptions below.
 | 
						|
 | 
						|
4. PERIODIC REASSERTION OF COMPLIANCE: 
 | 
						|
 | 
						|
  At least once every 12 months, we will take reasonable steps commensurate
 | 
						|
  with the size of our organization and the nature of our service to confirm
 | 
						|
  our ongoing compliance with this document, and we will publicly reassert our
 | 
						|
  compliance.
 | 
						|
 | 
						|
5. USER NOTIFICATION: 
 | 
						|
 | 
						|
  a. If we are required by law to retain or disclose user identifiers, we will
 | 
						|
     attempt to provide the users with notice (unless we are prohibited or it
 | 
						|
     would be futile) that a request for their information has been made in
 | 
						|
     order to give the users an opportunity to object to the retention or
 | 
						|
     disclosure.
 | 
						|
 | 
						|
  b. We will attempt to provide this notice by email, if the users have given
 | 
						|
     us an email address, and by postal mail if the users have provided a
 | 
						|
     postal address.                                   
 | 
						|
 | 
						|
  c. If the users do not challenge the disclosure request, we may be legally
 | 
						|
     required to turn over their information.
 | 
						|
 | 
						|
  d. We may delay notice if we, in good faith, believe that an emergency
 | 
						|
     involving danger of death or serious physical injury to any person
 | 
						|
     requires disclosure without delay of information relating to the
 | 
						|
     emergency.
 | 
						|
 | 
						|
EXCEPTIONS
 | 
						|
 | 
						|
Data from DNT Users collected by this domain may be logged or retained only in
 | 
						|
the following specific situations:
 | 
						|
 | 
						|
1. CONSENT / "OPT BACK IN"         
 | 
						|
 | 
						|
  a. DNT Users are opting out from tracking across the Web.  It is possible
 | 
						|
     that for some feature or functionality, we will need to ask a DNT User to
 | 
						|
     "opt back in" to be tracked by us across the entire Web.                                    
 | 
						|
 | 
						|
  b. If we do that, we will take reasonable steps to verify that the users who
 | 
						|
     select this option have genuinely intended to opt back in to tracking.
 | 
						|
     One way to do this is by performing scientifically reasonable user
 | 
						|
     studies with a representative sample of our users, but smaller
 | 
						|
     organizations can satisfy this requirement by other means.         
 | 
						|
 | 
						|
  c. Where we believe that we have opt back in consent, our server will
 | 
						|
     send a tracking value status header "Tk: C" as described in section 6.2
 | 
						|
     of the W3C Tracking Preference Expression draft:
 | 
						|
 | 
						|
     http://www.w3.org/TR/tracking-dnt/#tracking-status-value
 | 
						|
 | 
						|
2. TRANSACTIONS         
 | 
						|
 | 
						|
   If a DNT User actively and knowingly enters a transaction with our
 | 
						|
   services (for instance, clicking on a clearly-labeled advertisement,
 | 
						|
   posting content to a widget, or purchasing an item), we will retain
 | 
						|
   necessary data for as long as required to perform the transaction. This
 | 
						|
   may for example include keeping auditing information for clicks on
 | 
						|
   advertising links; keeping a copy of posted content and the name of the
 | 
						|
   posting user; keeping server-side session IDs to recognize logged in
 | 
						|
   users; or keeping a copy of the physical address to which a purchased
 | 
						|
   item will be shipped.  By their nature, some transactions will require data
 | 
						|
   to be retained indefinitely.
 | 
						|
 | 
						|
3. TECHNICAL AND SECURITY LOGGING:                   
 | 
						|
 | 
						|
  a. If, during the processing of the initial request (for unique identifiers)
 | 
						|
     or during the subsequent 10 days (for IP addresses and User Agent strings),
 | 
						|
     we obtain specific information that causes our employees or systems to
 | 
						|
     believe that a request is, or is likely to be, part of a security attack,
 | 
						|
     spam submission, or fraudulent transaction, then logs of those requests 
 | 
						|
     are not subject to this policy.                                   
 | 
						|
 | 
						|
  b. If we encounter technical problems with our site, then, in rare
 | 
						|
     circumstances, we may retain logs for longer than 10 days, if that is
 | 
						|
     necessary to diagnose and fix those problems, but this practice will not be
 | 
						|
     routinized and we will strive to delete such logs as soon as possible.         
 | 
						|
 | 
						|
4. AGGREGATION:
 | 
						|
 | 
						|
  a. We may retain and share anonymized datasets, such as aggregate records of
 | 
						|
     readership patterns; statistical models of user behavior; graphs of system
 | 
						|
     variables; data structures to count active users on monthly or yearly
 | 
						|
     bases; database tables mapping authentication cookies to logged in
 | 
						|
     accounts; non-unique data structures constructed within browsers for tasks
 | 
						|
     such as ad frequency capping or conversion tracking; or logs with truncated
 | 
						|
     and/or encrypted IP addresses and simplified User Agent strings.
 | 
						|
 | 
						|
  b. "Anonymized" means we have conducted risk mitigation to ensure
 | 
						|
     that the dataset, plus any additional information that is in our
 | 
						|
     possession or likely to be available to us, does not allow the
 | 
						|
     reconstruction of reading habits, online or offline activity of groups of
 | 
						|
     fewer than 5000 individuals or devices. 
 | 
						|
 | 
						|
  c. If we generate anonymized datasets under this exception we will publicly
 | 
						|
     document our anonymization methods in sufficient detail to allow outside
 | 
						|
     experts to evaluate the effectiveness of those methods.
 | 
						|
 | 
						|
5. ERRORS: 
 | 
						|
 | 
						|
From time to time, there may be errors by which user data is temporarily
 | 
						|
logged or retained in violation of this policy.  If such errors are
 | 
						|
inadvertent, rare, and made in good faith, they do not constitute a breach
 | 
						|
of this policy.  We will delete such data as soon as practicable after we
 | 
						|
become aware of any error and take steps to ensure that it is deleted by any
 | 
						|
third-party who may have had access to the data.
 | 
						|
 | 
						|
ADDITIONAL DEFINITIONS
 | 
						|
 | 
						|
"Fully Qualified Domain Name" means a domain name that addresses a computer
 | 
						|
connected to the Internet.  For instance, example1.com; www.example1.com;
 | 
						|
ads.example1.com; and widgets.example2.com are all distinct FQDNs.
 | 
						|
 | 
						|
"Supercookie" means any technology other than an HTTP Cookie which can be used
 | 
						|
by a server to associate identifiers with the clients that visit it.  Examples
 | 
						|
of supercookies include Flash LSO cookies, DOM storage, HTML5 storage, or
 | 
						|
tricks to store information in caches or etags.
 | 
						|
 | 
						|
"Risk mitigation" means an engineering process that evaluates the possibility
 | 
						|
and likelihood of various adverse outcomes, considers the available methods of
 | 
						|
making those adverse outcomes less likely, and deploys sufficient mitigations
 | 
						|
to bring the probability and harm from adverse outcomes below an acceptable
 | 
						|
threshold.
 | 
						|
 | 
						|
"Reading habits" includes amongst other things lists of visited DNS names, if
 | 
						|
those domains pertain to specific topics or activities, but records of visited
 | 
						|
DNS names are not reading habits if those domain names serve content of a very
 | 
						|
diverse and general nature, thereby revealing minimal information about the
 | 
						|
opinions, interests or activities of the user.
 |