This repository has been archived by the owner on Nov 10, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 91
/
principles.lang
78 lines (40 loc) · 2.11 KB
/
principles.lang
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
## NOTE: demo page at https://www-dev.allizom.org/privacy/principles/
# Used as main title and HTML meta tag
;Data Privacy Principles
Data Privacy Principles
# HTML meta tag (description)
;Mozilla is an open source project with a mission to improve your Internet experience. This is a driving force behind our privacy practices.
Mozilla is an open source project with a mission to improve your Internet experience. This is a driving force behind our privacy practices.
# Used in sub-pages to return to the main index https://www.mozilla.org/privacy
;Back to Mozilla Privacy Policy
Back to Mozilla Privacy Policy
;The following five principles stem from the <a href="%(link)s">Mozilla Manifesto</a> and inform how we:
The following five principles stem from the <a href="%(link)s">Mozilla Manifesto</a> and inform how we:
;develop our products and services
develop our products and services
;manage user data we collect
manage user data we collect
;select and interact with partners
select and interact with partners
;shape our public policy and advocacy work
shape our public policy and advocacy work
;No surprises
No surprises
;Use and share information in a way that is transparent and benefits the user.
Use and share information in a way that is transparent and benefits the user.
;User control
User control
;Develop products and advocate for best practices that put users in control of their data and online experiences.
Develop products and advocate for best practices that put users in control of their data and online experiences.
;Limited data
Limited data
;Collect what we need, de-identify where we can and delete when no longer necessary.
Collect what we need, de-identify where we can and delete when no longer necessary.
;Sensible settings
Sensible settings
;Design for a thoughtful balance of safety and user experience.
Design for a thoughtful balance of safety and user experience.
;Defense in depth
Defense in depth
;Maintain multi-layered security controls and practices, many of which are publicly verifiable.
Maintain multi-layered security controls and practices, many of which are publicly verifiable.