1e41f4b71Sopenharmony_ci# Privacy Protection 2e41f4b71Sopenharmony_ci 3e41f4b71Sopenharmony_ci 4e41f4b71Sopenharmony_ci## Overview 5e41f4b71Sopenharmony_ci 6e41f4b71Sopenharmony_ciPersonal data plays an increasingly important role in social economy and daily life along with the development of the Internet and informatization. Meanwhile, personal data leakage risks are increasing. As a consumer product developer, you shall take more effective measures to protect users' personal data and improve their trust in your products. To protect consumers' privacy and improve their experience on privacy, you should set high-level privacy protection policies for your product. 7e41f4b71Sopenharmony_ci 8e41f4b71Sopenharmony_ci**Basic Concepts** 9e41f4b71Sopenharmony_ci 10e41f4b71Sopenharmony_ci- **Personal data** 11e41f4b71Sopenharmony_ci 12e41f4b71Sopenharmony_ci Any information relating to an identified or identifiable natural person \("Data Subject"\) who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, commercial, cultural, or social identity of that natural person. Personal data includes a natural person's email address, phone number, biometric information \(such as a fingerprint\), location data, IP address, healthcare information, religious belief, social security number, marital status, and so on. 13e41f4b71Sopenharmony_ci 14e41f4b71Sopenharmony_ci- **Sensitive personal data** 15e41f4b71Sopenharmony_ci 16e41f4b71Sopenharmony_ci Sensitive personal data, as an important subset of personal data, refers to the most confidential information of a data subject or information that may adversely affect the data subject upon leakage. Sensitive personal data defined in laws and regulations of EU and its members includes personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, genetic data, biometric information, and data concerning health or sex life and sexual orientation. 17e41f4b71Sopenharmony_ci 18e41f4b71Sopenharmony_ci With reference to industry best practices, we also define the following data related to a natural person's identity as sensitive: bank card number, identification number, passport number, and passwords. More strict protection measures are usually required for processing sensitive personal data. 19e41f4b71Sopenharmony_ci 20e41f4b71Sopenharmony_ci- **Public available personal data** 21e41f4b71Sopenharmony_ci 22e41f4b71Sopenharmony_ci Personal data that is proactively disclosed by a data subject or that can be accessed on public web pages or applications, including posts and comments made on forums. 23e41f4b71Sopenharmony_ci 24e41f4b71Sopenharmony_ci- **User profile** 25e41f4b71Sopenharmony_ci 26e41f4b71Sopenharmony_ci Any form of automated processing of personal data to assess a natural person in specific aspects, and in particular to analyze and predict the natural person's work performance, financial situation, health, personal preference, interest, creditability, behavior, and location or trace. 27e41f4b71Sopenharmony_ci 28e41f4b71Sopenharmony_ci- **Data controller** 29e41f4b71Sopenharmony_ci 30e41f4b71Sopenharmony_ci A natural or legal person, public authority, agency, or any other body that, alone or jointly with others, determines the purposes and means of personal data processing. 31e41f4b71Sopenharmony_ci 32e41f4b71Sopenharmony_ci- **Data processor** 33e41f4b71Sopenharmony_ci 34e41f4b71Sopenharmony_ci A natural or legal person, public authority, agency, or any other body that processes personal data on behalf of a data controller. A data processor must provide adequate protection following the data controller's requirements. 35e41f4b71Sopenharmony_ci 36e41f4b71Sopenharmony_ci- **Explicit consent** 37e41f4b71Sopenharmony_ci 38e41f4b71Sopenharmony_ci Explicit consent applies to the following scenarios where the General Data Protection Regulation (GDPR) allows the legitimate processing of personal data based on data subjects' explicit consent: 39e41f4b71Sopenharmony_ci 40e41f4b71Sopenharmony_ci - Processing of sensitive personal data 41e41f4b71Sopenharmony_ci - Automated decision-making, including user profiles 42e41f4b71Sopenharmony_ci - Transfer of personal data to countries without an adequate level of protection, which uses consent as the legal basis 43e41f4b71Sopenharmony_ci 44e41f4b71Sopenharmony_ci Explicit consent can be implemented as follows: 45e41f4b71Sopenharmony_ci 46e41f4b71Sopenharmony_ci - In the collection of specific data, display a privacy statement to notify data subjects of matters related to the processing of personal data, provide a check box which is deselected by default, and prompt data subjects to proactively select the option indicating that "I agree to process my personal data in the above manner" or click the "I agree" button. 47e41f4b71Sopenharmony_ci - Expressly present consent in writing and request data subjects to sign it. 48e41f4b71Sopenharmony_ci - Ask data subjects to upload an electronic form with their signature in the system. 49e41f4b71Sopenharmony_ci - Adopt the double verification method by requesting data subjects to consent via an email and then re-click the email link for verification or enter the SMS verification code. 50e41f4b71Sopenharmony_ci - Users provide information proactively, such as scenarios where a user enters their identification number and bank card number to bind the bank card. 51e41f4b71Sopenharmony_ci 52e41f4b71Sopenharmony_ci 53e41f4b71Sopenharmony_ci## Data Classification 54e41f4b71Sopenharmony_ci 55e41f4b71Sopenharmony_ciData is classified into five levels: very high, high, moderate, low, and public based on the data protection objectives and consequences (the impact of legal risks caused by data leakage or damage on individuals, organizations, or the public). 56e41f4b71Sopenharmony_ci 57e41f4b71Sopenharmony_ci**Table 1** Standards for data classification 58e41f4b71Sopenharmony_ci 59e41f4b71Sopenharmony_ci| **Level**| **Privacy Risk**| **Privacy Attribute**| **Typical Example**| 60e41f4b71Sopenharmony_ci| -------- | -------- | -------- | -------- | 61e41f4b71Sopenharmony_ci| Very high| Once data is identified or associated with an individual or group of individuals, its disclosure or improper use may have a catastrophic negative impact on that individual or group of individuals.| Sensitive personal data| DNA, race, religious belief, and sexual orientation; biometric information; original communication content; bank account password and magnetic track data| 62e41f4b71Sopenharmony_ci| High| Once data is identified or associated with an individual or group of individuals, its disclosure or improper use may have a severe negative impact on that individual or group of individuals.| Sensitive personal data| Social identity (such as ID card and passport number); web browsing history; tracks; content (such as images, audio, and video) uploaded to the cloud| 63e41f4b71Sopenharmony_ci| Moderate| Once data is identified or associated with an individual or group of individuals, its disclosure or improper use may have a significant negative impact on that individual or group of individuals.| General personal data| Device ID (IMEI, SN, or OAID), user ID, basic personal information (name and address), mobile number, and email address.| 64e41f4b71Sopenharmony_ci| Low| Once data is identified or associated with an individual or group of individuals, its disclosure or improper use may have a limited negative impact on that individual or group of individuals.| General personal data| OS settings (including the OS version and country/region); device hardware information (device model, screen size, and screen resolution); network information (network connection status and access network information); device status (login time/duration)| 65e41f4b71Sopenharmony_ci| Public| Public data has no adverse impact on individuals or organizations.| Non-personal data| Publicly released product introduction, public meeting information, and external open-source code| 66e41f4b71Sopenharmony_ci 67e41f4b71Sopenharmony_ci> **NOTE** 68e41f4b71Sopenharmony_ci> 69e41f4b71Sopenharmony_ci> For details about the definitions of privacy protection and data classification, see GDPR. 70e41f4b71Sopenharmony_ci 71e41f4b71Sopenharmony_ci## General Privacy Design Rules 72e41f4b71Sopenharmony_ci 73e41f4b71Sopenharmony_ciObserve the following general privacy design requirements when designing your OpenHarmony products: 74e41f4b71Sopenharmony_ci 75e41f4b71Sopenharmony_ci**Openness and Transparency in Data Collection and Use** 76e41f4b71Sopenharmony_ci 77e41f4b71Sopenharmony_ciWhen collecting personal data, clearly and explicitly notify users of the data to collect and how their personal data will be used. 78e41f4b71Sopenharmony_ci 79e41f4b71Sopenharmony_ci- Develop specific privacy processing policies for personal data at different levels. 80e41f4b71Sopenharmony_ci 81e41f4b71Sopenharmony_ci - Explicit consent shall be obtained from the data subject before your product attempts to collect sensitive personal data. 82e41f4b71Sopenharmony_ci - Generally, the collection of personal data requires the consent of the data subject or other legal authorizations. 83e41f4b71Sopenharmony_ci - If non-personal data is to be collected in association with personal data at the moderate, high, or very high level, the data subject's consent or other legal authorization is required, and the consent or authorization shall be presented in the privacy statement. 84e41f4b71Sopenharmony_ci 85e41f4b71Sopenharmony_ci- Develop and follow appropriate privacy policies. Comply with all applicable laws, policies, and regulations when collecting, using, retaining, and sharing users' personal data with any third parties. For example, prior to data collection, fully inform users of the types, purposes, processing methods, and retention periods of personal data to meet the requirements of data subjects' rights. 86e41f4b71Sopenharmony_ci Guided by the preceding principles, we have designed some examples for your reference. The figures below are examples of a privacy notice and a privacy statement, respectively. 87e41f4b71Sopenharmony_ci 88e41f4b71Sopenharmony_ci **Figure 1** Example of a privacy notice 89e41f4b71Sopenharmony_ci 90e41f4b71Sopenharmony_ci  91e41f4b71Sopenharmony_ci 92e41f4b71Sopenharmony_ci **Figure 2** Example of a privacy statement 93e41f4b71Sopenharmony_ci 94e41f4b71Sopenharmony_ci  95e41f4b71Sopenharmony_ci 96e41f4b71Sopenharmony_ci- Personal data shall be collected for specified, explicit, and legitimate purposes and not further processed in a manner that is incompatible with those purposes. If the purposes are changed or a user withdraws their consent, you shall obtain user consent again before using the data. The figures below are examples of a privacy statement update and content withdrawal, respectively. 97e41f4b71Sopenharmony_ci 98e41f4b71Sopenharmony_ci **Figure 3** Example dialog showing a privacy notice or statement update 99e41f4b71Sopenharmony_ci 100e41f4b71Sopenharmony_ci  101e41f4b71Sopenharmony_ci 102e41f4b71Sopenharmony_ci **Figure 4** Example dialog showing consent withdrawal 103e41f4b71Sopenharmony_ci 104e41f4b71Sopenharmony_ci  105e41f4b71Sopenharmony_ci 106e41f4b71Sopenharmony_ci **Figure 5** Example dialog showing consent withdrawal 107e41f4b71Sopenharmony_ci 108e41f4b71Sopenharmony_ci  109e41f4b71Sopenharmony_ci 110e41f4b71Sopenharmony_ci- You shall provide an entry for users to view the privacy statement. For example, you can provide an entry on the **About** page of your application to view the privacy statement, as shown in the following figure. 111e41f4b71Sopenharmony_ci 112e41f4b71Sopenharmony_ci **Figure 6** Example of About page providing an entry to the privacy statement 113e41f4b71Sopenharmony_ci 114e41f4b71Sopenharmony_ci  115e41f4b71Sopenharmony_ci 116e41f4b71Sopenharmony_ci**Minimization in Data Collection and Use** 117e41f4b71Sopenharmony_ci 118e41f4b71Sopenharmony_ciCollect personal data only when they are adequate, relevant, and limited to what is necessary in relation to the purposes for which they are processed. Apply anonymization or pseudonymization to personal data if possible to reduce the risks to the data subjects concerned. Data shall only be collected and processed for a specified purpose, and no further unnecessary operations shall be conducted on them. 119e41f4b71Sopenharmony_ci 120e41f4b71Sopenharmony_ci- When applying for sensitive permissions, adhere to permission minimization and apply for only the permissions required for obtaining necessary information or resources. For example, if your application can implement its functions without access to the camera, then it shall not request the user for the camera permission. 121e41f4b71Sopenharmony_ci- Comply with data collection minimization, and do not collect data irrelevant to services provided by the product. For example, a product that provides location services shall not collect users' web browsing history. 122e41f4b71Sopenharmony_ci- The functions that use personal data shall be able to benefit users. The collected data shall not be used for functions irrelevant to users' normal use. No data shall be collected for any function irrelevant to user operations. For example, sensitive personal data, such as biometric features and health data, shall not be used for non-core service functions like service improvement, advertising, and marketing. 123e41f4b71Sopenharmony_ci- Printing sensitive personal data in logs is prohibited. If common personal data needs to be printed in logs, make sure the data is anonymized or pseudonymized. 124e41f4b71Sopenharmony_ci- Use settable identifiers preferentially. For example, use **NetworkID** and **DVID** to identify devices in distributed scenarios, and use the **UUID** interface to generate identifiers for other scenarios where unique identifiers are required. Use permanent identifiers, such as serial numbers and MAC addresses, only when settable identifiers cannot meet service requirements. 125e41f4b71Sopenharmony_ci 126e41f4b71Sopenharmony_ci**Data Processing Selection and Control** 127e41f4b71Sopenharmony_ci 128e41f4b71Sopenharmony_ciYou shall obtain consent from users and comply with applicable laws and regulations for processing personal data and give users full control over their data. 129e41f4b71Sopenharmony_ci 130e41f4b71Sopenharmony_ci- When applying for a certain sensitive permission, your product shall display a pop-up dialog to notify the user of the requested permission and the purpose of using the permission. The user shall be able to choose whether to grant the permission and how they would like to grant the permission. This ensures that permission granting and use are transparent, perceivable, and controllable. The following figure is an example dialog for requesting a sensitive permission. 131e41f4b71Sopenharmony_ci 132e41f4b71Sopenharmony_ci **Figure 7** Example dialog for requesting a sensitive permission 133e41f4b71Sopenharmony_ci 134e41f4b71Sopenharmony_ci  135e41f4b71Sopenharmony_ci 136e41f4b71Sopenharmony_ci- Users shall have the right to modify or withdraw the permissions granted to your product. When a user does not agree to a permission or data collection, the user shall be allowed to use the functions irrelevant to the permission or data collection. For example, the user can refuse to grant the camera permission to social or communication apps on Smart TVs, when using product functions irrelevant to the camera, such as voice calls. 137e41f4b71Sopenharmony_ci 138e41f4b71Sopenharmony_ci- In scenarios where personal data is recorded, users shall be provided with the functions of adding, deleting, modifying, and viewing personal data. 139e41f4b71Sopenharmony_ci 140e41f4b71Sopenharmony_ci- Your products shall provide a mechanism or method for securely deleting personal data when hardware is recycled or returned to the factory. 141e41f4b71Sopenharmony_ci 142e41f4b71Sopenharmony_ci- The download or upgrade of user system software or application software may involve the modification of users' private space. Users shall have the right to know and control such behavior. They shall be informed of such behavior and be given the option to agree or disagree with such behavior. 143e41f4b71Sopenharmony_ci 144e41f4b71Sopenharmony_ci**Data Security** 145e41f4b71Sopenharmony_ci 146e41f4b71Sopenharmony_ciData processing security shall be ensured in technical terms, which include encrypted storage and secure transmission. Security mechanisms or measures shall be enabled by default for a system. 147e41f4b71Sopenharmony_ci 148e41f4b71Sopenharmony_ci- A protection mechanism shall be available for personal data access, including identity authentication and access control. Identity authentication (such as user name and password) allows only authenticated users to access data in multi-user scenarios. Access control, such as [permission control](../security/security-guidelines-overall.md) can be used to restrict certain applications. 149e41f4b71Sopenharmony_ci 150e41f4b71Sopenharmony_ci- Secure storage of personal data on distributed devices must meet Huawei Universal KeyStore (HUKS) requirements, including secure storage of keys and data. 151e41f4b71Sopenharmony_ci 152e41f4b71Sopenharmony_ci- The transfer of personal data between distributed devices must meet the trust binding relationship between devices and security requirements of data transmission channels. For details, see [Device Interconnection Security](../security/security-guidelines-overall.md#device-interconnection-security). 153e41f4b71Sopenharmony_ci 154e41f4b71Sopenharmony_ci- Authentication data (such as passwords and fingerprints) shall be encrypted before being stored. 155e41f4b71Sopenharmony_ci 156e41f4b71Sopenharmony_ci**Localization** 157e41f4b71Sopenharmony_ci 158e41f4b71Sopenharmony_ciUser data shall be preferentially processed on the local device. Data that cannot be processed on the local device shall be preferentially processed on a device of the Super Device. If any data cannot be processed on the Super Device, the data shall be anonymized before being transferred out of Super Device for processing. 159e41f4b71Sopenharmony_ci 160e41f4b71Sopenharmony_ci**Minors' Data Protection** 161e41f4b71Sopenharmony_ci 162e41f4b71Sopenharmony_ciIf your product is designed for minors or you can identify, based on the collected user age data, that the end user is a minor, you shall particularly analyze issues related to minors' personal data protection based on relevant local laws in the target market. Your product shall obtain explicit consent from the holders of parental responsibility over minors. 163e41f4b71Sopenharmony_ci 164e41f4b71Sopenharmony_ci 165e41f4b71Sopenharmony_ci## **Privacy Protection Requirements for Special Categories** 166e41f4b71Sopenharmony_ci 167e41f4b71Sopenharmony_ciIn addition to these general privacy requirements, consumer hardware products have the following requirements for special categories. You shall comply with these requirements during product design. 168e41f4b71Sopenharmony_ci 169e41f4b71Sopenharmony_ci**Table 2** Privacy protection requirements for special categories 170e41f4b71Sopenharmony_ci 171e41f4b71Sopenharmony_ci| **Product Category**| Privacy Protection Requirements| 172e41f4b71Sopenharmony_ci| -------- | -------- | 173e41f4b71Sopenharmony_ci| **Smart home**| Biometric information (such as fingerprints, voiceprints, facial recognition, and irises) and user passwords involved in security products are sensitive personal data. They shall be processed using technical measures (for example, extracting the digest of biometric information) before being encrypted and stored in the products.| 174e41f4b71Sopenharmony_ci| **Smart home**| For security products that involve audio, video, and images, their manufacturers, functioning as the data controller, shall provide an independent privacy notification and a brand log on their application UI. Transfer and storage of audio and video data shall be encrypted. Access to audio and video data of security products is permitted only after being authorized by the data subject.| 175e41f4b71Sopenharmony_ci| **Smart home/Entertainment**| Cameras on products should be able to be physically disabled. For example, cameras can be hidden, shuttered, or re-oriented so that consumers can perceive that the cameras are disabled.| 176e41f4b71Sopenharmony_ci| **Smart home/Entertainment**| Products with a microphone should provide an explicit display of the recording status. For example, the products can provide a status indicator that blinks when recording is started and turns off when recording is stopped.| 177e41f4b71Sopenharmony_ci| **Mobile office**| In scenarios such as cross-device display and transfer of user data, your products shall obtain explicit consent from users and give them full control over their personal data.| 178e41f4b71Sopenharmony_ci| **Head unit**| 1. Privacy notice and permission settings<br>Do not let users read privacy policies and permission settings in the driving state.<br>IVI applications shall consider the safety of vehicle use. The applications shall not require complex permission settings or reading of privacy policies when users are driving. For example, HiCar is usable only after users have set basic permissions and read privacy policies on their mobile phone.<br>The privacy statement shall be notified after the user identity is confirmed.<br>Vehicle data involves vehicle owners, drivers, and passengers. The data subject shall be notified of the privacy statement. The recommended practice is to make a privacy statement after confirming the user identity. For an application that requires login, the privacy statement should be displayed after, instead of before, a user is logged in.<br>2. Personal data protection for sharing applications<br>Shared applications shall exit after the IVI is restarted, and the personal data of the current user shall be cleared or encrypted. The applications shall also provide the function to permanently delete historical data.<br>3. Notifications<br>As the IVI is used in an open environment, applications shall not directly display the message content on the IVI. Instead, the applications shall only notify users that there is an incoming message.| 179