Page tree
Skip to end of metadata
Go to start of metadata

 

Service Description

 

About

The document discusses use of the B2DROP service by researchers.

Modified: 19 June 2018

Synopsis

B2DROP is a secure and trusted data exchange service for researchers and scientists to keep their research data synchronized and up-to-date and to exchange them with other researchers. In this document the user can find instructions on how to connect B2DROP to their computer using the MacOS, Linux and Windows operating systems.

Introduction

B2DROP is an easy-to-use, user-friendly and trustworthy storage environment which allows users to synchronise their active data across different desktops and to easily share this data with peers. The service is directed towards all European researchers whose institute does not host such storage. B2DROP is based on NextCloud. The service is intended for the long-tail and still volatile data which can change and are still subject to active research e.g. drafts of research papers. Therefore, B2DROP offers versioning of all ingested files but does not attach persistent identifiers to them.

B2DROP is hosted at the Jülich Supercomputing Centre, which guarantees that your research data stay in Europe. Daily backups of all files in B2DROP are taken and kept on tape. Data are encrypted on transmission through the exclusive use of the https protocol for data transfer. Each B2DROP user is allowed 20GB of storage.

Use of B2DROP is subject to the service terms of use.

Usage overview

B2DROP offers an intuitive user-interface via the web; this is mostly self-explanatory, with highlights discussed below. In addition to web access, users can mount B2DROP as a drive on their desktop machines via WebDAV, or use a desktop client which also allows offline synchronisation. In this section we give some quick-start instructions for the MacOS, Linux and Windows operating systems. For further help please consult the NextCloud documentation. Please note that a PDF copy of the ownCloud user manual is also available in your B2DROP home directory.

Web usage highlights

B2DROP includes customisations over ownCloud, highlighted below. Some finer points are also discussed.

Getting access

Please visit https://b2drop.eudat.eu/ and seek "Not registered yet? CLICK HERE" under the "Log in" button. Click on it and follow the simple instructions.

Sharing a file

There are two ways to share a file: via ownCloud functionality, you can share files with users in the B2DROP directory and on other ownClouds; and with anyone on email by sharing a link. Hover over an entry and click on the "Share" symbol, as shown on Figure 1.

Figure 1. The B2DROP "Share" icon.

Share via ownCloud: If you start typing on the box shown on Figure 2, options from the B2DROP directory become available. Or you can use the format username@example.com/owncloud for users on other ownClouds. You need to repeat for each person you want to allow access.

Figure 2. The B2DROP menu to share with NextCloud users.

Share publicly: If you click on "Share link" instead, a URL is made available to you as shown on Figure 3. You can distribute this using your preferred means.

Figure 3. The B2DROP menu to share publicly.

Figure 4 shows the different icons that shared folders get: the chain represents a publicly shared link; the triangle signifies a locally shared folder.

Figure 4. The B2DROP shared folder icons (publicly and locally respectively).

More information on sharing is available from the ownCloud user documentation.

Accessing shared artefacts

When a B2DROP local user shares a file or folder with you, then a link to this artefact is added to your B2DROP home folder.

However, when accessing an artefact that was shared with you as a link, then the "Add to your ownCloud" button appears at the top right of the B2DROP webpage; see Figure 5. Clicking on it adds to your B2DROP home folder a link to this page.

Figure 5. The B2DROP "Add to your ownCloud" button.

Other functionality

Hover over a file that you won and note the three-dot symbol shown on Figure 6. If you click on that, you are presented with options to see the details of the file, rename it, download it onto storage available from your client or delete it from B2DROP.

Figure 6. Other file options on B2DROP.

Mount B2DROP using the WebDAV client

You can use the WebDAV client to mount your B2DROP folder as a drive on your computer. Note that this mode of using B2DROP requires you to be connected to the internet in order to open and save files, while the desktop synchronization client discussed below allows you to also manipulate files while offline and synchronize when re-connected. Instructions for using the WebDAV client for MacOS, Linux and Windows are discussed below.

  • MacOS

You can mount B2DROP in your "Finder" by clicking on "Go" on the drop-down menu and then "Connect to server" and entering: https://b2drop.eudat.eu/remote.php/webdav/
You then need to login with your username (email address) and password.
You can also mount B2DROP with Cyberduck by providing the above-mentioned information to the client.

  • Linux

The instructions below have been tested on Ubuntu but they should work for every Linux distribution supporting the NAUTILUS or GNOME file system.

You can mount B2DROP with NAUTILUS. Then select "Go to File --> Connect to server" Type in: davs://b2drop.eudat.eu/remote.php/webdav/. You then need to login with your username (email address) and password. Mounting via davfs is also possible, but it requires sudo access.

     sudo apt-get install davfs2

     mkdir oc

     sudo mount.davfs https://b2drop.eudat.eu/remote.php/webdav/ oc

You then need to login with your username (email address) and password. You can unmount with the following command: sudo umount.davfs oc

  • Windows

You can map B2ROP as network drive by entering the following URL as a folder: https://b2drop.eudat.eu/remote.php/webdav/
You then need to login with your username (e-mail address) and password.
Note: you may need to set your computer to allow Basic Authentication; please follow the Microsoft instructions for this. Because B2DROP is available under https, Option "1 - Basic authentication enabled for Secure Sockets Layer (SSL) shares only" should suffice for Windows Vista and later.

Desktop Synchronization

You can also synchronize B2DROP with your computer using ownCloud desktop clients. Just download the latest version of the ownCloud Desktop Synchronization Client from the ownCloud Website. There are clients for multiple Linux distributions, Mac OS X, and Microsoft Windows, as discussed below. For more information on the client, check out the documentation.

  • Mac OS X and Windows

Installation on Mac OS X and Windows is the same as for any software application: download the program, double-click it to launch the installation, and then follow the installation wizard. The installation wizard takes you step-by-step through configuration options and account setup. You need to enter the URL of the B2DROP ownCloud server, which is https://b2drop.eudat.eu/. Then enter your username (email address) and password.

  • Linux Distributions

Linux users must follow the instructions on the download page to add the appropriate repository for their Linux distribution, install the signing key, and then use their package managers to install the desktop sync client. For the configuration options and account setup you need to enter the URL of the B2DROP ownCloud server which is https://b2drop.eudat.eu/. Then enter your username (email address) and password.

A note on B2DROP versioning

B2DROP supports file versioning, and it does so automatically. Access to the previous versions is straightforward on the web GUI and the desktop client; the file gets overwritten by the selected version, with other versions (including newer) retained.

However, in order to preserve disk space, B2DROP preserves a subset of the versions, progressively reducing the number of retained versions as time goes by. The scheme is discussed under "Version Control" in the ownCloud manual, but it is important to note that B2DROP will remove older saved versions and/or stop maintaining versions while the user exceeds 50% of their quota.

Future features

In future, further B2DROP instances at other EUDAT centres are planned which can be federated to allow data exchange between these instances. In general the developer team is looking into possibilities to allow federations between B2DROP and other OwnCloud instances.

EUDAT is open to suggestions for B2DROP plugins and is interested in developing such plugins for communities and hosting community-specific B2DROP instances.

Support

Support for B2DROP is available via the EUDAT ticketing system through the webform.

If you have comments on this page, please submit them though the EUDAT ticketing system.

 

Service Level Agreement

 

 

CSC – IT Center for Science

Service Level Agreement

for CSC EUDAT B2DROP service

 

 

 

Service Level Agreement

 

1.   General

This document is an service level agreement (SLA) to cover the provision and support of the B2SDROP SERVICE.

This agreement is made between:

 

CSC – IT Center for Science, Keilaranta 14, Espoo, Finland

 

and

 

[Customer name], [address – city –country]

 

represented by [Customer representative].

 

This SLA is valid from

 

2018-01-01 to 2019-01-01.

 

The purpose of this SLA is to agree quality and reliability requirements and targets of a B2DROP SERVICE. In addition, this document defines processes, roles, and contact addresses that are used to ensure that required service level can be maintained.

CSC – IT Center for Science (CSC) is part of community providing services under EUDAT brand. CSC does not provide all the service components and supporting services by itself. Some of the supporting service and service components are provided by other EUDAT Service Providers listed in Annex A.

 

2.   Scope & description of the service

B2DROP is a secure and trusted data exchange service for researchers and scientists to keep their research data synchronized and up-to-date and to exchange with other researchers. B2DROP is an ideal solution to store and exchange data with colleagues and team members, synchronise multiple versions of data, ensure automatic desktop synchronisation of large files.

To protect customer data, data stored into CSC B2DROP service will be replicated daily to secondary system or backed up into CSC Backup service.

B2Drop is based on NextCloud technology.

B2DROP features

  • federated authentication through B2Access service
  • intuitive user-interface via the web,
  • desktop clients available for Windows, MacOS, Linux, IOS, and Android systems,
  • WebDAV API,
  • store and exchange data with colleagues and team members,
  • synchronise multiple versions of data,
  • ensure automatic desktop synchronisation of files.

Additional service packages:

  • Use only one file replica

3.   Service hours and exceptions

The service is available on a 24x7 basis excluding time required for service maintenance and incident management. Service Desk hours are as follows:

08:30-16:00 EET, normal working days.

Normal working days are from Monday to Friday excluding following generic holidays  

  • New Year's Day                (1.1)
  • Epiphany                               (6.1)
  • Good Friday                        (Friday, variable date)
  • Easter Day                            (Sunday, variable date)
  • Easter Monday                  (Monday, variable date)
  • Labour Day                          (1.5)
  • Ascension Day                   (Thursday, variable date)
  • Whitsunday                         (Sunday, variable date)
  • Midsummer Eve               (variable date)
  • Midsummer Day              (variable date)
  • All Saint’s Day                    (Saturday, variable date)
  • Indenpendence Day      (6.12)
  • Christmas Eve                   (24.12)
  • Christmas Day                   (25.12)
  • St. Stephen's Day             (26.12)

The following exceptions apply:

If not stated elsewhere, CSC EUDAT B2DROP service has a regular maintenance window every first Tuesday of the month 13:00-15:00. Regular maintenance windows are not advertised in advance.

In addition to regular maintenance break, as a part of incident management process, there may be additional maintenance breaks. Announcement about these breaks will be given at least 7 calendar days before the maintenance break. These service breaks are considered as planned and they do not affect the Service Reliability (See section 5).

Service breaks advertised in short time (less than 7 calendar days before the maintenance) are considered as emergency service breaks. Unplanned service break due to emergency maintenance is only done as a part of critical incident management process. Unplanned service breaks are taken into account on Service Reliability.

During maintenance windows, Service Availability and/or service response will be reduced.

4.   Support

The services covered by the scope of this SLA are provided with the following level of support.

B2DROP

Time

Service Desk Response Time

4 hours

Service Desk Resolution time

4 days

 

Service Desk Response Time is the Target time for a Service Desk to respond to a service request. Service Desk Resolution time describes the maximum time for a Service Desk to fulfil the standard service request. In most of the cases Service Desk Resolution time is considerably shorter than the Service Desk Resolution time given above. Non-standard service requests include service requests of new customers and capacity requirements over 50 TB.

4.1.        Incident handling

Disruptions to the agreed service operation will be handled according to an appropriate severity classification of the incident. In this context, following guidelines apply:

Severity Level

Description

Incident Responce Time

Severity 3

Total loss of a Service:

  • Service has not been available longer than 30 minutes.
  • During the last full day, Service Reliability is below 83%

4 hours during normal working time

Severity 2

Service is degraded:

  • During the 4-hour measurement interval, there has been at least four time periods when the service has not been available
  • Service has not been available during a measuring period of 30 minutes
  • During the last full day, Service Reliability is below 93%

1 working day

Severity 1

Minor incident / warning:

  • Normal or near normal user experience (i.e. no impact to Service Reliability or to Service Availability)
  • Resilience of the service degraded due to failing Service Component.
  • Minor Service Component of the service not working temporarily.
  • Data integrity mismatch in one of the data copies
  • During the last full day, Service Reliability is below 98%

4 working days

Security incident resolution coordination is to be lead by CSC security officer.  Security incident is defined such that there has been an event indicating possible unauthorized access to data, applications, services, networks and/or devices by bypassing their underlying security mechanisms. Alternatively, known vulnerability and tools to utilize the vulnerability exist.

CSC helpdesk agents acknowledge the reception of the information about the incident, notify the severity level and provide, if possible, a first and not committed estimate of the time required to restore normal operational status. If an incident cannot be solved within the mentioned timeframe, i.e. Incident Resolution time, a statement explaining the reasons is issued. This statement will contain a plan how the incident will be solved during the following working days.

 

5.   Service level targets

The following are the agreed service level minimums for the B2DROP Service:

Service Level target

(%)

Service Reliability

98%

Service Reliability is measured using EUDAT monitoring system. EUDAT monitoring system checks that the B2DROP service responds correctly and that a test file can be accessed. Availability checks are done in 5 minute intervals. Service Reliability is measured in daily (24 hours) level.

 

6.   Limitations & constraints

The provisioning of the service under the agreed service level targets is subject to the following limitations and constraints:

▪       Support is provided in the following languages: English, Finnish

▪       Force Majeure. A party shall not be liable for any failure of or delay in the performance of this Agreement for the period that such failure or delay is due to causes beyond its reasonable control, including but not limited to acts of war, strikes or labour disputes, logistical problems caused by natural disasters, embargoes, government orders or any other force majeure event.

 

 

7.   Communication, SLA violation & escalation

 

7.1.        General communication

The following contacts will be generally used for communications related to the service in the scope of this SLA:

  • CSC Service Desk contact address
  • EUDAT service monitoring service
  • CSC contact for security issues
  • CSC contact for escalations
  • Customer contact for the service provider
  • Customer contact for security issues

Contacts are defined in Annex B. Contact information.

7.2.        SLA violations

CSC commits to inform the CUSTOMER, if this SLA is violated or violation is anticipated.  The message contain detailed information about what parts of the SLA were violated, when this violation occurred, and what kind of effects this have had to User experience. The message will also contain initial plan what will be done to ensure that SLA violations will not happen again.

The following rules are agreed for communication in the event of SLA violation:

            Customer contact for the service provider will be contacted by CSC by e-mail.

7.3 Escalation & complaints

CSC is committed to support high quality services. In case the incident has not been solved during the incident resolution time or there are other issues in the service prohibiting or disturbing normal usage incident escalation (or complaint) can be initiated by contacting CSC contact for escalations.

CSC contact for escalations is a person responsible of CSC’s EUDAT service production. If needed, he/she will work in collaboration with other EUDAT Service Providers involved in B2DROP service production. CSC contact for escalation contacts the customer directly, makes an analysis of the situation, makes a plan and schedule how the issue will be solved, and informs Customer about status of the escalation process. CSC contact for escalations will also keep EUDAT operations coordinator informed.

 

 

8.   Information security & data protection

 

8.1.        Information security

The following rules for information security and data protection apply:

8.2.        Personal Data

The parties recognize European General Data Protection Directive on protection personal data in their roles of Data Processor and Data Controller, and:

  • respect the rights of data subjects based on the responsibilities of the parties in such extent as personal data is in the Service
  • will protect the personal data according to best practices on of information security
  • will notify the other party and the supervising authority in case of a data breach
  • will not export the personal data to third countries without user consent

8.3.        Submitted data property

Data preservation by the EUDAT does not include or imply any transfer of ownership or immaterial property rights, unless otherwise agreed upon in writing.

The Customer is responsible for ascertaining that he is authorized to transfer the data, documents, or other content to EUDAT. This means the Customer has to secure the relevant permission from third parties, for example, from data producers, authors, and right holders.

9.   Additional responsibilities CSC

The CSC ensures:

  • that its actions, policies and procedures are compliant with local, national law, and EU regulations and rules;
  • that agreed processes for incident response are documented and acted upon.

 

10. Customer responsibilities

The CUSTOMER has to:

  • inform without delay CSC security officer about security incidents.

 

 

 

11.  Training and Documentation

 

11.1 Documentation

The following documentation of B2DROP service is available :

Document

URL

User documentation

https://eudat.eu/services/userdoc/b2drop

 

11.2 Training

EUDAT provide some hands-on material in order to support the customer in the B2DROP  service deployment and integration.

https://eudat.eu/b2drop-training-suite

 

12. Glossary of terms

For the purpose of this SLA, the following terms and definitions apply:

See Annex C: Glossary

 

 

 

13.  Document control

Document ID

[Unique document identifier]

Document title

Service Level Agreement for CSC EUDAT B2DROP service

Definitive storage location

 

Document owner

[Name of the person primarily responsible for maintaining and reviewing this document]

Version

0.98

Last date of change

2018-05-18

Next review due date

2019-01-31

Version & change tracking

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Annex A. EUDAT Service Providers

 

EUDAT services are provided by  EUDAT Service Providers listed below:

  • CSC-TIETEEN TIETOTEKNIIKAN KESKUS OY (CSC)                       
  • BARCELONA SUPERCOMPUTING CENTER - CENTRO NACIONAL DE SUPERCOMPUTACION (BSC)
  • CONSORZIO INTERUNIVERSITARIO CINECA (CINECA)
  • CINES (CINES)
  • THE UNIVERSITY OF EDINBURGH (UEDIN)
  • FORSCHUNGSZENTRUM JULICH GMBH (JUELICH)
  • INSTYTUT CHEMII BIOORGANICZNEJ POLSKIEJ AKADEMII NAUK (PSNC)
  •  SURFSARA BV (SURFsara)
  • UNINETT SIGMA AS (SIGMA)
  • SCIENCE AND TECHNOLOGY FACILITIES COUNCIL (STFC)
  • GREEK RESEARCH AND TECHNOLOGY NETWORK S.A. (GRNET)
  • KARLSRUHER INSTITUT FÜR TECHNOLOGIE (KIT)
  • MAX PLANCK COMPUTING AND DATA FACILITY (MPCDF)

 

These EUDAT Service Providers are contractually through Operational Level Agreements committed to provide high quality services for EUDAT and for CUSTOMERs.

The number of service providers may change. However, new service providers will commit to same level of service as existing EUDAT Service Providers.

 

 

 

 

Annex B. Contact information

 

Following table defines contact addresses:

 

CSC Service Desk contact address

servicedesk@csc.fi

EUDAT service monitoring service

http://avail.eudat.eu

CSC contact for security issues

CSC to provide

CSC contact for escalations

CSC to provide

Customer contact for the service provider

client to provide

Customer contact for security issues

 client to provide

 

 

 

 

 

 

Annex C. Glossary

Term

Explanation

B2DROP

Brand of the EUDAT Cloud Storage service

B2FIND

Brand of the EUDAT Joint Metadata Service

B2SAFE

Brand of the EUDAT Safe Replication Service

B2DROP

Brand of the EUDAT Simple Store Service

B2STAGE

Brand of the EUDAT Data Staging Service

CDI

EUDAT Collaborative Data Infrastructure

Customer

Organisation or part of an organisation that commissions EUDAT to receive one or more services, doing so on behalf of a number of users.

Data

Information received, preserved and communicated by EUDAT. They can include data and metadata.

Escalation

Change of responsibility for an event (such as an incident or problem) and / or activity to another individual or group

Note: This might be functional escalation (to someone with specific responsibility, competence or access to information / knowledge) or hierarchical escalation (to someone with a higher level of authority).

EUDAT Collaborative Data Infrastructure (CDI)

European e-infrastructure of integrated data services and resources to support research.

EUDAT Services Terms of Use

EUDAT Services Terms of Use document describes rules and policies that each user must follow when using EUDAT services. Link to document can be found from  https://eudat.eu/ page.

EUDAT Service Provider

Service providers that are contractually contractually through Operational Level Agreements committed to provide high quality IT services for EUDAT and for CUSTOMERs.

FitSM

Standard for lightweight service management in federated IT infrastructures

Incident

Unplanned disruption of operation in a service or Service Component, or degradation of service quality versus the expected or agreed service level or operational level according to service level agreements (SLAs), operational level agreements (OLAs) and underpinning agreements (UAs) with suppliers.

Incident resolution time

Incident resolution time defines the maximum time from the beginning of an incident to a time normal service level is restored.

Incident response time

Maximum time taken between the time a user  reports an Incident and the time that the Service Desk responds to that Incident.

ITSM

Information Technology Service Management

Key performance indicator (KPI)

Metric that is used to track the performance, effectiveness or efficiency of a service or process. Note: KPIs are generally important metrics that will be aligned to critical success factors and important goals. KPIs are therefore a subset of all possible metrics, intended to allow for monitoring and correcting/ improving the effectiveness and/or efficiency of a system or process.

Operational Level Agreements (OLA)

Operational Level Agreement between a Service Provider or federation member and another part of the service provider’s organisation or the Federation to provide a Service Component or subsidiary service needed to allow provision of services to Customers

Process

Structured set of activities, with clearly defined responsibilities, that bring about a specific objective or set of results from a set of defined inputs

Note: Generally, a process is a logical subdivision of a larger set of activities used to provide or manage services.

Resource Provider

An organizational instance that provides, maintains and operates processing, storage and network resources at a site.

Risk

Possible negative occurrence that would impact the service or service provider. Note: Risk is made up of the probability of the threat entailed, the vulnerability to that threat of some asset, and the impact the threat would have, if it occurred.

Role

Set of responsibilities, connected behaviours or actions collected into a logical unit that can be assigned to an individual, team or group. Note: An individual may have multiple roles.

Security incident

An event has noted that indicates that there has been an unauthorized access to data, applications, services, networks and/or devices by bypassing their underlying security mechanisms. Alternatively, known vulnerability and tools to utilize the vulnerability exist.

Service

A way to Provide Value to a User/CUSTOMER through bringing about results that they want to achieve.

Service Availability

Describes the time in a defined period the service was available, over the total possible available time, expressed as a percentage. It is calculated by dividing the time the system is operational in that period by the period itself and converting to a percentage (e.g. 325 days/ 365 days x 100 = 89%). Service availability is checked in 5 minute intervals.

Service Reliability

Describes the time in a defined period the service was available, over the total possible available time, expressed as a percentage. Predefined service breaks are excluded. Service availability is checked in 5 minute intervals.

Service Component

Technical or non-technical element that helps make up a service (e.g. a computer, a physical location, an authentication system, a software stack).

Service hours

An agreed time period when a particular Service should be Available.

Service Desk

A service desk is a communications center that provides a single point of contact (SPOC) between a EUDAT and its customers, employees and business partners.

Service Desk  Response Time

Target time for a Service Desk to respond to a service request.

Service Desk Resolution Time

Maximum time for a Service Desk to resolve  a service request.

Service Level Agreement (SLA)

Service Level Agreement between a CUSTOMER and EUDAT that specifies the service to be provided and the service targets that define how it will be provided.

Service Provider

Organisation or federation or part of an organisation or federation that manages and delivers a service or services to customers

Service report

Report that details the performance of a service versus the service targets detailed in service level agreements (SLAs).

Service Level Target

Reference / target values for parameters that are used to measure the performance of a service, and that are listed in a service level agreement (SLA) related to this service

User

Individual that primarily benefits from and uses a service.

Value

The benefit to a customer and their users delivered by a service

Note: Value should be considered as a composition of the utility (fitness for purpose) and warranty (fitness for use, covering sufficient availability / continuity, capacity / performance and information security) connected to a service.

 

 

 

 

Service Privacy Policy

Updated: 2018-06-15

 

  1. Name of the Service

 

CSC EUDAT B2Drop

  1. Registrar (data controller)

CSC - Finnish IT Сentre for Science Ltd

P.O. Box 405 (Keilaranta 14)

FI-02101 Espoo

tel. +358 9 457 2821 (operator)

servicedesk@csc.fi

 

Business ID: 0920632-0

www.csc.fi

(hereinafter referred to as "we" or "CSC"

  1. EUDAT community

This service is one of the services developed and maintained by EUDAT limited company (Y-tunnus) (together with EUDAT service providers.

In case a customer has a contract with CSC, CSC uses EUDAT limited company as a subcontractor. In case a customer has a contract with EUDAT limited company, CSC act as a subcontractor for EUDAT limited company.

  1. Contact person for register-related matters

CSC Service Desk

tel. 09 457 2821 (operator)

servicedesk@csc.fi

 

 Data Protection Officer Marita Pajulahti

privacy@csc.fi

  1. Name of register

CSC EUDAT B2Drop Service

  1. What data do we process?

The service holds and processes following personal data of customers or other registered persons:

  • Name
  • user ID

 

Following personal data may also have been retrieved from a remote identity provider, i.e. from EUDAT B2ACCESS:

  • your unique user identifier
  • your email address
  • your name
  • your unique user identifier in B2Access service
  • B2Access group membership information

 

In addition, we collect technical information like logfiles on the service activity.

  1. What are the legal bases and purpose for processing personal data?

The lawful basis for processing your data is either the performance of a contract

between you and CSC, or CSC’s legitimate interests based on the relationship between

you and CSC.

We process your personal data to

  • provide and improve our services,
  • perform our contractual obligations,
  • as a part of customer relationship

 

The personal data retrieved from remote identity provider is needed to map you to the local account, contact you and provide a comfortable interface.

  1. Cookies

Cookies are text files that are stored in a computer system via a web browser.

 

Many websites and servers use cookies. Many cookies contain a so-called cookie ID. A cookie ID is a unique identifier of the cookie. It consists of a character string through which Internet pages and servers can be assigned to the specific web browser in which the cookie was stored. This allows visited websites and servers to differentiate the individual browser of the data subject from other Internet browsers that contain other cookies. A specific web browser can be recognized and identified using the unique cookie ID.

 

The service needs cookies for its functionality. It would not be possible to determine whether a user is logged in or not without the use of cookies.

 

By means of a cookie, the information and offers on our service can be optimized with the user in mind. Cookies allow us, as previously mentioned, to recognize our service users. The purpose of this recognition is to make it easier for users to utilize our service. The service user that uses cookies, e.g. does not have to enter access data each time the service is accessed, because information whether or not user has logged in is stored in a cookie, and this cookie is stored on the user's computer system.

 

You may, at any time, prevent the setting of cookies through our service by means of a corresponding setting of the web browser used, and may thus permanently deny the setting of cookies. Furthermore, already set cookies may be deleted at any time via a web browser or other software programs. This is possible in all popular web browsers. If you deactivate the setting of cookies in the web browser used, not all functions of our service may be entirely usable.

  1. Where do we get the data from?

We acquire data primarily from the following sources

  • Data provided by the data subject
  • Data provided by the B2ACCESS service
  • Data from CSC Customer Registry

 

  1. To whom do we hand over and transfer the data, and do we transfer the data outside of the EU or ETA?

Upon request, we hand over the personal data for statistical and reporting purposes and for fulfilling our commitments and obligations contained in contracts or other agreements for Ministry of Education and Culture, Finnish institutions of higher education and research funders.

 

In addition, to enable EUDAT service management and development in EUDAT community, personnel data may be given to EUDAT limited company. EUDAT limited company may share the data among other EUDAT service providers.

 

Neither we nor EUDAT limited company transfer personal data outside of the EU/EEA.

  1. What are your rights as a data subject?

As a data subject, you have the right to inspect the data about yourself that has been saved into B2DROP and B2ACCESS services and to demand the correction of inaccurate data or its removal, provided that there is a legal justification for its removal. You also have the right to withdrawal your approval or change it.

 

As a data subject, you have the right under the General Data Protection Regulation (as of 25.5.2018) to oppose the collection of your data or to request that it be restricted and to make a complaint about the processing of personal data to the supervisory authority.

 

As a data subject, you also have the right, at any time and without cost, to oppose data-processing, wherever it relates to direct marketing.

  1. Who should I contact?

All enquiries and requests regarding this privacy policy should be made in writing or in person to the contact person specified in section four (4).

  1. Changes to privacy policy

If we make changes to this policy, we will make these accessible by updating this privacy policy document. If the changes are significant, we may inform people about these changes in some other way, such as by email or by publishing a notification on our webpage. We recommend that you visit our webpage regularly and pay attention to any changes to this privacy policy. 

 


  • No labels