— English (US)
Your system may not meet the requirements for Firefox, but you can try one of these versions:
Your system doesn't meet the requirements to run Firefox.
Please follow these instructions to install Firefox.
Get the only browser built for people, not profit.
When you find something you want to view later, put it in Pocket.
Internet Health is crucial for the world to thrive. A healthy Internet is one that is private, inclusive, and collaborative.
Participate and explore our latest innovations — technology built in the open and designed to help keep the Internet healthy.
We’re Mozilla, the proudly non-profit champions of a healthy Internet – keeping it open and accessible to all.
You can help Mozilla keep the Internet healthy – attend an event, volunteer, or make a donation.
Transparency is a key part of how Mozilla approaches user trust.
As an open source project that relies on open development, we build transparency into the way we write our code.
Additionally, our product documentation and notices describe how our products work and how we handle user data.
With this transparency in mind, we intend to publish bi-annual transparency reports that help provide additional transparency to government disclosures and takedown requests.
We report on Government Demands for User Data, Government Requests for Content Removal, and Copyright and Trademark Requests. We also include a Supplement, which provides additional information.
With each additional report that we publish, we’ll continue to reevaluate how we can be more transparent.
Mozilla requires valid Legal Process to compel the disclosure of Specific User data to the government; such as a legitimate and properly scoped court order, or a search warrant supported by probable cause and issued by an appropriate law enforcement authority.
We interpret requests narrowly, and we will oppose unlawful or overbroad requests for specific user data.
Recipients of National Security Requests can only publish reporting bands instead of specific figures.
If we receive such a request, we may challenge these reporting bands, in addition to opposing any unlawful or overbroad requests.
The law authorizes us to disclose information to governmental entities in emergencies and we may do so if we have a good faith belief that it is reasonably necessary to protect the rights, property or safety of people.
If we receive an Emergency Request, we require it to be certified in writing by a government officer describing the nature of the emergency and how the information requested might prevent the harm. Additionally, we may attempt to verify information before responding.
See here to read our process for handling reports of copyright infringement.
See here to read our process for handling reports of trademark infringement.
Sometimes companies are legally required to delay user notification, but we will notify impacted users after the required delay expires.
We don’t believe it is appropriate for the government to indefinitely delay a company from providing user notice and we will take steps to enforce this belief.
In some cases when we make a voluntary disclosure, we may choose to skip or delay notification if we have a good faith belief that it is reasonably necessary to protect the rights, property or safety of people.
Users are notified if we receive a Takedown Notice related to their submission on a Mozilla service.
We also try to publicly post copies of the Takedown Notices (with personal data redacted) to sites such as MozWiki and Lumen Database (formerly known as the Chilling Effects project).
This section of our report covers situations that don’t fit into our reporting categories.
For example, to the extent we are legally permitted, we may include voluntary disclosures as well as legal and policy activities that we engaged in during the reporting period to further government transparency.
Documentation that meets the counter notification requirements set forth here in response to a Takedown Notice.
An order issued by a judge or magistrate compelling a company to engage or refrain from certain action.
Pieces of information about a threat to a computer network or system, such as a vulnerability, piece of malicious code, or the IP address of an attacker. This definition is based on the Cybersecurity Information Sharing Act of 2015 (CISA); the full definition is at 6 U.S.C. § 1501(6).
A request from a government agency seeking information on an expedited basis in connection with an emergency, typically involving death or serious injury.
Examples of legal processes include: Emergency Request, Court Order, National Security Request, Pen Register Order, Search Warrant, Subpoena and Wiretap Order.