One small point that might make you rethink your diagram (great idea to do it as a flowchart BTW);
Your flowcharts contains the terms "Incoming - to and from your PC - requested" and "Outgoing - from and to your PC - requested".
The terms "incoming" and outgoing", in a firewall context, refer to the originiating point in any data exchange, relative to your PC.
When your PC requests, for example, a web site, your PC is starting the "conversation" with the web server that contains the web page. Since your PC is the originating point of the conversation, this is normally considered an outbound connection, as the first bit was outbound from your PC. The replies that come back from the web server are assumed, as they are seen as a valid response to your valid outbound request.
If, on the other hand, someone out there on the internet tries to contact your PC (pinging or port scanning your IP address, for example) without your PC requesting the contact, since they are the originating point in the conversation, this is usually termed an inbound request. Because your PC didn't ask for the contact, this can also be called an inbound unsolicited request.
As a rule, inbound unsolicited requests are BAD!! Very bad! There, therefore, needs to be a rule in your firewall that blocks these.