The following summary summarizes the types of data processed and the purposes of their processing and refers to the individuals concerned.
In the following, we share the legal basis of the General Data Protection Regulation (DSGVO), on the basis of which we process the personal data. Please note that in addition to the provisions of the DSGVO, the national data protection regulations may apply in your home or country of residence.
National data protection regulations in Germany: In addition to the data protection regulations of the General Data Protection Regulation, national data protection regulations apply in Germany. This includes in particular the law on the protection against misuse of personal data in data processing (Bundesdatenschutzgesetz - BDSG). In particular, the BDSG contains special rules on the right of access, the right of cancellation, the right to object, the processing of special categories of personal data, processing for other purposes and for transmission as well as automated decision-making in individual cases, including profiling. Furthermore, it regulates data processing for the purposes of the employment relationship (§ 26 BDSG), in particular with regard to the establishment, implementation or termination of employment relationships and the consent of employees. Furthermore, state data protection laws of the individual federal states can be applied.
We process data of our contract and business partners, e.g. Customers and prospects (collectively referred to as "contractors") in the context of contractual and comparable legal relationships and related measures and in the context of communication with the contractors (or pre-contractual), for example, to answer inquiries.
What data is required for the above purposes, we inform the contractors or in the context of data collection, e.g. in online forms, by special markings (for example colors) or symbols (for example asterisks or the like), or in person with.
We delete the data after expiration of legal warranty and comparable obligations, ie, basically after expiration of 4 years, unless the data are stored in a customer account, eg, as long as they have to be kept for legal reasons of archiving (eg for Tax purposes usually 10 years). Data that has been disclosed to us as part of an order by the contractor, we delete according to the specifications of the contract, in principle after the end of the contract.
Insofar as we use third-party providers or platforms to provide our services, the terms and conditions and privacy notices of the respective third-party providers or platforms apply in the relationship between the users and the providers.
Shop and E-Commerce: We process the data of our customers in order to enable them to select, purchase or order the selected products, goods and related services, as well as their payment and delivery or execution.
The required information is marked as such in the context of the order or comparable purchase process and includes the information required for delivery, or provision and billing as well as contact information in order to hold any consultation.
Artistic and literary services: We process the data of our clients in order to enable them to select, purchase or commission the services or works as well as associated activities as well as their payment and delivery or execution.
The required information is marked as such within the scope of the order, order or comparable contract conclusion and includes the information required for delivery and billing as well as contact information in order to be able to hold any consultations.
In the context of contractual and other legal relationships, due to legal obligations or otherwise based on our legitimate interests, we offer the persons concerned efficient and secure payment options and use besides banks and credit institutions other payment service providers (collectively "payment service providers").
For the payment transactions, the terms and conditions and the privacy notices of the respective payment service providers, which are available within the respective websites or transaction applications apply. We also refer to these for further information and assertion of rights of revocation, information and other data subjects.
Deployed services and service providers:
When contacting us (for example via contact form, e-mail, telephone or via social media), the details of the requesting persons are processed to the extent necessary to answer the contact requests and any requested action.
Responding to the contact requests in the context of contractual or pre-contractual relationships is to fulfill our contractual obligations or to answer (pre) contractual requests and otherwise on the basis of legitimate interests in answering the requests.
To provide our online offer securely and efficiently, we use the services of one or more web hosting providers whose servers (or servers managed by them) can access the online offer. For these purposes, we may use infrastructure and platform services, computing capacity, storage and database services, as well as security and technical maintenance services.
The data processed in the provision of the hosting offer may include all information relating to the use and communication of the users of our online offer. This includes, on a regular basis, the IP address necessary to deliver the content of online content to browsers, and all submissions made within our online offer or web pages.
E-mail delivery and hosting: The webhosting services we use also include the sending, receiving and saving of e-mails. For these purposes the addresses of the recipients as well as sender as well as further information concerning the e-mail dispatch (for example the participating providers) as well as the contents of the respective e-mails are processed. The aforementioned data may also be processed for purposes of SPAM detection. We ask you to note that e-mails on the Internet are generally not encrypted. As a rule, e-mails are encrypted on the transport route, but (if no so-called end-to-end encryption method is used) not on the servers from which they are sent and received. We can therefore take no responsibility for the transmission of emails between the sender and the reception on our server.
Collection of access data and log files: We ourselves (or our web hosting provider) collect data for every access to the server (so-called server log files). The server logfiles can contain the address and name of the retrieved web pages and files, the date and time of the retrieval, transferred data volumes, notification of successful retrieval, browser type and version, the user's operating system, referrer URL (the previously visited page) and, as a rule, IP addresses. Addresses and the requesting provider belong.
The server log files can be used for security purposes, for example, to avoid overloading the servers (especially in the case of abusive attacks, so-called DDoS attacks) and second, to ensure the utilization of the servers and their stability.
We send out newsletters, e-mails and other electronic notifications (hereinafter referred to as "newsletter") only with the consent of the recipient or a legal permission.Where in the context of an application to the newsletter whose contents are specifically described, they are for the consent of the users authoritative. Incidentally, our newsletter contains information about our services and us.
To subscribe to our newsletters, it is generally sufficient to provide your e-mail address. However, we may ask you to provide a name for personal address in the newsletter, or other information as required for the purpose of the newsletter.
Double-Opt-In-Procedure: Registration for our newsletter is basically done in a so-called Double-Opt-In-Procedure. This means that after signing up you will receive an e-mail asking you to confirm your registration. This confirmation is necessary so that nobody can register with external e-mail addresses. Registration for the newsletter will be logged in order to prove the registration process according to the legal requirements. This includes saving the login and confirmation times as well as the IP address. Likewise, changes to your data stored with the shipping service provider will be logged.
Deletion and Limitation of Processing: We may save the e-mail addresses discharged for up to three years on the basis of our legitimate interests, before we delete them, in order to be able to provide evidence of a previously given consent. The processing of this data is limited to the purpose of a possible defense against claims. An individual request for cancellation is possible at any time, provided that at the same time the former existence of a consent is confirmed. In the case of obligations to permanently observe contradictions, we reserve the sole purpose of storing the e-mail address for this purpose in a blacklist.
The logging of the registration process is based on our legitimate interests for the purpose of proving its proper course. Insofar as we commission a service provider with the dispatch of e-mails, this is done on the basis of our legitimate interests in an efficient and secure shipping system.
Legal notice: The distribution of the newsletter is based on the consent of the recipient or, if consent is not required, on the basis of our legitimate interests in direct marketing, if and insofar as this is legally required, e.g. in the case of existing customer advertising. Insofar as we entrust a service provider with the sending of e-mails, this is done on the basis of our legitimate interests. The registration process is recorded on the basis of our legitimate interests in order to prove that it has been performed in accordance with the law.
Information about us, new publications, our services and offers.
Measuring success: The newsletters contain a so-called "web-beacon", ie a pixel-sized file that is retrieved from the server when the newsletter is opened, or, if we use a shipping service provider, from its server Information such as information about the browser and your system, as well as your IP address and the time of retrieval, collected.
This information is used to improve the technicality of our newsletter based on the technical data or the target groups and their reading habits, based on their retrieval locations (which can be determined using the IP address) or access times. This analysis also includes determining if the newsletters are opened, when they are opened, and which links are clicked. For technical reasons, this information can be assigned to the individual newsletter recipients. However, it is neither our goal nor, if used, that of the shipping service provider to observe individual users. The evaluations serve to recognize the reading habits of our users and to adapt our content to them or to send different content according to the interests of our users.
The evaluation of the newsletter and the performance measurement are made, subject to the express consent of the users, on the basis of our legitimate interests for the purpose of using a user-friendly and secure newsletter system which serves both our business interests and the expectations of the users.
A separate revocation of the performance measurement is unfortunately not possible, in this case, the entire newsletter subscription must be terminated, or it must be contradicted.
Deployed services and service providers:
We incorporate functionality and content into our online offering sourced from their respective vendors' servers (hereafter referred to as "third party vendors"), such as graphics, videos, social media buttons, and posts (hereafter referred to as "third party") uniformly referred to as "content").
The integration always requires that the third-party providers of this content process the IP address of the users, since they would not be able to send the content to their browser without the IP address. The IP address is therefore required for the presentation of these contents or functions. We endeavor to use only those content whose respective providers use the IP address only for the delivery of the content. Third parties may also use so-called pixel tags (invisible graphics, also referred to as "web beacons") for statistical or marketing purposes. The "pixel tags" can be used to evaluate information such as visitor traffic on the pages of this website. The pseudonymous information may also be stored in cookies on the user's device and may include, but is not limited to, technical information about the browser and the operating system, websites to be referenced, time of visit, and other information regarding the use of our online offer.
Deployed services and service providers:
As DSPRO interested parties, you are entitled to various rights, in particular from Articles 15 to 18 and 21 DS-GVO: