Data Privacy Statement
Introduction and overview
We have written this data protection declaration (version 07.10.2022-112202283) in order to explain to you in accordance with the provisions of the General Data Protection Regulation (EU) 2016/679 and applicable national laws which personal data (data for short) we as the person responsible – and that of processors commissioned by us (e.g. providers) – process, will process in the future and what legal options you have. The terms used are to be understood as gender-neutral.
In short: We inform you comprehensively about data that we process about you.
Privacy statements usually sound very technical and use legal jargon. This data protection declaration, on the other hand, is intended to describe the most important things as simply and transparently as possible. As far as transparency is conducive, technical terms are explained in a reader-friendly way , links to further information and graphics are providedput to use. We are thus informing you in clear and simple language that we only process personal data in the course of our business activities if there is a corresponding legal basis. This is certainly not possible if you make the most concise, unclear and legal-technical statements possible, as they are often standard on the Internet when it comes to data protection. I hope that you find the following explanations interesting and informative and that you may find some information that you did not already know.
If you still have questions, we would like to ask you to contact the responsible person named below or in the imprint, to follow the links provided and to look at further information on third-party websites. Our contact details can of course also be found in the imprint.
scope of application
- all online presences (websites, online shops) that we operate
- Social media appearances and email communication
- mobile apps for smartphones and other devices
In short: The data protection declaration applies to all areas in which personal data is processed in a structured manner in the company via the channels mentioned. If we enter into legal relationships with you outside of these channels, we will inform you separately if necessary.
In the following data protection declaration, we provide you with transparent information on the legal principles and regulations, i.e. the legal basis of the General Data Protection Regulation, which enable us to process personal data.
As far as EU law is concerned, we refer to REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of April 27, 2016. You can of course read this EU General Data Protection Regulation online on EUR-Lex, the gateway to the EU -Legal, see https://eur-lex.europa.eu/legal-content/DE/ALL/?uri=celex%3A32016R0679 .
We only process your data if at least one of the following conditions applies:
- Consent (Article 6 Paragraph 1 lit. a GDPR): You have given us your consent to process data for a specific purpose. An example would be storing the data you entered on a contact form.
- Contract (Article 6 Paragraph 1 lit. b GDPR): In order to fulfill a contract or pre-contractual obligations with you, we process your data. For example, if we conclude a sales contract with you, we need personal information in advance.
- Legal obligation (Article 6 paragraph 1 lit. c GDPR): If we are subject to a legal obligation, we process your data. For example, we are required by law to keep invoices for accounting purposes. These usually contain personal data.
- Legitimate interests (Article 6 Paragraph 1 lit. f GDPR): In the case of legitimate interests that do not restrict your fundamental rights, we reserve the right to process personal data. For example, we need to process certain data in order to be able to operate our website securely and economically. This processing is therefore a legitimate interest.
Other conditions such as the perception of recordings in the public interest and the exercise of public authority as well as the protection of vital interests do not usually apply to us. If such a legal basis should be relevant, it will be shown in the appropriate place.
In addition to the EU regulation, national laws also apply:
- In Austria , this is the federal law for the protection of natural persons with regard to the processing of personal data ( Data Protection Act ), DSG for short .
- In Germany , the Federal Data Protection Act , BDSG for short, applies .
If other regional or national laws apply, we will inform you about them in the following sections.
Contact details of the person responsible
If you have any questions about data protection or the processing of personal data, you will find the contact details of the person or body responsible below:
The fact that we only store personal data for as long as is absolutely necessary for the provision of our services and products is a general criterion for us. This means that we delete personal data as soon as the reason for the data processing no longer exists. In some cases, we are legally obliged to store certain data even after the original purpose has ceased to exist, for example for accounting purposes.
If you wish your data to be deleted or revoke your consent to data processing, the data will be deleted as quickly as possible and provided there is no obligation to store it.
We will inform you below about the specific duration of the respective data processing, provided that we have further information on this.
Rights under the General Data Protection Regulation
In accordance with Articles 13 and 14 GDPR, we inform you about the following rights to which you are entitled so that data is processed fairly and transparently:
- According to Article 15 GDPR, you have a right to information as to whether we are processing your data. If this is the case, you have the right to receive a copy of the data and to be informed of the following information:
- for what purpose we carry out the processing;
- the categories, i.e. the types of data that are processed;
- who receives this data and if the data is transferred to third countries, how security can be guaranteed;
- how long the data is stored;
- the existence of the right to rectification, erasure or restriction of processing and the right to object to processing;
- that you can complain to a supervisory authority (links to these authorities can be found below);
- the origin of the data if we did not collect it from you;
- whether profiling is carried out, i.e. whether data is automatically evaluated in order to create a personal profile for you.
- According to Article 16 GDPR, you have the right to have the data corrected, which means that we have to correct data if you find any errors.
- According to Article 17 GDPR, you have the right to erasure (“right to be forgotten”), which specifically means that you can request the erasure of your data.
- According to Article 18 GDPR, you have the right to restriction of processing, which means that we may only store the data but not use it further.
- According to Article 20 GDPR, you have the right to data portability, which means that we can provide you with your data in a common format upon request.
- According to Article 21 GDPR, you have a right of objection, which, after enforcement, will result in a change in processing.
- If the processing of your data is based on Article 6 Paragraph 1 Letter e (public interest, exercise of official authority) or Article 6 Paragraph 1 Letter f (legitimate interest), you can object to the processing. We will then check as quickly as possible whether we can legally comply with this objection.
- If data is used to operate direct advertising, you can object to this type of data processing at any time. We may no longer use your data for direct marketing after this.
- If data is used to operate profiling, you can object to this type of data processing at any time. We may no longer use your data for profiling after this.
- According to Article 22 GDPR, you may have the right not to be subject to a decision based solely on automated processing (e.g. profiling).
- According to Article 77 GDPR, you have the right to lodge a complaint. This means that you can complain to the data protection authority at any time if you believe that the processing of personal data violates the GDPR.
In short: you have rights – do not hesitate to contact the responsible person listed above!
If you believe that the processing of your data violates data protection law or your data protection rights have been violated in any other way, you can complain to the supervisory authority. This is the data protection authority for Austria, whose website can be found at https://www.dsb.gv.at/ . In Germany there is a data protection officer for each federal state. For more information, you can contact the Federal Commissioner for Data Protection and Freedom of Information (BfDI) . The following local data protection authority is responsible for our company:
Austria Data Protection Authority
Data transfer to third countries
We only transfer or process data to countries outside the EU (third countries) if you agree to this processing, if this is required by law or is contractually necessary and in any case only to the extent that this is generally permitted. In most cases, your consent is the most important reason that we have data processed in third countries. The processing of personal data in third countries such as the USA, where many software manufacturers offer services and have their server locations, may mean that personal data is processed and stored in unexpected ways.
We expressly point out that, according to the European Court of Justice, there is currently no adequate level of protection for data transfer to the USA. Data processing by US services (such as Google Analytics) may result in data not being processed and stored anonymously. In addition, US government authorities may have access to individual data. In addition, it may happen that collected data is linked to data from other services from the same provider, provided you have a corresponding user account. If possible, we try to use server locations within the EU, if this is offered.
We will inform you in more detail about data transfer to third countries at the appropriate points in this data protection declaration, if this applies.
security of data processing
In order to protect personal data, we have implemented both technical and organizational measures. Where possible, we encrypt or pseudonymise personal data. In this way, we make it as difficult as possible for third parties to infer personal information from our data.
Art. 25 GDPR speaks here of “data protection through technology design and through data protection-friendly default settings” and means that one always thinks of security and corresponding security both with software (e.g. forms) and hardware (e.g. access to the server room). measures. If necessary, we will go into specific measures below.
TLS encryption with https
TLS, encryption and https all sound very technical and they are. We use HTTPS (the Hypertext Transfer Protocol Secure stands for “secure hypertext transfer protocol”) to transmit data securely on the Internet.
This means that the complete transmission of all data from your browser to our web server is secured – nobody can “eavesdrop”.
We have thus introduced an additional security layer and comply with data protection through technology design ( Article 25 Paragraph 1 GDPR ). By using TLS (Transport Layer Security), an encryption protocol for secure data transmission on the Internet, we can ensure the protection of confidential data.
You can recognize the use of this protection for data transmission by the small lock symbol in the top left of the browser, to the left of the Internet address (e.g. examplepage.de) and the use of the https scheme (instead of http) as part of our Internet address.
If you want to know more about encryption, we recommend a Google search for “Hypertext Transfer Protocol Secure wiki” to get good links to further information.
👥 Affected: Anyone who communicates with us by phone, email or online form
📓 Processed data: e.g. B. Telephone number, name, e-mail address, entered form data. You can find more details on this under the type of contact used in each case
🤝 Purpose: Processing of communication with customers, business partners, etc.
📅 Duration of storage: Duration of the business case and the statutory provisions
⚖️ Legal basis: Art. 6 (1) lit. a GDPR (consent), Art Article 6 (1) (b) GDPR (contract), Article 6 (1) (f) GDPR (legitimate interests)
If you contact us and communicate by telephone, e-mail or online form, personal data may be processed.
The data will be processed for the handling and processing of your question and the related business transaction. The data is stored for as long as the law requires.
All those who seek contact with us via the communication channels provided by us are affected by the processes mentioned.
If you call us, the call data will be stored pseudonymously on the respective end device and with the telecommunications provider used. In addition, data such as name and telephone number can then be sent by e-mail and saved to answer enquiries. The data will be deleted as soon as the business case has ended and legal requirements permit.
If you communicate with us by e-mail, data may be stored on the respective end device (computer, laptop, smartphone,…) and data is stored on the e-mail server. The data will be deleted as soon as the business case has ended and legal requirements permit.
If you communicate with us using an online form, data will be stored on our web server and, if necessary, forwarded to an e-mail address from us. The data will be deleted as soon as the business case has ended and legal requirements permit.
The processing of the data is based on the following legal bases:
- Article 6 paragraph 1 lit.
- Article 6(1)(b) GDPR (contract): There is a need to fulfill a contract with you or a processor, e.g. B. the telephone provider or we need the data for pre-contractual activities, such. B. the preparation of an offer, process;
- Article 6 paragraph 1 lit. f GDPR (legitimate interests): We want to conduct customer inquiries and business communication in a professional framework. These are certain technical facilities such. E-mail programs, exchange servers and mobile phone operators are necessary in order to be able to communicate efficiently.
👥 Affected: Website visitors
🤝 Purpose: depends on the specific cookie. More details can be found below or from the manufacturer of the software that sets the cookie.
📓 Processed data: Depending on the cookie used. More details can be found below or from the manufacturer of the software that sets the cookie.
📅 Duration of storage: depending on the respective cookie, can vary from hours to years
⚖️ Legal basis: Article 6 (1) (a) GDPR (consent), Article 6 (1) (f) GDPR (legitimate interests)
What are cookies?
Our website uses HTTP cookies to store user-specific data.
In the following we explain what cookies are and why they are used so that you can better understand the following data protection declaration.
Whenever you surf the Internet, you use a browser. Well-known browsers include Chrome, Safari, Firefox, Internet Explorer and Microsoft Edge. Most websites store small text files in your browser. These files are called cookies.
Cookies store certain user data from you, such as language or personal page settings. When you visit our site again, your browser transmits the “user-related” information back to our site. Thanks to cookies, our website knows who you are and offers you the settings you are used to. In some browsers each cookie has its own file, in others such as Firefox all cookies are stored in a single file.
The graphic below shows a possible interaction between a web browser such as B. Chrome and the web server. The web browser requests a website and receives a cookie from the server, which the browser uses again as soon as another page is requested.
There are both first-party cookies and third-party cookies. First-party cookies are created directly by our site, third-party cookies are created by partner websites (e.g. Google Analytics). Each cookie must be evaluated individually, since each cookie stores different data. The expiry time of a cookie also varies from a few minutes to a few years. Cookies are not software programs and do not contain viruses, Trojans or other “pests”. Cookies also cannot access information on your PC.
For example, cookie data can look like this:
Value: GA1.2.1326744211.152112202283-9 Purpose
: Differentiation of website visitors Expiry
date: after 2 years
A browser should be able to support these minimum sizes:
- At least 4096 bytes per cookie
- At least 50 cookies per domain
- At least 3000 cookies in total
What types of cookies are there?
The question of which cookies we use in particular depends on the services used and is clarified in the following sections of the data protection declaration. At this point we would like to briefly discuss the different types of HTTP cookies.
There are 4 types of cookies:
These cookies are necessary to ensure basic functions of the website. For example, these cookies are needed if a user puts a product in the shopping cart, then continues surfing on other pages and only goes to the checkout later. These cookies do not delete the shopping cart, even if the user closes their browser window.
These cookies collect information about user behavior and whether the user receives any error messages. In addition, these cookies are also used to measure the loading time and behavior of the website in different browsers.
These cookies ensure a better user experience. For example, entered locations, font sizes or form data are saved.
These cookies are also called targeting cookies. They are used to provide the user with individually tailored advertising. This can be very useful, but also very annoying.
Usually, when you visit a website for the first time, you will be asked which of these types of cookies you would like to allow. And of course this decision is also stored in a cookie.
If you want to know more about cookies and are not afraid of technical documentation, we recommend https://datatracker.ietf.org/doc/html/rfc6265 , the Internet Engineering Task Force (IETF) Request for Comments called “HTTP State Management Mechanism” .
Purpose of processing via cookies
The purpose ultimately depends on the respective cookie. More details can be found below or from the manufacturer of the software that sets the cookie.
Which data are processed?
Cookies are little helpers for many different tasks. Unfortunately, it is not possible to generalize which data is stored in cookies, but we will inform you about the processed or stored data in the following data protection declaration.
Storage duration of cookies
The storage period depends on the respective cookie and is specified below. Some cookies are deleted after less than an hour, others can remain stored on a computer for several years.
You can also influence the storage period yourself. You can manually delete all cookies at any time via your browser (see also “Right of objection” below). Furthermore, cookies that are based on consent will be deleted at the latest after you withdraw your consent, whereby the legality of storage remains unaffected until then.
Right to object – how can I delete cookies?
If you want to find out which cookies have been stored in your browser, if you want to change or delete cookie settings, you can find this in your browser settings:
If you generally do not want any cookies, you can set up your browser so that it always informs you when a cookie is to be set. You can decide for each individual cookie whether you allow the cookie or not. The procedure differs depending on the browser. It is best to look for the instructions in Google with the search term “Delete cookies Chrome” or “Deactivate cookies Chrome” in the case of a Chrome browser.
The so-called “Cookie Guidelines” have been in place since 2009. It states that the storage of cookies requires your consent (Article 6 (1) (a) GDPR). Within the EU countries, however, there are still very different reactions to these directives. In Austria, however, this directive was implemented in Section 96 (3) of the Telecommunications Act (TKG). In Germany, the cookie guidelines have not been implemented as national law. Instead, this guideline was largely implemented in Section 15 (3) of the Telemedia Act (TMG).
For cookies that are absolutely necessary, even if no consent has been given, there are legitimate interests (Article 6 Para. 1 lit. f GDPR), which in most cases are of an economic nature. We want to provide visitors to our website with a pleasant user experience and certain cookies are often strictly necessary for this.
If cookies that are not absolutely necessary are used, this will only happen with your consent. In this respect, the legal basis is Article 6 (1) (a) GDPR.
Web Hosting Introduction
|Web hosting summary
👥 Affected: Website visitors
🤝 Purpose: professional hosting of the website and securing operations
📓 Processed data: IP address, time of website visit, browser used and other data. More details can be found below or from the web hosting provider used.
📅 Duration of storage: depends on the respective provider, but usually 2 weeks
⚖️ Legal basis: Art. 6 Para. 1 lit.f GDPR (legitimate interests)
What is web hosting?
When you visit websites today, certain information – including personal data – is automatically created and stored, including on this website. This data should be processed as sparingly as possible and only with justification. By the way, by website we mean the entirety of all web pages on a domain, ie everything from the start page (home page) to the very last sub-page (like this one). By domain we mean, for example, example.de or example.com.
When you want to view a website on a computer, tablet, or smartphone, you use a program called a web browser to do so. You probably know a few web browsers by name: Google Chrome, Microsoft Edge, Mozilla Firefox, and Apple Safari. We call it browser or web browser for short.
To view the website, the browser needs to connect to another computer where the website’s code is stored: the web server. The operation of a web server is a complicated and time-consuming task, which is why this is usually taken on by professional providers, the providers. These offer web hosting and thus ensure reliable and error-free storage of website data. A whole lot of jargon, but please stay tuned, it gets even better!
Personal data may be processed when the browser on your computer (desktop, laptop, tablet or smartphone) connects and during data transfer to and from the web server. On the one hand, your computer stores data, on the other hand, the web server also has to store data for a period of time in order to ensure proper operation.
A picture says more than a thousand words, so the following graphic shows the interaction between the browser, the Internet and the hosting provider.
Why do we process personal data?
The purposes of data processing are:
- Professional website hosting and operation security
- to maintain operational and IT security
- Anonymous evaluation of access behavior to improve our offer and, if necessary, for criminal prosecution or the pursuit of claims
Which data are processed?
Even while you are visiting our website, our web server, which is the computer on which this website is stored, usually automatically saves data such as
- the complete internet address (URL) of the accessed website
- Browser and browser version (e.g. Chrome 87)
- the operating system used (e.g. Windows 10)
- the address (URL) of the previously visited page (referrer URL) (e.g. https://www.beispielquellsite.de/vondabinichkommen/ )
- the hostname and IP address of the device being accessed from (e.g. COMPUTERNAME and 184.108.40.206)
- Date and Time
- in files, the so-called web server log files
How long is data stored?
As a rule, the above data is stored for two weeks and then automatically deleted. We do not pass on this data, but we cannot rule out that this data will be viewed by authorities in the event of illegal behavior.
In short: your visit is logged by our provider (company that runs our website on special computers (servers)), but we do not pass on your data without your consent!
The legality of the processing of personal data in the context of web hosting results from Art. 6 Para. 1 lit. f GDPR (protection of legitimate interests), because the use of professional hosting with a provider is necessary to make the company safe and user-friendly on the Internet present and to be able to pursue attacks and claims from this if necessary.
There is usually a contract between us and the hosting provider for order processing in accordance with Art. 28 f. GDPR, which ensures compliance with data protection and guarantees data security.
Web hosting provider external data protection declaration
Below you will find the contact details of our external hosting provider, where you can find out more about data processing, in addition to the information above:
World4You Internet Services GmbH
You can find out more about data processing at this provider in the data protection declaration .
We use World4You for our website , including a web hosting provider. Service provider is the Austrian company World4You Internet Services GmbH, Hafenstrasse 35, 4020 Linz, Austria. You can find out more about the data processed by using World4You in the data protection declaration at https://www.world4you.com/de/unternehmen/datenschutzerklaerung.html .
Cookie Consent Management Platform Introduction
|Cookie Consent Management Platform Summary
👥 Affected: Website visitor
🤝 Purpose: Obtaining and managing consent to certain cookies and thus the use of certain tools
📓 Processed data: Data for managing the cookie settings such as IP address, time of consent, type of consent, individual consents. You can find more details on this for the tool used in each case.
📅 Duration of storage: Depends on the tool used, you have to be prepared for periods of several years
⚖️ Legal basis: Art. 6 (1) lit. a GDPR (consent), Art. 6 (1) lit.f GDPR (legitimate interests)
What is a Cookie Consent Management Platform?
We use Consent Management Platform (CMP) software on our website, which makes it easier for us and you to handle the scripts and cookies used correctly and securely. The software automatically creates a cookie pop-up, scans and controls all scripts and cookies, offers you cookie consent required by data protection law and helps us and you to keep track of all cookies. Most cookie consent management tools identify and categorize all existing cookies. As a website visitor, you then decide for yourself whether and which scripts and cookies you want to allow or not. The following graphic shows the relationship between browser, web server and CMP.
Why do we use a cookie management tool?
Our goal is to offer you the best possible transparency in the area of data protection. We are also legally obliged to do so. We want to inform you as well as possible about all tools and all cookies that can store and process data from you. It is also your right to decide which cookies you accept and which you do not. In order to grant you this right, we first need to know exactly which cookies landed on our website in the first place. Thanks to a cookie management tool, which regularly scans the website for all existing cookies, we know about all cookies and can provide you with GDPR-compliant information about them. You can then accept or reject cookies via the consent system.
Which data are processed?
As part of our cookie management tool, you can manage each individual cookie yourself and have complete control over the storage and processing of your data. The declaration of your consent will be saved so that we do not have to ask you each time you visit our website and we can also prove your consent if required by law. This is stored either in an opt-in cookie or on a server. Depending on the provider of the cookie management tool, the storage period of your cookie consent varies. This data (e.g. pseudonymous user ID, time of consent, detailed information on the cookie categories or tools, browser, device information) is usually stored for up to two years.
Duration of data processing
We will inform you below about the duration of data processing if we have further information on this. In general, we only process personal data for as long as is absolutely necessary for the provision of our services and products. Data stored in cookies are stored for different lengths of time. Some cookies are already deleted after leaving the website, others can be stored in your browser for several years. The exact duration of the data processing depends on the tool used, in most cases you should be prepared for a storage period of several years. In the respective data protection declarations of the individual providers you will usually receive precise information about the duration of the data processing.
Right to object
Information on special cookie management tools, if available, can be found in the following sections.
Security & Anti Spam
👥 Affected: Website visitors
🤝 Purpose: Cyber security
📓 Processed data: Data such as your IP address, name or technical data such as browser version
You can find more details on this below and in the individual data protection texts.
📅 Duration of storage: in most cases, the data is stored until it is no longer required to provide the service
⚖️ Legal basis: Article 6(1)(a) GDPR (consent), Article 6(1)(f) GDPR (legitimate interests )
What is security & anti-spam software?
With so-called security & anti-spam software, you can protect yourself and us from various spam or phishing e-mails and possible other cyber attacks. Spam is understood to be advertising emails from a mass mailing that you did not ask for yourself. Such mails are also called data garbage and can also cause costs. Phishing emails, on the other hand, are messages that aim to build trust via fake messages or websites in order to obtain personal information. Anti-spam software usually protects against unwanted spam messages or malicious emails that could inject viruses into our system. We also use general firewall and security systems that protect our computers from unwanted network attacks.
Why do we use security & anti-spam software?
We attach great importance to security on our website. After all, it’s not just about our safety, it’s also about your safety. Unfortunately, cyber threats are now part of everyday life in the world of IT and the Internet. Hackers often try to steal personal data from an IT system with the help of a cyber attack. And therefore a good defense system is absolutely necessary. A security system monitors all incoming and outgoing connections to our network or computer. In order to achieve even greater security against cyber attacks, we also use other external security services in addition to the standardized security systems on our computer. Unauthorized traffic of data is thus better prevented and this is how we protect ourselves from cybercrime.
Which data is processed by security & anti-spam software?
Which data is collected and stored depends of course on the respective service. However, we always try to only use programs that collect data very sparingly or only store data that is necessary for the fulfillment of the service offered. In principle, the service can store data such as name, address, IP address, e-mail address and technical data such as browser type or browser version. Any performance and log data can also be collected in order to identify possible incoming threats in good time. This data will be processed as part of the Services and in compliance with applicable laws. This also includes the GDPR for US providers (via the standard contractual clauses). In some cases, these security services also work together with third-party providers, who may store and/or process data under instructions and in accordance with privacy policies and other security measures. Data is usually stored using cookies.
Duration of data processing
We will inform you below about the duration of data processing if we have further information on this. For example, security programs store data until you or we revoke data storage. In general, personal data is only stored for as long as is absolutely necessary for the provision of the services. Unfortunately, in many cases we do not have precise information from the providers about the length of storage.
Right to object
Since cookies can also be used with such security services, we recommend our general data protection declaration on cookies. To find out exactly what data is stored and processed by you, you should read the data protection declarations of the respective tools.
We use the security services mainly on the basis of our legitimate interests (Art. 6 Para. 1 lit. f GDPR) in a good security system against various cyber attacks.
You can find information on special tools – if available – in the following sections.
Web design introduction
👥 Data subjects: Website visitors
🤝 Purpose: Improving the user experience
📓 Data processed: The data processed depends heavily on the services used. Usually it is about IP address, technical data, language settings, browser version, screen resolution and name of the browser. More details can be found in the web design tools used.
📅 Duration of storage: depends on the tools used
⚖️ Legal bases: Article 6 (1) (a) GDPR (consent), Article 6 (1) (f) GDPR (legitimate interests)
What is web design?
We use various tools on our website that serve our web design. Web design is not just about making our website look pretty, as is often assumed, but also about functionality and performance. But of course the right look of a website is also one of the major goals of professional web design. Web design is a part of media design and deals with the visual as well as the structural and functional design of a website. The aim is to improve your experience on our website with the help of web design. In web design jargon, one speaks of user experience (UX) and usability in this context. User experience is understood to mean all impressions and experiences that the website visitor experiences on a website. A sub-point of the user experience is usability. This is about the user-friendliness of a website. Above all, value is placed on the fact that content, subpages or products are clearly structured and that you can find what you are looking for quickly and easily. In order to offer you the best possible experience on our website, we also use so-called third-party web design tools. In this data protection declaration, all services that improve the design of our website fall under the category “web design”. This can be, for example, fonts, various plugins or other integrated web design functions. we also use so-called web design tools from third parties. In this data protection declaration, all services that improve the design of our website fall under the category “web design”. This can be, for example, fonts, various plugins or other integrated web design functions. we also use so-called web design tools from third parties. In this data protection declaration, all services that improve the design of our website fall under the category “web design”. This can be, for example, fonts, various plugins or other integrated web design functions.
Why do we use web design tools?
How you absorb information on a website depends very much on the structure, functionality and visual perception of the website. Therefore, a good and professional web design became more and more important for us. We are constantly working on improving our website and see this as an extended service for you as a website visitor. Furthermore, a beautiful and functioning website also has economic advantages for us. After all, you will only visit us and take advantage of our offers if you feel completely at ease.
What data is stored by web design tools?
When you visit our website, web design elements can be integrated into our pages, which can also process data. Which data is exactly depends on the tools used, of course. Below you can see exactly which tools we use for our website. For more information about data processing, we recommend that you also read the respective data protection declaration of the tools used. You can usually find out there which data is processed, whether cookies are used and how long the data is stored. Fonts such as Google Fonts also automatically transmit information such as language settings, IP address, browser version, browser screen resolution and browser name to the Google servers.
Duration of data processing
How long data is processed is very individual and depends on the web design elements used. For example, when cookies are used, the retention period can be as little as a minute, but it can also be a few years. Please be smart about this. On the one hand, we recommend our general text section on cookies and the data protection declarations of the tools used. There you can usually find out exactly which cookies are used and what information is stored in them. For example, Google Font files are stored for one year. This is to improve the loading time of a website. In principle, data is only kept for as long as is necessary to provide the service. In the case of legal requirements, data can also be stored for longer.
Right to object
If you have consented to the use of web design tools, the legal basis for the relevant data processing is this consent. According to Art. 6 Para. 1 lit. a GDPR (consent), this consent represents the legal basis for the processing of personal data, as it can occur when it is collected by web design tools. We also have a legitimate interest in web design to improve on our website. After all, only then can we provide you with a beautiful and professional web offer. The corresponding legal basis for this is Article 6 (1) (f) GDPR (legitimate interests). However, we only use web design tools if you have given your consent. We definitely want to emphasize that again.
Information on special web design tools – if available – can be found in the following sections.
On our website we use Google Fonts from Google Inc. The company Google Ireland Limited (Gordon House, Barrow Street Dublin 4, Ireland) is responsible for the European area. We have integrated the Google fonts locally, ie on our web server – not on Google’s servers. As a result, there is no connection to Google servers and therefore no data transmission or storage.
What are Google Fonts?
Google Fonts used to be called Google Web Fonts. This is an interactive directory of over 800 fonts that Google provides for free. With Google Fonts, you could use fonts without uploading them to your own server. However, in order to prevent any transfer of information to Google servers in this regard, we have downloaded the fonts to our server. In this way, we act in compliance with data protection and do not send any data to Google Fonts.
Explanation of terms used
Definition according to Article 4 of the GDPR
For the purposes of this Regulation, the term means:
“Consent” of the data subject means any voluntary, informed and unequivocal expression of will in the specific case, in the form of a declaration or other clear affirmative action, with which the data subject indicates that they have consented to the processing of their personal data agrees;
Explanation: As a rule, such consent is given on websites via a cookie consent tool. I’m sure you know that. Whenever you visit a website for the first time, you will usually be asked via a banner whether you agree or consent to the data processing. You can usually also make individual settings and thus decide for yourself which data processing you allow and which not. If you do not give your consent, no personal data may be processed. In principle, consent can of course also be given in writing, i.e. not via a tool.
Definition according to Article 4 of the GDPR
For the purposes of this Regulation, the term means:
“personal data” means any information relating to an identified or identifiable natural person (hereinafter “data subject”); an identifiable natural person is one who, directly or indirectly, in particular by association with an identifier such as a name, an identification number, location data, an online identifier or one or more special features, expresses the physical, physiological, genetic, psychological, economic, cultural or social identity of this natural person can be identified;
Explanation: Personal data is all data that can identify you as a person. This is usually data such as:
- E-mail address
- postal address
- phone number
- Date of birth
- Identification numbers such as social security number, tax identification number, ID card number or matriculation number
- Bank data such as account number, credit information, account balances and much more.
According to the European Court of Justice (ECJ), your IP address is also considered personal data . IT experts can use your IP address to determine at least the approximate location of your device and subsequently you as the connection owner. Therefore, storing an IP address also requires a legal basis within the meaning of the GDPR. There are also so-called “special categories” of personal data, which are also particularly worthy of protection. These include:
- racial and ethnic origin
- political opinions
- religious or ideological beliefs
- union membership
- genetic data such as data obtained from blood or saliva samples
- Biometric data (this is information about psychological, physical or behavioral characteristics that can identify a person).
- Data related to sexual orientation or sex life
Definition according to Article 4 of the GDPR
For the purposes of this Regulation, the term means:
“Profiling” any type of automated processing of personal data, which consists in using this personal data to evaluate certain personal aspects relating to a natural person, in particular aspects related to work performance, economic situation, health, personal Analyze or predict that natural person’s preferences, interests, reliability, behaviour, location or relocation;
Explanation: Profiling gathers various pieces of information about an individual in order to learn more about that individual. On the web, profiling is often used for advertising purposes or for credit checks. For example, web and advertising analysis programs collect data about your behavior and your interests on a website. This results in a special user profile that can be used to target advertising to a specific target group.
All texts are copyrighted.
Source: Created with AdSimple ‘s data protection generator