1. data protection at a glance
The following notes provide a simple overview of what happens to your personal data when you visit our website. Personal data are all data with which you can be personally identified. For detailed information on the subject of data protection, please refer to our data protection declaration listed below this text.
Data collection on our website
Who is responsible for data collection on this website?
The data processing on this website is carried out by the website operator. You can find his contact details in the imprint of this website.
How do we collect your data?
On the one hand, your data is collected when you provide it to us. This may be data that you enter in a contact form, for example.
Other data is automatically collected by our IT systems when you visit the website. These are mainly technical data (e.g. Internet browser, operating system or time of the page call). This data is collected automatically as soon as you enter our website.
What do we use your data for?
Part of the data is collected to ensure that the website is provided without errors. Other data can be used to analyse your user behaviour.
What rights do you have regarding your data?
You have the right to receive information free of charge at any time about the origin, recipient and purpose of your stored personal data. You also have the right to demand the correction, blocking or deletion of this data. For this purpose, as well as for further questions regarding data protection, you can contact us at any time at the address given in the imprint. Furthermore, you have the right to complain to the responsible supervisory authority.
Furthermore, you have the right to demand under certain circumstances the restriction of the processing of your personal data. For details, please refer to the data protection declaration under “Right to limit processing”.
2. general information and mandatory information
We would like to point out that data transmission over the Internet (e.g. communication by e-mail) can have security gaps. A complete protection of data against access by third parties is not possible.