Privacy Policy

Introduction

With the following privacy policy I would like to inform you about which types of your personal data (in the following also referred to as "data") I process, and for which purposes and to what extent they are used. The privacy policy applies to all processing of personal data conducted by me, both in the context of providing my services and, in particular, on my websites, in mobile applications and within external websites, such as my social media profiles (hereinafter referred to as "online offer").

Last Update: August 22nd, 2023

Table of contents

Responsible person

Marvin Scham
c/o Block Services

Stuttgarter Str. 106
70736 Fellbach

Email: [email protected]
Legal Notice: /legal

Overview of processing operations

The following overview summarizes the types of data that are processed and the purposes of their processing, with reference to the people affected.

Types of data processed

Categories of affected people

Purposes of data processing

Back to Top

Significant legal bases

In the following, I would like to inform you about the legal basis of the General Data Protection Regulation (GDPR), the basis of how I am processing personal data. Please note that in addition to the regulations of the GDPR, national data protection regulations may apply in your or my country of residence. Should more specific legal regulations apply in individual cases, I will inform you about these in the privacy policy.

National data protection regulations in Germany

In addition to the data protection regulations of the General Data Protection Regulation, national regulations on data protection apply in Germany. These include especially the law on protection against misuse of personal data in data processing (Bundesdatenschutzgesetz - BDSG). In particular, the BDSG contains special regulations on the right to information, the right to deletion, the right of objection, the processing of special categories of personal data, processing for other purposes and transmission as well as automated decision making in individual cases including profiling. Furthermore, it regulates data processing for the purposes of the employment relationship (§ 26 BDSG), in particular with regard to the establishment, implementation or termination of employment relationships and the consent of employees. Furthermore, state data protection laws of the individual federal states may apply.

Back to Top

Security measures

I will take appropriate technical and organisational measures in accordance with the legal requirements, taking into account the state of the art, the implementation costs and the nature, scope, circumstances and purposes of the processing, as well as the varying degrees of likelihood and the extent of the threat to the rights and freedoms of natural persons, in order to ensure a level of protection appropriate to the risk.

These measures cover especially the protection of confidentiality, integrity and availability of data by controlling the physical and electronic access to the data as well as the access, input, disclosure, securing of availability and separation of the data concerned. Furthermore, I have established mechanisms to ensure the enforcement of data subjects' rights, the deletion of data and to react to any threats to the data. Moreover, I take the protection of personal data into account as early as the development or selection of hardware, software and procedures in accordance with the principle of data protection, through the design of technology and through data protection-friendly presettings.

SSL Encryption (https): To protect your data transmitted over my online offer, I am using SSL encryption. You can recognize such encrypted connections by the prefix https:// in the browser's address line.

Back to Top

Transmission and disclosure of personal data

In the course of my processing of personal data, it may happen that the data is transferred to or disclosed to other bodies, companies, legally independent organisational units or persons. The recipients of this data may include, for example, payment institutions in the context of payment transactions, service providers commissioned with IT tasks or providers of services and content that are integrated into a website. In such cases I observe the legal regulations and conclude corresponding contracts or agreements with the recipients of your data which serve to protect your data.

Data transfer within the organisation: I may transfer personal information to other entities within my organization or grant them access to that information. If this transfer is for administrative purposes, the transfer of the data is based on my justified business and economic interests or takes place if it is necessary to fulfil my contractual obligations or if there is a consent of the persons concerned or a legal permission.

Back to Top

Cookie usage

Cookies are text files that contain data from websites or domains visited and are stored by a browser on the user's computer. A cookie is primarily used to store information about a user during or after his visit within an online service. The stored information may include, for example, the language settings on a website, the login status, a shopping cart or the location where a video was viewed. The term "cookies" also includes other technologies that perform the same functions as cookies (e.g., when user information is stored using pseudonymous online identifiers, also referred to as "User IDs").

A distinction is made between the following cookie types and functions:

Notes on legal bases: On which legal basis I process your personal data with the help of cookies depends on whether I ask you for your consent. If this is the case and you consent to the use of cookies, the legal basis for processing your data is the declared consent. Otherwise, the data processed with the help of cookies will be processed on the basis of my legitimate interests (e.g. in the business administration of my online service and its improvement) or, if the use of cookies is necessary to fulfill my contractual obligations.

General information on revocations and objections (opt-out): Depending on whether the processing is based on consent or legal permission, you have the possibility at any time to revoke any consent given or to refuse the processing of your data by cookie technologies (collectively referred to as "opt-out"). You can initially declare your objection by means of the settings of your browser, e.g. by deactivating the use of cookies (although this may also restrict the functionality of my online service). An opt-out against the use of cookies for online marketing purposes can also be achieved by using a variety of services, especially in the case of tracking, via the websites https://optout.aboutads.info, https://optout.networkadvertising.org/ and https://www.youronlinechoices.com/. In addition to this, you will find more information regarding consent revocation for all used service providers and cookies.

Processing of cookie data based on consent: Before I process or have data processed in the context of the use of cookies, I ask the users for their consent, which can be revoked at any time. Before the consent has not been given, cookies will be used if necessary, which are necessary for the operation of my online offer. Their use is based on my interest and the interest of the users in the expected functionality of my online offer.

Back to Top

Advertising

This Site is affiliated with Publisher First, Inc. dba Freestar ("Freestar") for the purposes of placing advertising on the Site, and Freestar will collect and use certain data for advertising purposes. To learn more about Freestar’s data usage, click here.

Back to Top

Contact

When contacting me (e.g. by contact form, email, phone or via social media) the data of the inquiring persons will be processed as far as this is necessary to answer the inquiries and possible requested actions.

The answering of contact enquiries in the context of contractual or pre-contractual relations is done to fulfill my contractual obligations or to answer (pre)contractual enquiries and otherwise on the basis of my legitimate interest in answering the enquiries.

Back to Top

Providing the online offer and web hosting

In order to provide my online offer securely and efficiently, I use the services of one or more web hosting providers, from whose servers (or servers managed by them) the online offer can be accessed. For these purposes, I may use infrastructure and platform services, computing capacity, storage space and database services as well as security and technical maintenance services.

The data processed within the context of providing the hosting offer can include all data concerning the users of my online offer, which are generated during the usage and communication. This regularly includes the IP address, which is necessary to be able to deliver the contents of online offers to browsers, as well as all entries made within my online offer or from websites.

Email transmission and hosting: The web hosting services I use also include the sending, receiving and storage of emails. For these purposes, the addresses of the recipients and senders as well as further information concerning the sending of emails (e.g. the providers involved) and the contents of the respective emails are processed. The aforementioned data may also be processed for the purpose of detecting spam. Please note that emails on the Internet are generally not sent in encrypted form. Generally, e-mails are encrypted in transit, but (unless an end-to-end encryption method is used) they are not encrypted on the servers from which they are sent and received. Therefore I cannot take responsibility for the transfer path of the emails between the sender and the arrival on my server.

Collection of access data and log files: I (or my web hosting provider) collect data about every access to the server (so called server log files). The server log files may include the address and name of the web pages and files accessed, date and time of access, data volume transferred, report of successful access, browser type and version, the user's operating system, referrer URL (the previously visited page) and, usually, IP addresses and the requesting provider.

The server log files can be used on one hand for security purposes, e.g. to avoid overloading the servers (especially in the case of misuse attempts, so-called DDoS attacks), and on the other hand to secure the capacity use and the stability of the servers.

Back to Top

Plug-ins, embedded functions and content

I incorporate functional and content elements into my online offer which are obtained from servers of their respective providers (hereinafter referred to as "third-party providers"). These can be, for example, graphics, videos or social media buttons and contributions (hereinafter referred to uniformly as "content").

The integration always assumes that the third-party providers of this content process the IP address of the users, as without the IP address they would not be able to send the content to their browsers. The IP address is therefore required to display these contents or functions. I make every effort to use only such content whose respective providers use the IP address exclusively to deliver the content. Third-party providers may also use so-called pixel tags (invisible graphics, also known as "web beacons") for statistical or marketing purposes. The "pixel tags" can be used to evaluate information such as visitor traffic on the pages of this website. The pseudonymous information may also be stored in cookies on the user's device and may contain technical information about the browser and operating system, referring websites, time of visit and other details about the use of my online offer and might be linked to such information from other sources.

Notes on legal bases: Provided I ask the users for their consent to the use of the third-party providers, the legal basis for the processing of data is the consent. Otherwise, the users' data will be processed on the basis of my justified interests (i.e. interest in efficient, economic and user-friendly services). In this context, I would also like to draw your attention to the information on the use of cookies in this privacy policy.

Used services and service providers

Back to Top

Deletion of data

The data I process will be deleted in accordance with the legal requirements as soon as their consent permitted for processing is revoked or other authorisations cease to apply (e.g. if the purpose for processing these data ceases to apply or if they are not necessary for the purpose).

Unless the data are deleted because they are required for other and legally permissible purposes, their processing is limited to these purposes. This means that the data is locked and not processed for other purposes. This applies, for example, to data that must be retained for reasons of commercial or tax law or that must be stored for the assertion, exercise or defense of legal claims or to protect the rights of another natural or legal person.

Further information on the deletion of personal data can also be found in the individual data protection notes of this privacy policy.

Back to Top

Changes and Updates of the Privacy Policy

I would like to ask you to inform yourself regularly about the content of my data protection declaration. I will adapt the privacy policy as soon as changes in the data processing that I have carried out make this necessary. I will inform you as soon as the changes make it necessary for you to take cooperative action (e.g. consent) or other individual notification is required.

Whenever I provide addresses and contact information of companies and organizations in this data protection declaration, please note that the addresses may change over time and I would like to ask you to check the information before establishing contact.

If you have actually read this privacy policy up to this point, leave me an email in which the word "clam" is somewhat subtly used. This section is of course not binding and is for entertainment purposes only as I will probably not remember putting this in here at some point.

Back to Top

Rights of data subjects

As a data subject, you are entitled to various rights under the GDPR, which result in particular from Articles 15 to 18 and 21 GDPR:

Back to Top

Definitions of terms

This section provides an overview of the terms used in this data protection statement. Many of the terms are taken from the law and are defined above all in Article 4 GDPR. The legal definitions are binding. The following explanations, on the other hand, are primarily intended to help you understand them.

Back to Top