Privacy Policy

Privacy Policy


With the following data protection declaration we would like to explain to you which types of your personal data (hereinafter also referred to as “data”) we process, for which purposes and to what extent. The data protection declaration applies to all processing of personal data carried out by us, both in the context of the provision of our services and in particular on our websites, mobile, as well as within external online presences, e.g. our social media profiles (hereinafter collectively referred to as “online offer”).

The terms used are not gender specific.

Status: December 21, 2020

Contents Overview

  1. Responsible Person
  2. Overview of the Processing
  3. Relevant legal bases
  4. Safety measures
  5. Data processing in third countries
  6. Technical provision of the website and use of cookies
  7. Cookie banner from Cybot
  8. Provision of the online offer and web hosting
  9. Contact
  10. Plugins and embedded functions as well as content
  11. Deletion of data
  12. Change and update of the data protection declaration
  13. Rights of data subjects
  14. Definitions of terms

Responsible Person

Garnstadter Straße 38/39
96237 Ebersdorf

Authorized representatives: Susanne Fischer, Dominik Fischer
E-mail address:
Phone: +49 9562 – 925-0

Types of data processed

The following overview summarizes the types of data processed and the purposes of their processing and refers to the data subjects.

Types of data processed

Categories of data subjects

Purposes of processing

Consent (Art. 6 Para. 1 S. 1 lit. a. GDPR) – The person concerned has given their consent to the processing of the personal data concerning them for a specific purpose or for several specific purposes.

Fulfillment of the contract and pre-contractual inquiries (Art. 6 Para. 1 S. 1 lit. b. GDPR) – Processing is necessary for the fulfillment of a contract to which the data subject is a party or for the implementation of pre-contractual measures at the request of the data subject respectively.

Legal obligation (Art. 6 Para. 1 S. 1 lit. c. GDPR) – The processing is necessary to fulfill a legal obligation to which the person responsible is subject.

Legitimate interests (Art. 6 Para. 1 S. 1 lit. f. GDPR) – The processing is necessary to safeguard the legitimate interests of the person responsible or a third party, unless the interests or fundamental rights and freedoms of the data subject, which protect personal data Data require, predominate.

Relevant legal bases

In the following we share the legal basis of the General Data Protection Regulation (GDPR), on the basis of which we process the personal data. Please note that in addition to the regulations of the GDPR, the national data protection requirements in your or our country of residence and domicile may apply. If more specific legal bases are relevant in individual cases, we will inform you of this in the data protection declaration.

Security measures

In the event of violations of the GDPR, data subjects are entitled to log a complaint with a supervisory agency, in particular in the member state where they usually maintain their domicile, place of work or at the place where the alleged violation occurred. The right to log a complaint is in effect regardless of any other administrative or court proceedings available as legal recourses.

We take appropriate technical and organizational measures in accordance with the legal requirements, taking into account the state of the art, the implementation costs and the type, scope, circumstances and purposes of processing as well as the different probabilities of occurrence and the extent of the threat to the rights and freedoms of natural persons to ensure a level of protection appropriate to the risk.

The measures include, in particular, securing the confidentiality, integrity and availability of data by controlling physical and electronic access to the data as well as the access, input, transfer, securing of availability and their separation. Furthermore, we have set up procedures that ensure the exercise of data subject rights, the deletion of data and reactions to the threat to the data. Furthermore, we consider the protection of personal data already in the development or selection of hardware, software and procedures in accordance with the principle of data protection, through technology design and through data protection-friendly default settings.

SSL encryption (https): We use SSL encryption to protect your data transmitted via our online offer. You can recognize such encrypted connections by the prefix https: // in the address line of your browser.

As part of our processing of personal data, it may happen that the data is transmitted to other bodies, companies, legally independent organizational units or persons, or they are disclosed to them. The recipients of this data can e.g. Payment institutions in the context of payment transactions, service providers commissioned with IT tasks or providers of services and content that are integrated into a website. In such a case, we observe the legal requirements and, in particular, conclude corresponding contracts or agreements that serve to protect your data with the recipients of your data.

Data processing in third countries

If we process data in a third country (i.e. outside the European Union (EU), the European Economic Area (EEA)) or the processing in the context of the use of third-party services or the disclosure or transmission of data to other persons, offices or companies takes place, this is only done in accordance with the legal requirements.

Subjectto express consent or contractually or legally required transfer, we only process or have the data processed in third countries with a recognized level of data protection, contractual obligation through so-called standard protection clauses of the EU Commission, if certifications or binding internal data protection regulations are available (Art. Information page of the EU Commission:

Technical provision of the website and use of cookies

For the technical provision of the website, it is necessary for us to process certain automatically transmitted information about you so that your browser can display our website and you can use the website. This information is automatically recorded every time our website is accessed and stored in our server log files. This information relates to the computer system of the calling computer. The following information is collected:

We also use cookies to make our website available for you to use. Cookies are text files that are stored in the Internet browser or by the Internet browser on your computer system when you visit a website. A cookie contains a characteristic string of characters that enables the browser to be uniquely identified when the website is called up again. We only use these cookies to make our website and its technical functions available to you. Some functions of our website cannot be offered without the use of cookies. The following information is stored in the cookies and transmitted to us:

Cookie banner from Cybot

In order to integrate the cookies, we use the GDPR and ePrivacy-compliant Cookiebot from Cybot A / S from Denmark. You can give your consent or reject the setting of cookies that are not necessary for the operation of the pages via the cookie banner and also via the type of cookie s you decide to allow or deny. You can find an overview of the individual cookies under “Show details” in our cookie banner. Your decision will be stored in a separate cookie in your browser for one year. In order to ensure that you will be recognized by the Cookiebot the next time you visit, the following data is transmitted to Cybot A / S, Havnegade 39, 1058 Copenhagen: Your IP address in anonymized form (the last three digits are set to ‘0’) Date and time of consent Browser manufacturer The URL from which consent was sent. An anonymous, random and encrypted key. Your consent status, which serves as proof of consent. For us and Cybot, this data is not personal. You can change or revoke your decision at any time. There is a link at the end of each page to change or revoke your consent.

Provision of the online offer and web hosting

In order to be able to provide our online offer safely and efficiently, we use the services of one or more web hosting providers, from whose servers (or servers managed by them) the online offer can be accessed. For these purposes, we can use infrastructure and platform services, computing capacity, storage space and database services as well as security services and technical maintenance services.

The data processed as part of the provision of the hosting offer can include all information relating to the users of our online offer that is generated in the context of use and communication. This regularly includes the IP address that is necessary in order to be able to deliver the content of online offers to browsers, and all entries made within our online offer or from websites.

E-mail dispatch and hosting: The web hosting services we use also include the dispatch, receipt and storage of e-mails. For these purposes, the addresses of the recipients and senders as well as other information regarding the sending of e-mails (e.g. the providers involved) and the content of the respective e-mails are processed. The aforementioned data can also be processed for the purpose of recognizing SPAM. Please note that emails on the Internet are generally not sent in encrypted form. As a rule, e-mails are encrypted on the transport route, but (if no so-called end-to-end encryption method is used) not on the servers from which they are sent and received. We cannot therefore assume any responsibility for the transmission path of the e-mails between the sender and receipt on our server.

Collection of access data and log files: We ourselves (or our web hosting provider) collect data on every access to the server (so-called server log files). The server log files can include the address and name of the websites and files accessed, the date and time of the access, the amount of data transferred, notification of successful access, browser type and version, the user’s operating system, referrer URL (the previously visited page) and, as a rule, IP Addresses and the requesting provider belong.

The server log files can be used on the one hand for security purposes, e.g. to avoid overloading the server (especially in the case of abusive attacks, so-called DDoS attacks) and on the other hand to ensure the load on the servers and their stability.


When you contact us (e.g. via the contact form, email, phone or via social media), the details of the inquiring person are processed, insofar as this is necessary to answer the contact inquiries and any requested measures.

The answering of contact inquiries in the context of contractual or pre-contractual relationships takes place in order to fulfill our contractual obligations or to answer (pre) contractual inquiries and otherwise on the basis of the legitimate interests in answering the inquiries.

Plugins and embedded functions as well as content

We include functional and content elements in our online offer that are obtained from the servers of their respective providers (hereinafter referred to as “third-party providers”). This can be, for example, graphics, videos or social media buttons as well as contributions (hereinafter uniformly referred to as “content”).

The integration always presupposes that the third-party providers of this content process the IP address of the user, since without the IP address they would not be able to send the content to their browser. The IP address is therefore required for the display of this content or functions. We endeavor to only use content whose respective providers only use the IP address to deliver the content. Third-party providers can also use so-called pixel tags (invisible graphics, also known as “web beacons”) for statistical or marketing purposes. The “pixel tags” can be used to evaluate information such as visitor traffic on the pages of this website. The pseudonymous information can also be stored in cookies on the user’s device and contain, among other things, technical information on the browser and operating system, the websites to be referred to, the time of visit and other information on the use of our online offer, as well as being linked to such information from other sources.

Notes on legal bases: If we ask users for their consent to the use of third-party providers, the legal basis for processing data is consent. Otherwise, user data will be processed on the basis of our legitimate interests (i.e. interest in efficient, economical and recipient-friendly services). In this context, we would like to draw your attention to the information on the use of cookies in this data protection declaration.

Used services and service providers:

Deletion of data

The data processed by us will be deleted in accordance with the legalrequirements as soon as the consent permitted for processing isrevoked or other permissions are no longer applicable (e.g. if thepurpose of processing this data is no longer applicable or is notrequired for the purpose).

If the data are not deleted because they are required for other and legally permissible purposes, their processing will be limited to these purposes. This means that the data is blocked and not processed for other purposes. This applies e.g. for data that must be kept for commercial or tax law reasons or whose storage is necessary for the establishment, exercise or defense of legal claims or to protect the rights of another natural or legal person.

Change and update of the data protection declaration

We ask you to inform yourself regularly about the content of our data protection declaration. We will adapt the data protection declaration as soon as the changes to the data processing carried out by us make this necessary. We will inform you as soon as the changes require your participation (e.g. consent) or other individual notification.

If we provide addresses and contact information of companies and organizations in this data protection declaration, please note that the addresses can change over time and ask you to check the information before contacting us.

Rights of data subjects

As the data subject, you have various rights under the GDPR, whicharise in particular from Art. 15 to 21 GDPR:

Definition of Terms

Visit action evaluation: “Visit action evaluation” (English “Conversion Tracking”) describes a procedure with which the effectiveness of marketing measures can be determined. For this purpose, a cookie is usually stored on the users’ devices within the websites on which the marketing measures are carried out and then retrieved again on the target website. For example, we can see whether the advertisements we placed on other websites were successful).

Cross-device tracking: Cross-device tracking is a form of tracking in which user behavior and interest information is recorded across devices in so-called profiles by assigning an online identifier to the users. As a result, the user information can usually be analyzed for marketing purposes regardless of the browser or device used (e.g. mobile phones or desktop computers). Most providers do not link the online identification with clear data such as names, postal addresses or e-mail addresses.

IP masking: “IP masking” is a method in which the last octet, i.e. the last two digits of an IP address, is deleted so that the IP address can no longer be used to uniquely identify a person. Therefore, IP masking is a means of pseudonymising processing methods, especially in online marketing

Interest-based and behavior-based marketing: One speaks of interest-based and / or behavior-related marketing when potential interests of users in advertisements and other content are predetermined as precisely as possible. This is done on the basis of information about their previous behavior (e.g. visiting certain websites and lingering on them, buying behavior or interaction with other users), which are stored in a so-called profile. For these purposes, the Usually cookies are used.

Conversion measurement: The conversion measurement is a procedure with which the effectiveness of marketing measures can be determined. For this purpose, a cookie is usually stored on the users’ devices within the websites on which the marketing measures are carried out and then retrieved again on the target website. For example, we can see whether the advertisements we placed on other websites were successful.

Personal data: “Personal data” are all information that relates to an identified or identifiable natural person (hereinafter “data subject”); A natural person is regarded as identifiable who can be identified directly or indirectly, in particular by means of assignment to an identifier such as a name, an identification number, location data, an online identifier (e.g. cookie) or one or more special features, which express the physical, physiological, genetic, psychological, economic, cultural or social identity of this natural person.

Reach measurement: Reach measurement (also known as web analytics) is used to evaluate the flow of visitors to an online offer and can measure the behavior or interests of visitors in certain information, such as Content from web pages. With the help of the reach analysis, website owners can e.g. recognize at what time visitors visit your website and what content they are interested in. This means they can e.g. better adapt the content of the website to the needs of its visitors. For the purpose of range analysis, pseudonymous cookies and web beacons are often used in order to recognize returning visitors and thus to obtain more precise analyzes of the use of an online offer.

Tracking: One speaks of “tracking” when the behavior of users can be traced across several online offers. As a rule, behavioral and interest information with regard to the online offers used is stored in cookies or on the servers of the tracking technology providers (so-called profiling). This information can then e.g. can be used to show users advertisements that are likely to correspond to their interests.

Responsible: “Responsible” is the natural or legal person, authority, institution or other body that alone or jointly with others decides on the purposes and means of processing personal data.

Processing: “Processing” is any process carried out with or without the help of automated processes or any such series of processes in connection with personal data. The term goes far and includes practically every handling of data, be it the collection, the evaluation, the storage, the transmission or the deletion.