Collection and processing of personal data
When you visit our website, we store certain information in cookie, we also store your IP address for 52 days for security reasons, to prevent and detect attacks on our websites or attempts at fraud. We only store other personal data if you provide this data, e.g. as part of a contact form. You are not legally or contractually obliged to make available your personal data. However, it is possible that certain functions of our websites depend on the availability of personal data. If you do not make available personal data in these cases, this may result in functions not being available or only being available to a limited extent.
Data protection and security
The protection of personal data is an important concern for us. We use technical and organizational security measures to protect data managed by us against manipulation, loss, destruction and against access by unauthorized persons. We are constantly improving our security measures in line with technological developments.
Cookie policy. We use specific tracking technologies
Here is more information about the tracking technologies and cookies. We use all of these tracking technologies to improve our site and the experience of our visitors:
Google Analytics: We use Google Analytics to collect information about how visitors use our website. For example, we collect details of the site where the visitor has come from and the total number of times a visitor has been to our website. This allows us to determine the effectiveness of our online campaigns in terms of sales and user activity on our sites. For more information, you can go here.
Google Tag Manager: We use Google Tag Manager to measure what features on our site are interesting to our users. It also helps us understand what portions of our site users clicked on during a certain time and how users arrived on our site. This allows us to determine the effectiveness of our online campaigns in terms of sales and user activity on our sites. For more information, you can go here.
Lead Forensics counter: We use Lead Forensics to reveal the identity of our anonymous website traffic and turns them into actionable leads within a business to business environment. For more information, you can go here.
How do i change my cookie settings?
Most web browsers allow some control of most cookies through the browser settings. Find out how to manage cookies on popular browsers:
To find information relating to other browsers, visit the browser developer’s website.
Email policy
We use Transport Layer Security (TLS) to encrypt and protect email traffic. If your email service does not support TLS, you should be aware that any emails we send or receive may not be protected in transit. We will also monitor any emails sent to us, including file attachments, for viruses or malicious software. Please be aware that you have a responsibility to ensure that any email you send is within the bounds of the law.