{"id":1055,"date":"2026-01-12T13:12:48","date_gmt":"2026-01-12T12:12:48","guid":{"rendered":"http:\/\/localhost:8888\/?page_id=1055"},"modified":"2026-01-29T14:44:13","modified_gmt":"2026-01-29T13:44:13","slug":"datenschutz","status":"publish","type":"page","link":"https:\/\/rodltal-huetten.at\/en\/datenschutz\/","title":{"rendered":"Privacy policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1055\" class=\"elementor elementor-1055\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3041bee e-flex e-con-boxed e-con e-parent\" data-id=\"3041bee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b631ad4 e-con-full e-flex e-con e-child\" data-id=\"b631ad4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5f6ea8 elementor-widget elementor-widget-heading\" data-id=\"e5f6ea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Privacy policy<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74d090c elementor-widget elementor-widget-text-editor\" data-id=\"74d090c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 id=\"m716\">Preamble<\/h2><p>With the following privacy policy, we would like to inform you about the types of personal data (hereinafter also referred to as \u201cdata\u201d) we process, for what purposes, and to what extent. The privacy policy applies to all processing of personal data carried out by us, both in the context of providing our services and, in particular, on our websites, in mobile applications, and within external online presences, such as our social media profiles (hereinafter collectively referred to as \u201conline offering\u201d).<\/p><p>The terms used are not gender-specific.<\/p><p>As of: January 29, 2026<\/p><h2>Table of contents<\/h2><ul class=\"index\"><li><a class=\"index-link\" href=\"#m716\">Preamble<\/a><\/li><li><a class=\"index-link\" href=\"#m3\">Person in charge<\/a><\/li><li><a class=\"index-link\" href=\"#mOverview\">Overview of processing operations<\/a><\/li><li><a class=\"index-link\" href=\"#m2427\">Relevant legal basis<\/a><\/li><li><a class=\"index-link\" href=\"#m27\">Safety measures<\/a><\/li><li><a class=\"index-link\" href=\"#m25\">Transfer of personal data<\/a><\/li><li><a class=\"index-link\" href=\"#m24\">International data transfers<\/a><\/li><li><a class=\"index-link\" href=\"#m12\">General information on data storage and deletion<\/a><\/li><li><a class=\"index-link\" href=\"#m10\">Rights of data subjects<\/a><\/li><li><a class=\"index-link\" href=\"#m225\">Provision of online services and web hosting<\/a><\/li><li><a class=\"index-link\" href=\"#m134\">Use of cookies<\/a><\/li><li><a class=\"index-link\" href=\"#m182\">Contact and inquiry management<\/a><\/li><li><a class=\"index-link\" href=\"#m263\">Web analytics, monitoring, and optimization<\/a><\/li><li><a class=\"index-link\" href=\"#m136\">Presence on social networks (social media)<\/a><\/li><li><a class=\"index-link\" href=\"#m328\">Plug-ins and embedded functions and content<\/a><\/li><li><a class=\"index-link\" href=\"#m15\">Modification and updating<\/a><\/li><li><a class=\"index-link\" href=\"#m42\">Definition of terms<\/a><\/li><\/ul><h2 id=\"m3\">Person in charge<\/h2><p>Stefan Gruber<br \/>Maierleiten 62<br \/>4201 Gramastetten<\/p><p>Email address: <a href=\"mailto:office@rodltal-huetten.at\">office@rodltal-huetten.at<\/a><\/p><h2 id=\"mOverview\">Overview of processing operations<\/h2><p>The following overview summarizes the types of data processed and the purposes for which they are processed, and refers to the data subjects.<\/p><h3>Types of data processed<\/h3><ul><li>Contact details.<\/li><li>Content data.<\/li><li>Usage data.<\/li><li>Meta, communication, and procedural data.<\/li><li>Log data.<\/li><\/ul><h3>Categories of data subjects<\/h3><ul><li>Communication partner.<\/li><li>User.<\/li><\/ul><h3>Purposes of processing<\/h3><ul><li>Communication.<\/li><li>Safety measures.<\/li><li>Reach measurement.<\/li><li>Organizational and administrative procedures.<\/li><li>Feedback.<\/li><li>Profiles containing user-related information.<\/li><li>Provision of our online offering and user-friendliness.<\/li><li>Information technology infrastructure.<\/li><li>Public relations.<\/li><\/ul><h2 id=\"m2427\">Relevant legal basis<\/h2><p class=\"translation-block\"><strong>Relevant legal basis under the GDPR: <\/strong>Below you will find an overview of the legal basis under the GDPR on which we process personal data. Please note that, in addition to the provisions of the GDPR, national data protection regulations may apply in your or our country of residence or domicile. If more specific legal bases are relevant in individual cases, we will inform you of this in the privacy policy.<\/p><ul><li class=\"translation-block\"><strong>Consent (Art. 6 para. 1 sentence 1 lit. a) GDPR)<\/strong> \u2013 The data subject has given their consent to the processing of their personal data for one or more specific purposes.<\/li><li class=\"translation-block\"><strong>Contract fulfillment and pre-contractual inquiries (Art. 6 para. 1 sentence 1 lit. b) GDPR)<\/strong> \u2013 Processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract.<\/li><li class=\"translation-block\"><strong>Legitimate interests (Art. 6 para. 1 sentence 1 lit. f) GDPR)<\/strong> \u2013 processing is necessary to safeguard the legitimate interests of the controller or a third party, provided that the interests, fundamental rights, and freedoms of the data subject requiring the protection of personal data do not prevail.<\/li><\/ul><p class=\"translation-block\"><strong>National data protection regulations in Austria:<\/strong> In addition to the data protection regulations of the GDPR, national regulations on data protection apply in Austria. These include, in particular, the Federal Act on the Protection of Individuals with regard to the Processing of Personal Data (Data Protection Act \u2013 DSG). The Data Protection Act contains, in particular, special provisions on the right to information, the right to rectification or erasure, the processing of special categories of data, and the right to data portability.<\/p><h2 id=\"m27\">Safety measures<\/h2><p>We take appropriate technical and organizational measures in accordance with legal requirements, taking into account the state of the art, implementation costs, and the nature, scope, circumstances, and purposes of processing, as well as the varying likelihood and severity of threats to the rights and freedoms of natural persons, to ensure a level of protection appropriate to the risk.<\/p><p>These measures include, in particular, ensuring the confidentiality, integrity, and availability of data by controlling physical and electronic access to the data as well as access, input, transfer, availability, and separation. Furthermore, we have established procedures that guarantee the exercise of data subjects' rights, the deletion of data, and responses to data breaches. Furthermore, we take the protection of personal data into account as early as the development or selection of hardware, software, and procedures in accordance with the principle of data protection, through technology design and data protection-friendly default settings.<\/p><p>Securing online connections with TLS\/SSL encryption technology (HTTPS): We use TLS\/SSL encryption technology to protect user data transmitted via our online services from unauthorized access. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are the cornerstones of secure data transmission on the Internet. These technologies encrypt the information transmitted between the website or app and the user's browser (or between two servers), protecting the data from unauthorized access. TLS, as the more advanced and secure version of SSL, ensures that all data transmissions meet the highest security standards. When a website is secured by an SSL\/TLS certificate, this is indicated by the display of HTTPS in the URL. This serves as an indicator to users that their data is being transmitted securely and encrypted.<\/p><h2 id=\"m25\">Transfer of personal data<\/h2><p>As part of our processing of personal data, it may happen that this data is transferred to or disclosed to other departments, companies, legally independent organizational units, or individuals. The recipients of this data may include, for example, service providers commissioned with IT tasks or providers of services and content that are integrated into a website. In such cases, we comply with the legal requirements and, in particular, conclude appropriate contracts or agreements with the recipients of your data to protect your data.<\/p><h2 id=\"m24\">International data transfers<\/h2><p>Data processing in third countries: If we transfer data to a third country (i.e., outside the European Union (EU) or the European Economic Area (EEA)) or if this occurs in the context of using third-party services or disclosing or transferring data to other persons, bodies, or companies (which can be identified by the postal address of the respective provider or if the privacy policy expressly refers to the transfer of data to third countries), this is always done in accordance with the legal requirements.<\/p><p>For data transfers to the US, we primarily rely on the Data Privacy Framework (DPF), which was recognized as a secure legal framework by an adequacy decision of the EU Commission on July 10, 2023. In addition, we have concluded standard contractual clauses with the respective providers that comply with the requirements of the EU Commission and stipulate contractual obligations for the protection of your data.<\/p><p>This dual safeguard ensures comprehensive protection for your data: the DPF forms the primary level of protection, while the standard contractual clauses serve as additional security. Should changes arise within the framework of the DPF, the standard contractual clauses serve as a reliable fallback option. This ensures that your data remains adequately protected even in the event of political or legal changes.<\/p><p>We will inform you whether individual service providers are DPF-certified and whether standard contractual clauses are in place. Further information on the DPF and a list of certified companies can be found on the US Department of Commerce website at <a href=\"https:\/\/www.dataprivacyframework.gov\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.dataprivacyframework.gov\/<\/a> (in englischer Sprache).<\/p><p class=\"translation-block\">Appropriate security measures apply to data transfers to other third countries, in particular standard contractual clauses, express consent, or transfers required by law. Information on third-country transfers and applicable adequacy decisions can be found in the information provided by the EU Commission: <a href=\"https:\/\/commission.europa.eu\/law\/law-topic\/data-protection\/international-dimension-data-protection_en?prefLang=de\" target=\"_blank\" rel=\"noopener\">https:\/\/commission.europa.eu\/law\/law-topic\/data-protection\/international-dimension-data-protection_en?prefLang=de. <\/a><\/p><h2 id=\"m12\">General information on data storage and deletion<\/h2><p>We delete personal data that we process in accordance with legal requirements as soon as the underlying consent is revoked or there is no further legal basis for processing. This applies to cases in which the original purpose of processing no longer applies or the data is no longer required. Exceptions to this rule exist if legal obligations or special interests require longer storage or archiving of the data.<\/p><p>In particular, data that must be retained for commercial or tax reasons, or whose storage is necessary for legal prosecution or to protect the rights of other natural or legal persons, must be archived accordingly.<\/p><p>Our privacy policy contains additional information on the storage and deletion of data that applies specifically to certain processing procedures.<\/p><p>If there are several specifications regarding the storage period or deletion deadlines for a date, the longest period shall always apply. We process data that is no longer required for its original purpose but is retained due to legal requirements or other reasons exclusively for the reasons that justify its retention.<\/p><p>Storage and deletion of data: The following general periods apply to storage and archiving in accordance with Austrian law:<\/p><ul><li>10 years \u2013 retention period for books and records, annual financial statements, inventories, management reports, opening balance sheets, accounting vouchers, and invoices, as well as all necessary work instructions and other organizational documents (Federal Tax Code (BAO \u00a7132), Commercial Code (UGB \u00a7\u00a7190-212)).<\/li><li>6 years \u2013 Other business documents: Commercial or business letters received, copies of commercial or business letters sent, and other documents, provided they are relevant for tax purposes. These include, for example, hourly wage slips, operating statements, calculation documents, price tags, and payroll documents, unless they are already accounting documents and cash register receipts (Federal Tax Code (BAO \u00a7132), Commercial Code (UGB \u00a7\u00a7190-212)).<\/li><li>3 years \u2013 Data required to consider potential warranty and damage claims or similar contractual claims and rights, as well as to process related inquiries, based on previous business experience and customary industry practices, will be stored for the duration of the regular statutory limitation period of three years (\u00a7\u00a7 1478, 1480 ABGB).<\/li><\/ul><p>Start of the period at the end of the year: If a period does not expressly begin on a specific date and lasts at least one year, it automatically begins at the end of the calendar year in which the event triggering the period occurred. In the case of ongoing contractual relationships in which data is stored, the event triggering the period is the date on which the termination or other termination of the legal relationship takes effect.<\/p><h2 id=\"m10\">Rights of data subjects<\/h2><p>Rights of data subjects under the GDPR: As a data subject, you have various rights under the GDPR, which arise in particular from Articles 15 to 21 GDPR:<\/p><ul><li><strong>Right to object: You have the right to object at any time, on grounds relating to your particular situation, to the processing of personal data concerning you which is carried out on the basis of Article 6(1)(e) or (f) GDPR; this also applies to profiling based on these provisions. If the personal data concerning you is processed for direct marketing purposes, you have the right to object at any time to the processing of personal data concerning you for the purpose of such marketing; this also applies to profiling insofar as it is related to such direct marketing.<\/strong><\/li><li class=\"translation-block\"><strong>Right of revocation for consent:<\/strong> You have the right to revoke your consent at any time.<\/li><li class=\"translation-block\"><strong>Right to information:<\/strong> You have the right to request confirmation as to whether the data in question is being processed and to obtain information about this data, as well as further information and a copy of the data in accordance with the legal requirements.<\/li><li class=\"translation-block\"><strong>Right to rectification:<\/strong> In accordance with legal requirements, you have the right to request that data concerning you be completed or that inaccurate data concerning you be corrected.<\/li><li class=\"translation-block\"><strong>Right to erasure and restriction of processing:<\/strong> In accordance with legal requirements, you have the right to request that data concerning you be erased immediately or, alternatively, in accordance with legal requirements, to request that the processing of the data be restricted.<\/li><li class=\"translation-block\"><strong>Right to data portability:<\/strong> You have the right to receive data concerning you that you have provided to us in a structured, commonly used, and machine-readable format in accordance with legal requirements, or to request that it be transferred to another controller.<\/li><li class=\"translation-block\"><strong>Complaint to supervisory authority: <\/strong> Without prejudice to any other administrative or judicial remedy, you have the right to lodge a complaint with a supervisory authority, in particular in the Member State of your habitual residence, place of work, or place of the alleged infringement, if you consider that the processing of personal data relating to you infringes the provisions of the GDPR.<\/li><\/ul><h2 id=\"m225\">Provision of online services and web hosting<\/h2><p>We process user data in order to provide them with our online services. For this purpose, we process the user's IP address, which is necessary to transmit the content and functions of our online services to the user's browser or end device.<\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Types of data processed:<\/strong> Usage data (e.g., page views and dwell time, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions); Meta, communication, and procedural data (e.g., IP addresses, time stamps, identification numbers, persons involved). Log data (e.g., log files relating to logins or the retrieval of data or access times).<\/li><li class=\"translation-block\"><strong>Affected persons:<\/strong> Users (e.g., website visitors, users of online services).<\/li><li class=\"translation-block\"><strong>Purposes of processing:<\/strong> Provision of our online offering and user-friendliness; IT infrastructure (operation and provision of information systems and technical equipment (computers, servers, etc.)). Security measures.<\/li><li class=\"translation-block\">Storage and deletion: Deletion in accordance with the information provided in the section \u201cGeneral information on data storage and deletion.\u201d<\/li><li class=\"translation-block\"><strong>Legal basis: <\/strong> Legitimate interests (Art. 6(1)(f) GDPR).<\/li><\/ul><p><strong>Further information on processing procedures, methods, and services:<\/strong><\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Provision of online services on rented storage space: <\/strong>To provide our online services, we use storage space, computing capacity, and software that we rent or otherwise obtain from a server provider (also known as a \u201cweb host\u201d). <span class=\"\"><strong>Legal basis:<\/strong> Legitimate interests (Art. 6 (1) (f) GDPR).<\/span><\/li><li class=\"translation-block\">Collection of access data and log files: Access to our online offering is logged in the form of so-called \u201cserver log files.\u201d Server log files may include the address and name of the websites and files accessed, the date and time of access, the amount of data transferred, notification of successful access, browser type and version, the user's operating system, referrer URL (the previously visited page), and, as a rule, IP addresses and the requesting provider. The server log files can be used for security purposes, e.g., to prevent server overload (especially in the case of malicious attacks, known as DDoS attacks), and to ensure server utilization and stability. <span class=\"\"><strong>Legal basis:<\/strong> Legitimate interests (Art. 6 (1) (f) GDPR). <\/span><strong>Deletion of data:<\/strong> Log file information is stored for a maximum of 30 days and then deleted or anonymized. Data that must be retained for evidentiary purposes is excluded from deletion until the respective incident has been finally clarified.<\/li><\/ul><h2 id=\"m134\">Use of cookies<\/h2><p>The term \u201ccookies\u201d refers to functions that store and read information on users' end devices. Cookies can also be used for various purposes, such as to ensure the functionality, security, and convenience of online offerings and to analyze visitor traffic. We use cookies in accordance with legal requirements. To do so, we obtain the consent of users in advance, if necessary. If consent is not necessary, we rely on our legitimate interests. This applies if the storage and retrieval of information is essential in order to provide expressly requested content and functions. This includes, for example, the storage of settings and ensuring the functionality and security of our online offering. Consent can be revoked at any time. We provide clear information about the scope of cookies and which cookies are used.<\/p><p class=\"translation-block\"><strong>Information on legal bases for data protection: <\/strong>Whether we process personal data using cookies depends on consent. If consent has been given, it serves as the legal basis. Without consent, we rely on our legitimate interests, which are explained above in this section and in the context of the respective services and procedures.<\/p><p class=\"translation-block\"><strong>Storage duration:<\/strong> With regard to storage duration, the following types of cookies are distinguished:<\/p><ul><li class=\"translation-block\"><strong>Temporary cookies (also known as session cookies):<\/strong> Temporary cookies are deleted at the latest after a user leaves an online offering and closes their device (e.g., browser or mobile application).<\/li><li class=\"translation-block\"><strong>Persistent cookies:<\/strong> Persistent cookies remain stored even after the device is closed. This allows, for example, the log-in status to be saved and preferred content to be displayed directly when the user visits a website again. The user data collected with the help of cookies can also be used to measure reach. Unless we provide users with explicit information about the type and storage duration of cookies (e.g., when obtaining consent), they should assume that these are permanent and that the storage period can be up to two years.<\/li><\/ul><p class=\"translation-block\"><strong>General information on revocation and objection (opt-out): <\/strong>Users can revoke their consent at any time and also object to the processing in accordance with the legal requirements, including through the privacy settings of their browser.<\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Types of data processed:<\/strong> Meta, communication, and procedural data (e.g., IP addresses, time stamps, identification numbers, persons involved).<\/li><li class=\"translation-block\"><strong>Affected persons:<\/strong> Users (e.g., website visitors, users of online services).<\/li><li class=\"translation-block\"><strong>Legal basis:<\/strong> Legitimate interests (Art. 6(1)(f) GDPR). Consent (Art. 6(1)(a) GDPR).<\/li><\/ul><p><strong>Further information on processing procedures, methods, and services:<\/strong><\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Processing cookie data based on consent: <\/strong>We use a consent management solution that obtains users' consent to the use of cookies or to the procedures and providers specified in the consent management solution. This procedure is used to obtain, log, manage, and revoke consent, in particular with regard to the use of cookies and similar technologies that are used to store, read, and process information on users' end devices. As part of this procedure, users' consent is obtained for the use of cookies and the associated processing of information, including the specific processing and providers specified in the consent management procedure. Users also have the option of managing and revoking their consent. The declarations of consent are stored in order to avoid repeated queries and to be able to provide proof of consent in accordance with legal requirements. Storage takes place on the server side and\/or in a cookie (known as an opt-in cookie) or using comparable technologies in order to be able to assign consent to a specific user or their device. If no specific information is available about the providers of consent management services, the following general information applies: Consent is stored for up to two years. A pseudonymous user identifier is created, which is stored together with the time of consent, details of the scope of consent (e.g., relevant categories of cookies and\/or service providers), and information about the browser, system, and end device used. <span class=\"\"><strong>Legal basis:<\/strong> Consent (Art. 6 (1) (a) GDPR).<\/span><\/li><\/ul><h2 id=\"m182\">Contact and inquiry management<\/h2><p>When contacting us (e.g., by mail, contact form, email, telephone, or social media) and within the scope of existing user and business relationships, the information provided by the inquiring persons will be processed to the extent necessary to respond to contact requests and any requested measures.<\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Types of data processed:<\/strong> Contact details (e.g., postal and email addresses or telephone numbers); content data (e.g., text or image messages and posts, as well as information relating to them, such as details of authorship or time of creation). Meta, communication, and procedural data (e.g., IP addresses, time stamps, identification numbers, persons involved).<\/li><li class=\"translation-block\"><strong>Affected persons:<\/strong> Communication partners.<\/li><li class=\"translation-block\"><strong>Purposes of processing:<\/strong> Communication; organizational and administrative procedures; feedback (e.g., collecting feedback via online form). Provision of our online offering and user-friendliness.<\/li><li class=\"translation-block\">Storage and deletion: Deletion in accordance with the information provided in the section \u201cGeneral information on data storage and deletion.\u201d<\/li><li class=\"translation-block\"><strong>Legal basis:<\/strong> Legitimate interests (Art. 6(1)(f) GDPR). Contract performance and pre-contractual inquiries (Art. 6(1)(b) GDPR).<\/li><\/ul><p><strong>Further information on processing procedures, methods, and services:<\/strong><\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Contact form: <\/strong>When you contact us via our contact form, by email, or through other means of communication, we process the personal data you provide in order to respond to and process your request. This usually includes information such as your name, contact details, and, if applicable, other information that you provide and that is necessary for us to process your request appropriately. We use this data exclusively for the stated purpose of contacting and communicating with you. <span class=\"\"><strong>Legal basis:<\/strong> Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (b) GDPR), legitimate interests (Art. 6 (1) (f) GDPR).<\/span><\/li><\/ul><h2 id=\"m263\">Web analytics, monitoring, and optimization<\/h2><p>Web analysis (also known as \u201creach measurement\u201d) is used to evaluate visitor traffic to our online offering and may include behavior, interests, or demographic information about visitors, such as age or gender, as pseudonymous values. With the help of reach analysis, we can, for example, identify at what times our online offering or its functions or content are used most frequently, or invite reuse. It also enables us to identify areas that require optimization.<\/p><p>In addition to web analytics, we may also use testing procedures to test and optimize different versions of our online offering or its components.<\/p><p>Unless otherwise specified below, profiles, i.e., data summarized for a usage process, may be created for these purposes, and information may be stored in a browser or on a terminal device and then read. The information collected includes, in particular, websites visited and elements used there, as well as technical information such as the browser used, the computer system used, and information on usage times. If users have agreed to the collection of their location data by us or by the providers of the services we use, the processing of location data is also possible.<\/p><p>In addition, users' IP addresses are stored. However, we use an IP masking procedure (i.e., pseudonymization by shortening the IP address) to protect users. In general, no clear data of users (such as email addresses or names) is stored in the context of web analysis, A\/B testing, and optimization, but rather pseudonyms. This means that neither we nor the providers of the software used know the actual identity of the users, but only the information stored in their profiles for the purpose of the respective procedures.<\/p><p>Information on legal bases: If we ask users for their consent to the use of third-party providers, the legal basis for data processing is consent. Otherwise, user data is processed on the basis of our legitimate interests (i.e., interest in efficient, economical, and recipient-friendly services). In this context, we would also like to refer you to the information on the use of cookies in this privacy policy.<\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Types of data processed:<\/strong> Usage data (e.g., page views and dwell time, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions). Meta, communication, and procedural data (e.g., IP addresses, time stamps, identification numbers, persons involved).<\/li><li class=\"translation-block\"><strong>Affected persons:<\/strong> Users (e.g., website visitors, users of online services).<\/li><li class=\"translation-block\"><strong>Purposes of processing:<\/strong> Reach measurement (e.g., access statistics, recognition of returning visitors); profiles with user-related information (creation of user profiles). Provision of our online offering and user-friendliness.<\/li><li class=\"translation-block\"><strong>Storage and deletion:<\/strong> Deletion in accordance with the information in the section \u201cGeneral information on data storage and deletion.\u201d Storage of cookies for up to 2 years (Unless otherwise specified, cookies and similar storage methods may be stored on users' devices for a period of two years.).<\/li><li class=\"translation-block\"><strong>Security measures:<\/strong> IP masking (pseudonymization of the IP address).<\/li><li class=\"translation-block\"><strong>Legal basis:<\/strong> Consent (Art. 6(1)(a) GDPR). Legitimate interests (Art. 6(1)(f) GDPR).<\/li><\/ul><p><strong>Further information on processing procedures, methods, and services:<\/strong><\/p><ul class=\"m-elements\"><li class=\"translation-block\">Google Analytics: We use Google Analytics to measure and analyze the use of our online offering based on a pseudonymous user identification number. This identification number does not contain any unique data such as names or email addresses. It is used to assign analysis information to a device in order to identify which content users have accessed within one or more usage sessions, which search terms they have used, which they have accessed again, or how they have interacted with our online offering. The time and duration of use are also stored, as well as the sources of users who refer to our online offering and technical aspects of their devices and browsers. <br>In doing so, pseudonymous user profiles are created with information from the use of various devices, whereby cookies may be used. Google Analytics does not log or store individual IP addresses for EU users. However, Analytics provides rough geographic location data by deriving the following metadata from IP addresses: City (and the derived latitude and longitude of the city), continent, country, region, subcontinent (and ID-based counterparts). For EU traffic, IP address data is used solely for this derivation of geolocation data before being immediately deleted. It is not logged, is not accessible, and is not used for any other purpose. When Google Analytics collects measurement data, all IP queries are performed on EU-based servers before traffic is forwarded to Analytics servers for processing. <strong>Service provider:<\/strong> Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Irland; <span class=\"\"><strong>Legal bases:<\/strong> Einwilligung (Art. 6 Abs. 1 S. 1 lit. a) DSGVO); <\/span><strong>Website:<\/strong> <a href=\"https:\/\/marketingplatform.google.com\/intl\/de\/about\/analytics\/\" target=\"_blank\" rel=\"noopener\">https:\/\/marketingplatform.google.com\/intl\/de\/about\/analytics\/<\/a>; <strong>Safety measures:<\/strong> IP-Masking (Pseudonymisierung der IP-Adresse); <strong>Privacy Policy:<\/strong> <a href=\"https:\/\/policies.google.com\/privacy\" target=\"_blank\" rel=\"noopener\">https:\/\/policies.google.com\/privacy<\/a>; <strong>Order processing agreement:<\/strong> <a href=\"https:\/\/business.safety.google\/adsprocessorterms\/\" target=\"_blank\" rel=\"noopener\">https:\/\/business.safety.google\/adsprocessorterms\/<\/a>; <strong>Basis for third-country transfers:<\/strong> Data Privacy Framework (DPF), Standardvertragsklauseln (<a href=\"https:\/\/business.safety.google\/adsprocessorterms\" target=\"_blank\" rel=\"noopener\">https:\/\/business.safety.google\/adsprocessorterms<\/a>); <strong>Right of appeal (Opt-Out):<\/strong> Opt-Out-Plugin: <a href=\"https:\/\/tools.google.com\/dlpage\/gaoptout?hl=de\" target=\"_blank\" rel=\"noopener\">https:\/\/tools.google.com\/dlpage\/gaoptout?hl=de<\/a>, Einstellungen f\u00fcr die Darstellung von Werbeeinblendungen: <a href=\"https:\/\/myadcenter.google.com\/personalizationoff\" target=\"_blank\" rel=\"noopener\">https:\/\/myadcenter.google.com\/personalizationoff<\/a>. <strong>Further information:<\/strong> <a href=\"https:\/\/business.safety.google\/adsservices\/\" target=\"_blank\" rel=\"noopener\">https:\/\/business.safety.google\/adsservices\/<\/a> (Types of processing and the data processed).<\/li><\/ul><h2 id=\"m136\">Presence on social networks (social media)<\/h2><p>We maintain online presences within social networks and process user data in this context in order to communicate with users active there or to provide information about us.<\/p><p>We would like to point out that user data may be processed outside the European Union. This may pose risks for users, as it could, for example, make it more difficult to enforce user rights.<\/p><p>Furthermore, user data within social networks is generally processed for market research and advertising purposes. For example, usage profiles can be created based on user behavior and the resulting interests. These profiles may in turn be used to place advertisements within and outside the networks that are presumed to correspond to the interests of the users. For this reason, cookies are usually stored on users' computers, in which their usage behavior and interests are stored. In addition, data can also be stored in the usage profiles independently of the devices used by users (especially if they are members of the respective platforms and are logged in there).<\/p><p>For a detailed description of the respective forms of processing and the options for objection (opt-out), please refer to the privacy policies and information provided by the operators of the respective networks.<\/p><p>In the case of requests for information and the assertion of data subject rights, we would also like to point out that these can be most effectively asserted with the providers. Only the latter have access to the user data and can take appropriate measures and provide information directly. However, if you still require assistance, you can contact us.<\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Types of data processed:<\/strong> Contact details (e.g., postal and email addresses or telephone numbers); Content data (e.g., text or image messages and posts, as well as information relating to them, such as details of authorship or time of creation). Usage data (e.g., page views and dwell time, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions).<\/li><li class=\"translation-block\"><strong>Affected persons:<\/strong> Users (e.g., website visitors, users of online services).<\/li><li class=\"translation-block\"><strong>Purposes of processing:<\/strong> Communication; feedback (e.g., collecting feedback via online form). Public relations.<\/li><li class=\"translation-block\">Storage and deletion: Deletion in accordance with the information provided in the section \u201cGeneral information on data storage and deletion.\u201d<\/li><li class=\"translation-block\"><strong>Legal basis: <\/strong> Legitimate interests (Art. 6(1)(f) GDPR).<\/li><\/ul><p><strong>Further information on processing procedures, methods, and services:<\/strong><\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Instagram: <\/strong>Social network that allows users to share photos and videos, comment on and favorite posts, send messages, and subscribe to profiles and pages; <strong>Service provider:<\/strong> Meta Platforms Ireland Limited, Merrion Road, Dublin 4, D04 X2K5, Ireland; <span class=\"\"><strong>Legal basis:<\/strong> Legitimate interests (Art. 6 (1) (f) GDPR); <\/span><strong>Website:<\/strong> <a href=\"https:\/\/www.instagram.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.instagram.com<\/a>; <strong>Privacy policy:<\/strong> <a href=\"https:\/\/privacycenter.instagram.com\/policy\/\" target=\"_blank\" rel=\"noopener\">https:\/\/privacycenter.instagram.com\/policy\/<\/a>. <strong>Basis for third-country transfers:<\/strong> Data Privacy Framework (DPF).<\/li><li class=\"translation-block\">LinkedIn: Social network \u2013 Together with LinkedIn Ireland Unlimited Company, we are responsible for collecting (but not further processing) data from visitors, which is used to generate \u201cPage Insights\u201d (statistics) for our LinkedIn profiles. This data includes information about the types of content users view or interact with, as well as the actions they take. In addition, details about the devices used are collected, such as IP addresses, operating system, browser type, language settings, and cookie data, as well as information from user profiles, such as job title, country, industry, hierarchy level, company size, and employment status. Information on LinkedIn's privacy practices regarding the processing of user data can be found in LinkedIn's privacy policy: <a href=\"https:\/\/www.linkedin.com\/legal\/privacy-policy\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com\/legal\/privacy-policy.<\/a><br>Wir haben mit LinkedIn Irland eine spezielle Vereinbarung geschlossen (\u201ePage Insights Joint Controller Addendum\u201c, <a href=\"https:\/\/legal.linkedin.com\/pages-joint-controller-addendum\" target=\"_blank\" rel=\"noopener\">https:\/\/legal.linkedin.com\/pages-joint-controller-addendum<\/a>), in der insbesondere geregelt wird, welche Sicherheitsma\u00dfnahmen LinkedIn beachten muss und in der LinkedIn sich bereit erkl\u00e4rt hat, die Rechte der Betroffenen zu erf\u00fcllen (d. h. Nutzer k\u00f6nnen z. B. Auskunfts- oder L\u00f6schungsanfragen direkt an LinkedIn richten). Die Rechte der Nutzer (insbesondere das Recht auf Auskunft, L\u00f6schung, Widerspruch und Beschwerde bei der zust\u00e4ndigen Aufsichtsbeh\u00f6rde) werden durch die Vereinbarungen mit LinkedIn nicht eingeschr\u00e4nkt. Die gemeinsame Verantwortlichkeit beschr\u00e4nkt sich auf die Erhebung und \u00dcbermittlung der Daten an LinkedIn Irland Unlimited Company, ein Unternehmen mit Sitz in der EU. Die weitere Verarbeitung der Daten obliegt ausschlie\u00dflich LinkedIn Irland Unlimited Company, insbesondere was die \u00dcbermittlung der Daten an die Muttergesellschaft LinkedIn Corporation in den USA betrifft; <strong>Service provider:<\/strong> LinkedIn Ireland Unlimited Company, Wilton Place, Dublin 2, Irland; <span class=\"\"><strong>Legal bases:<\/strong> Berechtigte Interessen (Art. 6 Abs. 1 S. 1 lit. f) DSGVO); <\/span><strong>Website:<\/strong> <a href=\"https:\/\/www.linkedin.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com<\/a>; <strong>Privacy policy:<\/strong> <a href=\"https:\/\/www.linkedin.com\/legal\/privacy-policy\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com\/legal\/privacy-policy<\/a>; <strong>Basis for third-country transfers:<\/strong> Data Privacy Framework (DPF), standard contractual clauses (<a href=\"https:\/\/legal.linkedin.com\/dpa\" target=\"_blank\" rel=\"noopener\">https:\/\/legal.linkedin.com\/dpa<\/a>). <strong>Right to object (opt-out):<\/strong> <a href=\"https:\/\/www.linkedin.com\/psettings\/guest-controls\/retargeting-opt-out\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com\/psettings\/guest-controls\/retargeting-opt-out<\/a>.<\/li><\/ul><h2 id=\"m328\">Plug-ins and embedded functions and content<\/h2><p>We integrate functional and content elements into our online offering that are obtained from the servers of their respective providers (hereinafter referred to as \u201cthird-party providers\u201d). These may include, for example, graphics, videos, or city maps (hereinafter referred to collectively as \u201ccontent\u201d).<\/p><p>The integration always requires that the third-party providers of this content process the IP address of the users, as they would not be able to send the content to their browsers without the IP address. The IP address is therefore necessary for the display of this content or these functions. We endeavor to use only content whose respective providers use the IP address solely for the delivery of the content. Third-party providers may also use so-called pixel tags (invisible graphics, also known as \u201cweb beacons\u201d) for statistical or marketing purposes. Pixel tags can be used to evaluate information such as visitor traffic on the pages of this website. The pseudonymous information can also be stored in cookies on the user's device and may contain, among other things, technical information about the browser and operating system, referring websites, visit time, and other information about the use of our online offering, but may also be linked to such information from other sources.<\/p><p class=\"translation-block\"><strong>Information on legal bases:<\/strong> If we ask users for their consent to the use of third-party providers, the legal basis for data processing is consent. Otherwise, user data is processed on the basis of our legitimate interests (i.e. interest in efficient, economical, and recipient-friendly services). In this context, we would also like to refer you to the information on the use of cookies in this privacy policy.<\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Types of data processed:<\/strong> Usage data (e.g., page views and dwell time, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions). Meta, communication, and procedural data (e.g., IP addresses, time stamps, identification numbers, persons involved).<\/li><li class=\"translation-block\"><strong>Affected persons:<\/strong> Users (e.g., website visitors, users of online services).<\/li><li class=\"translation-block\"><strong>Purpose of processing:<\/strong> Provision of our online offering and user-friendliness.<\/li><li class=\"translation-block\"><strong>Storage and deletion:<\/strong> Deletion in accordance with the information in the section \u201cGeneral information on data storage and deletion.\u201d Storage of cookies for up to 2 years (Unless otherwise specified, cookies and similar storage methods may be stored on users' devices for a period of two years.).<\/li><li class=\"translation-block\"><strong>Legal basis:<\/strong> Consent (Art. 6(1)(a) GDPR). Legitimate interests (Art. 6(1)(f) GDPR).<\/li><\/ul><p><strong>Further information on processing procedures, methods, and services:<\/strong><\/p><ul class=\"m-elements\"><li class=\"translation-block\"><strong>Font Awesome (hosted on our own server): <\/strong>Display of fonts and symbols; <strong>Service provider:<\/strong> The Font Awesome icons are hosted on our server; no data is transmitted to the Font Awesome provider; <span class=\"\"><strong>Legal basis:<\/strong> Legitimate interests (Art. 6 (1) (f) GDPR).<\/span><\/li><\/ul><h2 id=\"m15\">Modification and updating<\/h2><p>We ask you to regularly review the content of our privacy policy. We will amend the privacy policy as soon as changes to the data processing we carry out make this necessary. We will inform you as soon as the changes require action on your part (e.g., consent) or other individual notification.<\/p><p>Where we provide addresses and contact information for companies and organizations in this privacy policy, please note that addresses may change over time and we ask that you verify the information before contacting them.<\/p><h2 id=\"m42\">Definition of terms<\/h2><p>This section provides an overview of the terms used in this privacy policy. Where the terms are defined by law, their legal definitions apply. The following explanations are primarily intended to aid understanding.<\/p><ul class=\"glossary\"><li class=\"translation-block\"><strong>Content data:<\/strong> Content data includes information generated during the creation, editing, and publication of all types of content. This category of data can include text, images, videos, audio files, and other multimedia content published on various platforms and media. Content data is not limited to the actual content itself, but also includes metadata that provides information about the content, such as tags, descriptions, author information, and publication dates.<\/li><li><strong>Kontaktdaten:<\/strong> Kontaktdaten sind essentielle Informationen, die die Kommunikation mit Personen oder Organisationen erm\u00f6glichen. Sie umfassen u.a. Telefonnummern, postalische Adressen und E-Mail-Adressen, sowie Kommunikationsmittel wie soziale Medien-Handles und Instant-Messaging-Identifikatoren.<\/li><li class=\"translation-block\"><strong>Meta, communication, and procedural data:<\/strong> Meta, communication, and procedural data are categories that contain information about how data is processed, transmitted, and managed. Meta data, also known as data about data, includes information that describes the context, origin, and structure of other data. It can include details such as file size, creation date, document author, and change history. Communication data captures the exchange of information between users across various channels, such as email correspondence, call logs, social media messages, and chat histories, including the individuals involved, timestamps, and transmission routes. Procedural data describes the processes and procedures within systems or organizations, including workflow documentation, transaction and activity logs, and audit logs used to track and verify operations.<\/li><li class=\"translation-block\"><strong>Usage data:<\/strong> Usage data refers to information that tracks how users interact with digital products, services, or platforms. This data includes a wide range of information that shows how users use applications, which features they prefer, how long they stay on certain pages, and which paths they navigate through an application. Usage data may also include frequency of use, timestamps of activities, IP addresses, device information, and location data. It is particularly valuable for analyzing user behavior, optimizing user experiences, personalizing content, and improving products or services. In addition, usage data plays a crucial role in identifying trends, preferences, and potential problem areas within digital offerings.<\/li><li class=\"translation-block\"><strong>Personal data:<\/strong> \u201cPersonal data\u201d means any information relating to an identified or identifiable natural person (hereinafter referred to as \u201cdata subject\u201d); A natural person is considered identifiable if they can be identified, directly or indirectly, in particular by association with an identifier such as a name, an identification number, location data, an online identifier (e.g., cookie), or one or more special characteristics that express the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person.<\/li><li class=\"translation-block\"><strong>Profiles with user-related information:<\/strong> The processing of \u201cprofiles with user-related information,\u201d or \u201cprofiles\u201d for short, includes any type of automated processing of personal data that consists of using this personal data to analyze, evaluate, or predict certain personal aspects relating to a natural person (depending on the type of profiling, this may include various information regarding demographics, behavior, and interests, such as interaction with websites and their content, etc.) or to predict them (e.g., interest in certain content or products, click behavior on a website, or location). Cookies and web beacons are often used for profiling purposes.<\/li><li class=\"translation-block\"><strong>Log data:<\/strong> Log data is information about events or activities that have been logged in a system or network. This data typically includes information such as timestamps, IP addresses, user actions, error messages, and other details about the use or operation of a system. Log data is often used to analyze system problems, monitor security, or generate performance reports.<\/li><li class=\"translation-block\"><strong>Reach measurement:<\/strong> Reach measurement (also known as web analytics) is used to evaluate visitor traffic to an online offering and can include the behavior or interests of visitors in certain information, such as website content. With the help of reach analysis, operators of online offerings can, for example, identify at what time users visit their websites and what content they are interested in. This enables them, for example, to better tailor the content of their websites to the needs of their visitors. For the purposes of reach analysis, pseudonymous cookies and web beacons are often used to recognize returning visitors and thus obtain more accurate analyses of the use of an online offering.<\/li><li class=\"translation-block\"><strong>Controller:<\/strong> The \u201ccontroller\u201d is the natural or legal person, public authority, agency, or other body that, alone or jointly with others, determines the purposes and means of the processing of personal data.<\/li><li class=\"translation-block\"><strong>Processing:<\/strong> \u201cProcessing\u201d means any operation or set of operations which is performed on personal data, whether or not by automated means. The term is broad and covers virtually any handling of data, whether it be collection, evaluation, storage, transmission, or deletion.<\/li><\/ul><p class=\"seal\"><a title=\"Rechtstext von Dr. Schwenke - f\u00fcr weitere Informationen bitte anklicken.\" href=\"https:\/\/datenschutz-generator.de\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Legal text by Dr. Schwenke \u2013 click for further information.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Datenschutz Pr\u00e4ambel Mit der folgenden Datenschutzerkl\u00e4rung m\u00f6chten wir Sie dar\u00fcber aufkl\u00e4ren, welche Arten Ihrer personenbezogenen Daten (nachfolgend auch kurz als &#8222;Daten&#8220; bezeichnet) wir zu welchen Zwecken und in welchem Umfang verarbeiten. Die Datenschutzerkl\u00e4rung gilt f\u00fcr alle von uns durchgef\u00fchrten Verarbeitungen personenbezogener Daten, sowohl im Rahmen der Erbringung unserer Leistungen als auch insbesondere auf unseren Webseiten, in mobilen Applikationen sowie innerhalb externer Onlinepr\u00e4senzen, wie z.\u00a0B. unserer Social-Media-Profile (nachfolgend zusammenfassend bezeichnet als &#8222;Onlineangebot&#8220;). Die verwendeten Begriffe sind nicht geschlechtsspezifisch. Stand: 29. Januar 2026 Inhalts\u00fcbersicht Pr\u00e4ambel Verantwortlicher \u00dcbersicht der Verarbeitungen Ma\u00dfgebliche Rechtsgrundlagen Sicherheitsma\u00dfnahmen \u00dcbermittlung von personenbezogenen Daten Internationale Datentransfers Allgemeine Informationen zur Datenspeicherung und L\u00f6schung Rechte der betroffenen Personen Bereitstellung des Onlineangebots und Webhosting Einsatz von Cookies Kontakt- und Anfrageverwaltung Webanalyse, Monitoring und Optimierung Pr\u00e4senzen in sozialen Netzwerken (Social Media) Plug-ins und eingebettete Funktionen sowie Inhalte \u00c4nderung und Aktualisierung Begriffsdefinitionen Verantwortlicher Stefan GruberMaierleiten 624201 Gramastetten E-Mail-Adresse: office@rodltal-huetten.at \u00dcbersicht der Verarbeitungen Die nachfolgende \u00dcbersicht fasst die Arten der verarbeiteten Daten und die Zwecke ihrer Verarbeitung zusammen und verweist auf die betroffenen Personen. Arten der verarbeiteten Daten Kontaktdaten. Inhaltsdaten. Nutzungsdaten. Meta-, Kommunikations- und Verfahrensdaten. Protokolldaten. Kategorien betroffener Personen Kommunikationspartner. Nutzer. Zwecke der Verarbeitung Kommunikation. Sicherheitsma\u00dfnahmen. Reichweitenmessung. Organisations- und Verwaltungsverfahren. Feedback. Profile mit nutzerbezogenen Informationen. Bereitstellung unseres Onlineangebotes und Nutzerfreundlichkeit. Informationstechnische Infrastruktur. \u00d6ffentlichkeitsarbeit. Ma\u00dfgebliche Rechtsgrundlagen Ma\u00dfgebliche Rechtsgrundlagen nach der DSGVO: Im Folgenden erhalten Sie eine \u00dcbersicht der Rechtsgrundlagen der DSGVO, auf deren Basis wir personenbezogene Daten verarbeiten. Bitte nehmen Sie zur Kenntnis, dass neben den Regelungen der DSGVO nationale Datenschutzvorgaben in Ihrem bzw. unserem Wohn- oder Sitzland gelten k\u00f6nnen. Sollten ferner im Einzelfall speziellere Rechtsgrundlagen ma\u00dfgeblich sein, teilen wir Ihnen diese in der Datenschutzerkl\u00e4rung mit. Einwilligung (Art. 6 Abs. 1 S. 1 lit. a) DSGVO) &#8211; Die betroffene Person hat ihre Einwilligung in die Verarbeitung der sie betreffenden personenbezogenen Daten f\u00fcr einen spezifischen Zweck oder mehrere bestimmte Zwecke gegeben. Vertragserf\u00fcllung und vorvertragliche Anfragen (Art. 6 Abs. 1 S. 1 lit. b) DSGVO) &#8211; Die Verarbeitung ist f\u00fcr die Erf\u00fcllung eines Vertrags, dessen Vertragspartei die betroffene Person ist, oder zur Durchf\u00fchrung vorvertraglicher Ma\u00dfnahmen erforderlich, die auf Anfrage der betroffenen Person erfolgen. Berechtigte Interessen (Art. 6 Abs. 1 S. 1 lit. f) DSGVO) &#8211; die Verarbeitung ist zur Wahrung der berechtigten Interessen des Verantwortlichen oder eines Dritten notwendig, vorausgesetzt, dass die Interessen, Grundrechte und Grundfreiheiten der betroffenen Person, die den Schutz personenbezogener Daten verlangen, nicht \u00fcberwiegen. Nationale Datenschutzregelungen in \u00d6sterreich: Zus\u00e4tzlich zu den Datenschutzregelungen der DSGVO gelten nationale Regelungen zum Datenschutz in \u00d6sterreich. Hierzu geh\u00f6rt insbesondere das Bundesgesetz zum Schutz nat\u00fcrlicher Personen bei der Verarbeitung personenbezogener Daten (Datenschutzgesetz \u2013 DSG). Das Datenschutzgesetz enth\u00e4lt insbesondere Spezialregelungen zum Recht auf Auskunft, zum Recht auf Richtigstellung oder L\u00f6schung, zur Verarbeitung besonderer Kategorien personenbezogener Daten, zur Verarbeitung f\u00fcr andere Zwecke und zur \u00dcbermittlung sowie zur automatisierten Entscheidungsfindung im Einzelfall. Sicherheitsma\u00dfnahmen Wir treffen nach Ma\u00dfgabe der gesetzlichen Vorgaben unter Ber\u00fccksichtigung des Stands der Technik, der Implementierungskosten und der Art, des Umfangs, der Umst\u00e4nde und der Zwecke der Verarbeitung sowie der unterschiedlichen Eintrittswahrscheinlichkeiten und des Ausma\u00dfes der Bedrohung der Rechte und Freiheiten nat\u00fcrlicher Personen geeignete technische und organisatorische Ma\u00dfnahmen, um ein dem Risiko angemessenes Schutzniveau zu gew\u00e4hrleisten. Zu den Ma\u00dfnahmen geh\u00f6ren insbesondere die Sicherung der Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit von Daten durch Kontrolle des physischen und elektronischen Zugangs zu den Daten als auch des sie betreffenden Zugriffs, der Eingabe, der Weitergabe, der Sicherung der Verf\u00fcgbarkeit und ihrer Trennung. Des Weiteren haben wir Verfahren eingerichtet, die eine Wahrnehmung von Betroffenenrechten, die L\u00f6schung von Daten und Reaktionen auf die Gef\u00e4hrdung der Daten gew\u00e4hrleisten. Ferner ber\u00fccksichtigen wir den Schutz personenbezogener Daten bereits bei der Entwicklung bzw. Auswahl von Hardware, Software sowie Verfahren entsprechend dem Prinzip des Datenschutzes, durch Technikgestaltung und durch datenschutzfreundliche Voreinstellungen. Sicherung von Online-Verbindungen durch TLS-\/SSL-Verschl\u00fcsselungstechnologie (HTTPS): Um die Daten der Nutzer, die \u00fcber unsere Online-Dienste \u00fcbertragen werden, vor unerlaubten Zugriffen zu sch\u00fctzen, setzen wir auf die TLS-\/SSL-Verschl\u00fcsselungstechnologie. Secure Sockets Layer (SSL) und Transport Layer Security (TLS) sind die Eckpfeiler der sicheren Daten\u00fcbertragung im Internet. Diese Technologien verschl\u00fcsseln die Informationen, die zwischen der Website oder App und dem Browser des Nutzers (oder zwischen zwei Servern) \u00fcbertragen werden, wodurch die Daten vor unbefugtem Zugriff gesch\u00fctzt sind. TLS, als die weiterentwickelte und sicherere Version von SSL, gew\u00e4hrleistet, dass alle Daten\u00fcbertragungen den h\u00f6chsten Sicherheitsstandards entsprechen. Wenn eine Website durch ein SSL-\/TLS-Zertifikat gesichert ist, wird dies durch die Anzeige von HTTPS in der URL signalisiert. Dies dient als ein Indikator f\u00fcr die Nutzer, dass ihre Daten sicher und verschl\u00fcsselt \u00fcbertragen werden. \u00dcbermittlung von personenbezogenen Daten Im Rahmen unserer Verarbeitung von personenbezogenen Daten kommt es vor, dass diese an andere Stellen, Unternehmen, rechtlich selbstst\u00e4ndige Organisationseinheiten oder Personen \u00fcbermittelt beziehungsweise ihnen gegen\u00fcber offengelegt werden. Zu den Empf\u00e4ngern dieser Daten k\u00f6nnen z.\u00a0B. mit IT-Aufgaben beauftragte Dienstleister geh\u00f6ren oder Anbieter von Diensten und Inhalten, die in eine Website eingebunden sind. In solchen F\u00e4llen beachten wir die gesetzlichen Vorgaben und schlie\u00dfen insbesondere entsprechende Vertr\u00e4ge bzw. Vereinbarungen, die dem Schutz Ihrer Daten dienen, mit den Empf\u00e4ngern Ihrer Daten ab. Internationale Datentransfers Datenverarbeitung in Drittl\u00e4ndern: Sofern wir Daten in ein Drittland (d. h. au\u00dferhalb der Europ\u00e4ischen Union (EU) oder des Europ\u00e4ischen Wirtschaftsraums (EWR)) \u00fcbermitteln oder dies im Rahmen der Nutzung von Diensten Dritter oder der Offenlegung bzw. \u00dcbermittlung von Daten an andere Personen, Stellen oder Unternehmen geschieht (was erkennbar wird anhand der Postadresse des jeweiligen Anbieters oder wenn in der Datenschutzerkl\u00e4rung ausdr\u00fccklich auf den Datentransfer in Drittl\u00e4nder hingewiesen wird), erfolgt dies stets im Einklang mit den gesetzlichen Vorgaben. F\u00fcr Daten\u00fcbermittlungen in die USA st\u00fctzen wir uns vorrangig auf das Data Privacy Framework (DPF), welches durch einen Angemessenheitsbeschluss der EU-Kommission vom 10.07.2023 als sicherer Rechtsrahmen anerkannt wurde. Zus\u00e4tzlich haben wir mit den jeweiligen Anbietern Standardvertragsklauseln abgeschlossen, die den Vorgaben der EU-Kommission entsprechen und vertragliche Verpflichtungen zum Schutz Ihrer Daten festlegen. Diese zweifache Absicherung gew\u00e4hrleistet einen umfassenden Schutz Ihrer Daten: Das DPF bildet die prim\u00e4re Schutzebene, w\u00e4hrend die Standardvertragsklauseln als zus\u00e4tzliche Sicherheit dienen. Sollten sich \u00c4nderungen im Rahmen des DPF ergeben, greifen die Standardvertragsklauseln als zuverl\u00e4ssige R\u00fcckfalloption ein. So stellen wir sicher, dass Ihre Daten auch bei etwaigen politischen oder rechtlichen Ver\u00e4nderungen stets angemessen gesch\u00fctzt bleiben. Bei<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1055","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/pages\/1055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/comments?post=1055"}],"version-history":[{"count":22,"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/pages\/1055\/revisions"}],"predecessor-version":[{"id":1509,"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/pages\/1055\/revisions\/1509"}],"wp:attachment":[{"href":"https:\/\/rodltal-huetten.at\/en\/wp-json\/wp\/v2\/media?parent=1055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}