Information on Data Privacy on the Internet
With this Data Privacy Statement M2M-Concepts and exceet Secure Solutions declare that we recognize the usual provisions on data privacy and document them in our enterprise and in our business processes.
We want to give you as much control over your personal data as possible. Normally, you can access our web pages without needing to provide any information about yourself. In certain cases, however, we do require you to submit your name and address. If you should decide to transmit personal data to us or our business partners via the Internet, e.g. so that we can correspond with you or handle subscriptions, we will, for reasons of simpler and more rapid processing, store this data. Should you request that we no longer use this data to contact you in future, we will of course respect that wish.
Where a contractual relationship between yourself and us shall be created, be given form and content or be amended, we collect and use your personal data to the extent necessary for this purpose. Upon an order by a responsible authority, we may in individual instances issue information on this data (inventory data) in as much as this is required for purposes of criminal prosecution, or to avert dangers, or in the course of the fulfillment of statutory duties of domestic security authorities or military intelligence, or to assert intellectual property rights.
We gather and use your personal data to the extent that this is necessary to enable the use of our Internet site or for invoicing purposes (usage data). In particular, such data concerns information features that identify you personally as well as information on the beginning and termination as well as the volume of use of our Internet site. For purposes of advertising, market research and needs-oriented design of our Internet site, we have the right to create user profiles using pseudonyms. You have the right to object to such use of your data. We are not permitted to merge the user profiles with data on the bearer of the pseudonym. Upon an order by a responsible authority, we may in individual instances issue information on this data (usage data), in as much as this is required for purposes of criminal prosecution, or to avert dangers, or in the course of the fulfillment of statutory duties of domestic security authorities or military intelligence, or to assert intellectual property rights.
Data Transfer and Data Logging for System-Related and Statistical Purposes
For technical reasons, your Internet browser automatically transmits data to our webserver when you access our website. Among other information, this data pertains to the date and time of access, the URL of the referring website, the accessed file, the quantity of transmitted data, the browser type and version, the operating system, as well as your IP address. This data is stored separately from other data you submit as part of your use of our Internet site. We are not able to match this data to a specific person. This data is evaluated for statistical purposes and deleted thereafter.
The website www.m2m-benefit.com contains links to other websites. M2M-Concepts and exceet Secure Solutions are not responsible for the content of these websites or their compliance with data privacy regulations.
In order to expand the functional scope of our Internet site and make usage more comfortable for you, we make use of so-called “cookies”. With the aid of these cookies we are able to save data to your access device when you access our website. You can prevent us from saving cookies to your device by setting your browser accordingly. This, however, may limit the functional scope of our Internet site.
For analysis purposes we rely on proprietary programs as well as services by external web statistics providers. Where statistics are compiled by external service providers, the base data is likewise made available to these providers. In each instance of access to our Internet site, the following data are processed for statistical purposes, a process during which, however, the individual user remains anonymous: Name of requested file, date and time of access, transmitted data volume, IP address.