Our app „SummitLynx“, the website https://www.summitlynx.com as well as the social media profiles on Facebook, Instagram, Twitter, LinkedIn and YouTube are operated by the SummitLynx GmbH, Silberbergweg 237, 8971 Schladming, Austria (hereinafter collectively referred to as „we“ or „us“). In this data privacy we describe, how we use and process your personal data in connection with our online services.
The protection of your data is very important to us. If we possess personal data, we will process it with great care and transparency and, of course, only in compliance with the statutory provisions. Personal data means any information relating to an identified or identifiable natural person that contains details of personal or factual circumstances, such as name, address, e-mail address, telephone number, date of birth, photographs, etc.
Overview of processing operations
Depending on who uses our Services (registered users, website visitors, business/cooperation partners) we store the following types of data to the extent necessary in each case:
- Inventory data (e.g. names, addresses).
- Content data (e.g. text input, photographs, videos).
- Contact data (e.g. e-mail, telephone numbers).
- Meta/communication data (e.g. device information, IP addresses).
- Usage data (e.g. websites visited, interest in content, access times).
- Profile settings (e.g. newsletter settings etc)
- Images and/ or video recordings (e.g. photographs or video recordings of a person).
- Location data (Information on the geographical position of a device or person).
- Location history and mobility profiles (Collection of location data and position changes over a certain period of time).
Categories of Data Subjects
- Cooperation partner
- Communication partner (Recipients of e-mails, letters, etc.).
- Users (e.g. website visitors, users of online services, app users).
- Participants in sweepstakes and competitions.
Purposes of Processing
If we process personal data, this is done:
- to provide you with our Services or to be able to arrange contacts/contracts with cooperation partners.
- to protect our overriding legitimate interests, in order to
- further improve and enhance this website
- compile usage statistics; and
- detect, prevent and investigate attacks on our web shop.
Within the scope permitted by law data may also be processed for the following purposes in particular:
- Authentication processes.
- Provision of our online services and usability.
- Conversion tracking (Measurement of the effectiveness of marketing activities).
- Office and organisational procedures.
- Direct marketing (e.g. by e-mail).
- Conducting sweepstakes and contests.
- Affiliate Tracking.
- Contact requests and communication.
- Profiling (Creating user profiles).
- Web Analytics (e.g. access statistics, recognition of returning visitors).
- Security measures.
- Tracking (e.g. interest-/behavorial profiling, cookies)
- Server monitoring and error detection.
- Provision of contractual services and customer support.
- Managing and responding to inquiries.
- Custom Audiences (Selection of relevant target groups for marketing purposes or other output of content).
Legal Bases for the Processing
In the following we inform you about the legal basis of the General Data Protection Regulation (GDPR), on the basis of which we process personal data. Please note that, in addition to the regulations of the GDPR, the national data protection regulations may apply in your country or in our country of residence or domicile. If, in addition, more specific legal bases are applicable in individual cases, we will inform you of these in the data protection declaration.
- Consent (Article 6 (1) (a) GDPR) - The data subject has given consent to the processing of his or her personal data for one or more specific purposes.
- Performance of a contract and prior requests (Article 6 (1) (b) GDPR) - Performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract.
- Legitimate Interests (Article 6 (1) (f) GDPR) - Processing is necessary for the purposes of the legitimate interests pursued by the controller or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data.
Unless otherwise prescribed by law the provision of your personal data is, in principle, voluntary. Please note, however, that if you do not provide us with the personal information we request, this may result in disadvantages such as the inability to provide services, delayed processing, etc.
National data protection regulations in Austria: In addition to the data protection regulations of the General Data Protection Regulation, national regulations apply to data protection in Austria. This includes in particular the Federal Act on the Protection of Individuals with regard to the Processing of Personal Data (Data Protection Act - DSG).
We take appropriate technical and organisational measures in accordance with the legal requirements, taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, in order to ensure a level of security appropriate to the risk. Irrespective of our efforts to keep up a reasonably high level of due diligence at all times it cannot be excluded that information which you have provided to us electronically will be viewed and used by other persons. Please note that we therefore assume no liability whatsoever for disclosure of information due to errors in data transfers for which we are not responsible and/or unauthorised access by third parties (e.g. hacker attacks on email accounts or phones, interception of fax or email messages and the like).
In particular, we take the following measures:
Masking of the IP address: If it is possible for us or the storage of the IP address is not necessary, we shorten or have your IP address shortened. When the IP address is shortened, also known as "IP masking", the last octet, i.e. the last two numbers of an IP address, is deleted (the IP address in this context is an identifier individually assigned to an Internet connection by the online access provider). With the shortening of the IP address, the identification of a person on the basis of their IP address is to be prevented or made considerably more difficult.
SSL encryption (https): In order to protect your data transmitted via our online services in the best possible way, we use SSL encryption. You can recognize such encrypted connections by the prefix https:// in the address bar of your browser.
Transmission and Disclosure of Personal Data
In the context of our processing of personal data, it may happen that the data is transferred to other places, companies or persons or that it is disclosed to them. Recipients of this data may include, for example service providers commissioned with IT tasks or providers of services and content that are embedded in a website. In such a case, the legal requirements will be respected and in particular corresponding contracts or agreements, which serve the protection of your data, will be concluded with the recipients of your data.
Where necessary or if there is a legitimate interest recognised by the GDPR, we will transfer your personal data to the following recipients for permitted purposes:
- IT service providers used by us;
- cooperation partners shown in the online offer;
- providers of services and content that are integrated into the online offer;
- if content to be paid for is offered:
- the payment service provider
- the debt collection agency for the collection of our outstanding accounts receivable
- legal counsel used to enforce or defend civil-law disputes and to prosecute criminal actions;
- public authorities and courts, if required by mandatory law or covered by a legitimate interest.
Data Processing in Third Countries
If we process data in a third country (i.e. outside the European Union (EU), the European Economic Area (EEA)) or the processing takes place in the context of the use of third party services or disclosure or transfer of data to other persons, bodies or companies, this will only take place in accordance with the legal requirements. Subject to express consent or transfer required by contract or law, we process or have processed the data only in third countries with a recognised level of data protection, on the basis of special guarantees, such as a contractual obligation through so-called standard protection clauses of the EU Commission or if certifications or binding internal data protection regulations justify the processing (Article 44 to 49 GDPR, information page of the EU Commission: https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection_de ). These are available on request under email@example.com
Cookies storage period: Unless we provide you with explicit information on the retention period of permanent cookies (e.g. within the scope of a so-called cookie opt-in), please assume that the retention period can be as long as two years.
Data processing when you visit our online offer
Cookies are text files that contain data from visited websites or domains and are stored by a browser on the user's computer. A cookie is primarily used to store information about a user during or after his visit within an online service. The information stored can include, for example, the language settings on a website, the login status, a shopping basket or the location where a video was viewed. The term "cookies" also includes other technologies that fulfil the same functions as cookies (e.g. if user information is stored using pseudonymous online identifiers, also referred to as "user IDs").
The following types and functions of cookies are distinguished:
- Temporary cookies (also: session cookies): Temporary cookies are deleted at the latest after a user has left an online service and closed his browser.Temporary cookies (also: session cookies): Temporary cookies are deleted at the latest after a user has left an online service and closed his browser.
- Permanent cookies: Permanent cookies remain stored even after closing the browser. For example, the login status can be saved or preferred content can be displayed directly when the user visits a website again. The interests of users who are used for range measurement or marketing purposes can also be stored in such a cookie.
- First-Party-Cookies: First-Party-Cookies are set by ourselves.
- Necessary (also: essential) cookies: Cookies can be necessary for the operation of a website (e.g. to save logins or other user inputs or for security reasons).
Provision of online services and web hosting
In order to provide our online services securely and efficiently, we use the services of one or more web hosting providers from whose servers (or servers they manage) the online services can be accessed. For these purposes, we may use infrastructure and platform services, computing capacity, storage space and database services, as well as security and technical maintenance services.
The data processed within the framework of the provision of the hosting services may include all information relating to the users of our online services that is collected in the course of use and communication. This regularly includes the IP address, which is necessary to be able to deliver the contents of online services to browsers, and all entries made within our online services or from websites.
E-mail Sending and Hosting: The web hosting services we use also include sending, receiving and storing e-mails. For these purposes, the addresses of the recipients and senders, as well as other information relating to the sending of e-mails (e.g. the providers involved) and the contents of the respective e-mails are processed. The above data may also be processed for SPAM detection purposes. Please note that e-mails on the Internet are generally not sent in encrypted form. As a rule, e-mails are encrypted during transport, but not on the servers from which they are sent and received (unless a so-called end-to-end encryption method is used). We can therefore accept no responsibility for the transmission path of e-mails between the sender and reception on our server.
Collection of Access Data and Log Files: We, ourselves or our web hosting provider, collect data on the basis of each access to the server (so-called server log files). Server log files may include the address and name of the web pages and files accessed, the date and time of access, data volumes transferred, notification of successful access, browser type and version, the user's operating system, referrer URL (the previously visited page) and, as a general rule, IP addresses and the requesting provider.
The server log files can be used for security purposes, e.g. to avoid overloading the servers (especially in the case of abusive attacks, so-called DDoS attacks) and to ensure the stability and optimal load balancing of the servers .
Services and service providers being used:
Special Notes on the SummitLynx Application (App)
Storage of the universally unique identifier (UUID): The application stores a so-called Universally Unique Identifier (UUID) for the purpose of analysing the use and functionality of the application and storing the user's settings. This identifier is generated when the application is installed (but is not connected to the device, so no device ID in this sense), remains stored between the start of the application and its updates and is deleted when users remove the application from their device.
Device authorizations for access to functions and data: The use of certain functions of our application may require access to the camera and the stored recordings of the users. By default, these authorizations must be granted by the user and can be revoked at any time in the settings of the respective devices. The exact procedure for controlling app permissions may depend on the user's device and software. Users can contact us if they require further explanation. We would like to point out that the refusal or revocation of the respective authorizations can affect the functionality of our application.
Accessing the camera and stored recordings: In the course of using our application, image and/or video recordings (whereby audio recordings are also included) of the users (and of other persons captured by the recordings) are processed by accessing the camera functions or stored recordings. Access to the camera functions or stored recordings requires an authorization by the user that can be withdrawn at any time. The processing of the image and/or video recordings serves only to provide the respective functionality of our application, according to its description to the users or the typical and expectable functionality of the application.
Processing of location data: Within the course of using our application, the location data collected by the device used or otherwise entered by the user are processed. The use of the location data requires an authorization of the users, which can be revoked at any time. The use of the location data serves only to provide the respective functionality of our application, according to its description to the users or its typical and expectable functionality.
Location history and movement profiles: Based on the location data collected in the course of using our application, a location history is generated which shows the geographical movements of the devices used over a period of time (and can allow to draw conclusions about the movement profile of the users). The location history is only used to provide the respective functionality of our application, according to its description to the users, or its typical and expectable functionality.
Purchase of applications via Appstores
The purchase of our apps is done via special online platforms operated by other service providers (so-called "appstores"). In this context, the data protection notices of the respective appstores apply in addition to our data protection notices. This applies in particular with regard to the methods used on the platforms for webanalytics and for interest-related marketing as well as possible costs.
Services and service providers being used:
Registration, Login and User Account
Users can create a user account. Within the scope of registration, the required mandatory information is communicated to the users and processed for the purposes of providing the user account on the basis of contractual fulfilment of obligations. The processed data includes in particular the login information (name, password and an e-mail address). The data entered during registration will be used for the purposes of using the user account and its purpose. Furthermore, hiking journal entries including GPS data, date and time of the entries and photos will be stored when you use the user account. This information may be visible via widgets on our website or on partner websites, provided that in your profile settings you actively give us permission to show it.
Users may be informed by e-mail of information relevant to their user account, such as technical changes. If users have terminated their user account, their data will be deleted with regard to the user account, subject to a statutory retention obligation. It is the responsibility of the users to secure their data before the end of the contract in the event of termination. We are entitled to irretrievably delete all user data stored during the term of the contract.
Within the scope of using our registration and login functions as well as the use of the user account, we store the IP address and the time of the respective user action. The storage is based on our legitimate interests, as well as the user's protection against misuse and other unauthorized use. This data will not be passed on to third parties unless it is necessary to pursue our claims or there is a legal obligation to do so.
Single Sign-on Authentication
Single Sign-On" or "Single Sign-On Authentication or Logon" are procedures that allow users to log in to our online services using a user account with a provider of Single Sign-On services (e.g. a social network). The prerequisite for Single Sign-On Authentication is that users are registered with the respective Single Sign-On provider and enter the required access data in the online form provided for this purpose, or are already logged in with the Single Sign-On provider and confirm the Single Sign-On login via the button.
Authentication takes place directly with the respective single sign-on provider. Within the scope of such authentication, we receive a user ID with the information that the user is logged in with the respective single sign-on provider under this user ID and an ID that cannot be used for other purposes (so-called "user handle"). Whether we receive further data depends solely on the single sign-on procedure used, the data releases selected as part of authentication and also which data users have released in the privacy or other settings of the user account with the single sign-on provider. Depending on the single sign-on provider and the user's choice, there can be different data, usually the e-mail address and the user name. The password entered by the single sign-on provider as part of the single sign-on procedure is neither visible to us nor is it stored by us. Users are requested to note that their data stored with us can be automatically compared with their user account with the single sign-on provider, but this is not always possible or actual. If, for example, the e-mail addresses of users change, users must change these manually in their user account with us.
Should users decide to no longer want to use the link of their user account with the Single Sign-On provider for the Single Sign-On procedure, they must remove this link within their user account with the Single Sign-On provider. If users wish to delete their data from us, they must cancel their registration with us.
Services and service providers being used:
When contacting us (e.g. by contact form, e-mail, telephone or via social media), the data of the inquiring persons are processed insofar as this is necessary to answer the contact enquiries and any requested activities.
The response to contact enquiries within the framework of contractual or pre-contractual relationships is made in order to fulfil our contractual obligations or to respond to (pre)contractual enquiries and otherwise on the basis of the legitimate interests in responding to the enquiries.
- Processed data types: Inventory data (e.g. names, addresses), Contact data (e.g. e-mail, telephone numbers), Content data (e.g. text input, photographs, videos).
- Individuals concerned: Communication partner.
- Purposes of Processing: Contact requests and communication.
- Legal Basis: Performance of a contract and prior requests (Article 6 (1) (b) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
Communication via Messenger
We use messenger services for communication purposes and therefore ask you to observe the following information regarding the functionality of the messenger services, encryption, use of the metadata of the communication and your objection options.
You can also contact us by alternative means, e.g. telephone or e-mail. Please use the contact options provided to you or use the contact options provided within our online services.
In the case of encryption of content (i.e. the content of your message and attachments), we point out that the communication content (i.e. the content of the message and attachments) is encrypted end-to-end. This means that the content of the messages is not visible, not even by the messenger service providers themselves. You should always use a current version of the messenger service with activated encryption, so that the encryption of the message contents is guaranteed.
However, we would like to point out to our communication partners that although messenger service providers do not see the content, they can find out that and when communication partners communicate with us and process technical information on the communication partner's device used and, depending on the settings of their device, also location information (so-called metadata).
Information on Legal basis: If we ask communication partners for permission before communicating with them via messenger services, the legal basis of our processing of their data is their consent. Otherwise, if we do not request consent and you contact us, for example, voluntarily, we use messenger services in our dealings with our contractual partners and as part of the contract initiation process as a contractual measure and in the case of other interested parties and communication partners on the basis of our legitimate interests in fast and efficient communication and meeting the needs of our communication partners for communication via messenger services. We would also like to point out that we do not transmit the contact data provided to us to the messenger service providers for the first time without your consent.
Withdrawal, objection and deletion: You can withdraw your consent or object to communication with us via messenger services at any time.In the case of communication via messenger services, we delete the messages in accordance with our general data retention policy (i.e. as described above after the end of contractual relationships, archiving requirements, etc.) and otherwise as soon as we can assume that we have answered any information provided by the communication partners, if no reference to a previous conversation is to be expected and there are no legal obligations to store the messages to prevent their deletion.
Reservation of reference to other means of communication: Finally, we would like to point out that we reserve the right, for reasons of your safety, not to answer inquiries about messenger services. This is the case if, for example, internal contractual matters require special secrecy or if an answer via the messenger services does not meet the formal requirements. In such cases we refer you to more appropriate communication channels.
- Processed data types: Contact data (e.g. e-mail, telephone numbers), Usage data (e.g. websites visited, interest in content, access times), Meta/communication data (e.g. device information, IP addresses).
Individuals concernced: Communication partner:
- Purposes of Processing: Contact requests and communication, Direct marketing (e.g. by e-mail or postal).
- Legal Basis: Consent (Article 6 (1) (a) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
Services and service providers being used:
With the consent of the users, we can send the users so-called "push notifications". These are messages that are displayed on users' screens, devices or browsers, even if our online services are not being actively used.
In order to sign up for push messages, users must confirm that their browser or device has requested to receive push messages. This approval process is documented and stored. The storage is necessary to recognize whether users have consented to receive the push messages and to be able to prove their consent. For these purposes, a pseudonymous identifier of the browser (so-called "push token") or the device ID of a terminal device is stored. Users can change the receipt of push messages at any time using the notification settings of their respective browsers or end devices.
Push messages with commercial information: The push notifications we send may contain commercial information. The commercial push messages are processed on the basis of user consent. In addition, our newsletters contain information about our services and us.
Location-dependent delivery of push messages: The push notifications sent by us can be displayed depending on the location of the users based on the location data transmitted by the device used. This is the case particuarily when you are situated nearby a location (standard app function).
Analysis and performance measurement: We statistically evaluate push messages and can thus identify if and when push messages were displayed and clicked on. This information is used for the technical improvement of our push messages based on technical data or target groups and their retrieval behavior or retrieval times. For technical reasons, this information can be assigned to individual push message recipients. However, it is neither our intention nor, if used, that of the push message service provider to monitor individual users. Rather, the evaluations serve to identify the usage habits of our users and to adapt our push messages to them or to send different push messages according to the interests of our users.
Users can object to the analysis and performance measurement by unsubscribing from the push messages. Unfortunately, it is not possible to cancel the analysis and performance measurement separately.
Services and service providers being used:
Newsletter and Electronic Communications
We regularly mail newsletters that will inform you about our Services, especially features and updates (legitimate interest), and also include advertising content. For this purpose we use an efficient and secure mailing system. Subscription to the newsletter is done by confirming your email address. You may unsubscribe at any time by clicking on the unsubscribe link at the bottom of each newsletter or by sending an email to firstname.lastname@example.org.
In addition, email notifications will be sent when a trophy or badge is gained. You may withdraw your consent to this at any time in your profile settings.
Based on our legitimate interests we may store unsubscribed email addresses for up to three years before deleting them to prove that consent was previously given. The processing of this data is limited to the purpose of a possible defence of claims. An individual deletion request may be made at any time, as long as the past existence of consent is confirmed at the same time. In the case of obligations to permanently comply with objections we reserve the right to store the email address in a "Blocklist" for this purpose alone.
Analysis and performance measurement: The newsletters contain a so-called "web-beacon", i.e. a pixel-sized file, which is retrieved from our server when the newsletter is opened or, if we use a mailing service provider, from its server. Within the scope of this retrieval, technical information such as information about the browser and your system, as well as your IP address and time of retrieval are first collected. This information is used for the technical improvement of our newsletter on the basis of technical data or target groups and their reading behaviour on the basis of their retrieval points (which can be determined with the help of the IP address) or access times. This analysis also includes determining whether newsletters are opened, when they are opened and which links are clicked. For technical reasons, this information can be assigned to the individual newsletter recipients. It is, however, neither our endeavour nor, if used, that of the shipping service provider to observe individual users. The evaluations serve us much more to recognize the reading habits of our users and to adapt our content to them or to send different content according to the interests of our users.The evaluation of the newsletter and the measurement of success is carried out, subject to the express consent of the user, on the basis of our legitimate interests for the purposes of using a user-friendly and secure newsletter system which serves both our business interests and the expectations of the user.A separate objection to the performance measurement is unfortunately not possible, in this case the entire newsletter subscription must be cancelled or objected to.
Following newsletter provider is used:
Sweepstakes and Contests
We process the personal data of participants in We process personal data of participants in competitions, contents, raffles, prize-draws or sweepstakes (hereinafter referred to as "competitions") only in compliance with the relevant data protection regulations and if the processing is contractually necessary for the provision, execution and handling of the competition, the participants have consented to the processing or the processing serves our legitimate interests (e.g. in the security of the competition or the protection of our interests against misuse by possible recording of IP addresses when submitting entries to the competition.
In the event that entries are published as part of the competitions (e.g. as part of a vote or presentation of the competition entries, or the winner or reporting on the competition), we would like to point out that the names of participants may also be published in this context. The participants can object to this at any time.
If the competitions take place within an online platform or a social network (e.g. Facebook or Instagram, hereinafter referred to as "online platform"), the usage and data protection provisions of the respective online platforms also apply. The same situation is given in case of competitions of your cooperation partners (local tourism providers). In such cases, we would like to point out that we are responsible for the information provided by the participants as part of the competition and that we must be contacted with regard to the competitions.
The data of the participants will be deleted as soon as the competition has ended and the data is no longer required to inform the winners or because questions about the competition can be expected. In general, the data of the participants will be deleted at the latest 6 months after the end of the competition. Winners' data can be retained for a longer period of time, e.g. in order to answer questions about the prizes or to fulfil the prizes; in this case, the retention period depends on the type of prize and is up to three years for items or services, e.g. in order to be able to process warranty claims. Furthermore, the participants' data may be stored for longer, e.g. in the form of coverage of the competition in online and offline media.
Insofar as data was collected for other purposes as part of the competition, its processing and storage period shall be governed by the privacy information for this use (e.g. in the case of registration for a newsletter as part of a competition).
Web Analysis, Monitoring and Optimization
Web analysis is used to evaluate the visitor traffic on our website and may include the behaviour, interests or demographic information of users, such as age or gender, as pseudonymous values. With the help of web analysis we can e.g. recognize, at which time our online services or their functions or contents are most frequently used or requested for repeatedly, as well as which areas require optimization.
In addition to web analysis, we can also use test procedures, e.g. to test and optimize different versions of our online services or their components.
For these purposes, so-called user profiles can be created and stored in a file (so-called "cookie") or similar procedures in which the relevant user information for the aforementioned analyses is stored. This information may include, for example, content viewed, web pages visited and elements and technical data used there, such as the browser used, computer system used and information on times of use. If users have consented to the collection of their location data, these may also be processed, depending on the provider.
The IP addresses of the users are also stored. However, we use any existing IP masking procedure (i.e. pseudonymisation by shortening the IP address) to protect the user. In general, within the framework of web analysis, A/B testing and optimisation, no user data (such as e-mail addresses or names) is stored, but pseudonyms. This means that we, as well as the providers of the software used, do not know the actual identity of the users, but only the information stored in their profiles for the purposes of the respective processes.
Services and service providers being used:
- Sentry: Monitoring of system stability and identification of code errors, details of the device or time of error will be collected pseudonymously and deleted subsequently; Service provider: Functional Software Inc., Sentry, 132 Hawthorne Street, San Francisco, California 94107, USA; Website: https://sentry.io; Sicherheitsmaßnahmen: IP-Masking (Pseudonymisierung der IP-Adresse); Datenschutzerklärung: https://sentry.io/privacy.
- Matomo: is an open source software that is used for analysing and statistical evaluation of the use of the website. The information about website usage obtained through cookies is transmitted exclusively to our servers and summarised in pseudonymous usage profiles. The data is used for evaluating use of the website. The data recorded is not disclosed to third parties. The IP addresses are anonymised (IP masking) so that no attribution to specific users can be done.
Profiles in Social Networks (Social Media)
We maintain online presences within social networks and process user data in this context in order to communicate with the users active there or to offer information about us.
We would like to point out that user data may be processed outside the European Union. This may entail risks for users, e.g. by making it more difficult to enforce users' rights.
In addition, user data is usually processed within social networks for market research and advertising purposes. For example, user profiles can be created on the basis of user behaviour and the associated interests of users. The user profiles can then be used, for example, to place advertisements within and outside the networks which are presumed to correspond to the interests of the users. For these purposes, cookies are usually stored on the user's computer, in which the user's usage behaviour and interests are stored. Furthermore, data can be stored in the user profiles independently of the devices used by the users (especially if the users are members of the respective networs or will become members later on).
For a detailed description of the respective processing operations and the opt-out options, please refer to the respective data protection declarations and information provided by the providers of the respective networks.
Also in the case of requests for information and the exercise of rights of data subjects, we point out that these can be most effectively pursued with the providers. Only the providers have access to the data of the users and can directly take appropriate measures and provide information. If you still need help, please do not hesitate to contact us.
Meta: We are jointly responsible (so called "joint controller") with Meta Ireland Ltd. for the collection (but not the further processing) of data of visitors to our Facebook page. This data includes information about the types of content users view or interact with, or the actions they take (see "Things that you and others do and provide" in the Facebook Data Policy: https://www.facebook.com/policy), and information about the devices used by users (e.g., IP addresses, operating system, browser type, language settings, cookie information; see "Device Information" in the Facebook Data Policy: https://www.facebook.com/policy). As explained in the Facebook Data Policy under "How we use this information?" Facebook also collects and uses information to provide analytics services, known as "page insights," to site operators to help them understand how people interact with their pages and with content associated with them. We have concluded a special agreement with Facebook ("Information about Page-Insights", https://www.facebook.com/legal/terms/page_controller_addendum), which regulates in particular the security measures that Facebook must observe and in which Facebook has agreed to fulfill the rights of the persons concerned (i.e. users can send information access or deletion requests directly to Facebook). The rights of users (in particular to access to information, erasure, objection and complaint to the competent supervisory authority) are not restricted by the agreements with Facebook. Further information can be found in the "Information about Page Insights" (https://www.facebook.com/legal/terms/information_about_page_insights_data).
Services and service providers being used:
Plugins and embedded functions and content
Within our online services, we integrate functional and content elements that are obtained from the servers of their respective providers (hereinafter referred to as "third-party providers"). These may, for example, be maps, graphics, videos or social media buttons as well as contributions (hereinafter uniformly referred to as "Content").
The integration always presupposes that the third-party providers of this content process the IP address of the user, since they could not send the content to their browser without the IP address. The IP address is therefore required for the presentation of these contents or functions. We strive to use only those contents, whose respective offerers use the IP address only for the distribution of the contents. Third parties may also use so-called pixel tags (invisible graphics, also known as "web beacons") for statistical or marketing purposes. The "pixel tags" can be used to evaluate information such as visitor traffic on the pages of this website. The pseudonymous information may also be stored in cookies on the user's device and may include technical information about the browser and operating system, referring websites, visit times and other information about the use of our website, as well as may be linked to such information from other sources.
Services and service providers being used:
- Toursprung: We integrate the maps of the service "Toursprung". Toursprung uses user data exclusively for the purpose of displaying map functions and temporarily storing the selected settings. This data may include, in particular, IP addresses and location data of users, which are not collected without their consent (usually within the context of the settings of their mobile devices). Service provider: Toursprung GmbH; Website: https://www.toursprung.com/.
Erasure of data
The data processed by us will be erased in accordance with the statutory provisions as soon as their processing is revoked or other permissions no longer apply (e.g. if the purpose of processing this data no longer applies or they are not required for the purpose).
If the data is not deleted because they are required for other and legally permissible purposes, their processing is limited to these purposes. This means that the data will be restricted and not processed for other purposes.
Rights of Data Subjects
As data subject, you are entitled to various rights under the GDPR, which arise in particular from Articles 15 to 21 of the GDPR:
Right to Object: You have the right, on grounds arising from your particular situation, to object at any time to the processing of your personal data which is based on letter (e) or (f) of Article 6(1) GDPR , including profiling based on those provisions.Where personal data are processed for direct marketing purposes, you have the right to object at any time to the processing of the personal data concerning you for the purpose of such marketing, which includes profiling to the extent that it is related to such direct marketing.
- Right of withdrawal for consents: You have the right to revoke consents at any time.
- Right of access: You have the right to request confirmation as to whether the data in question will be processed and to be informed of this data and to receive further information and a copy of the data in accordance with the provisions of the law.
- Right to rectification: You have the right, in accordance with the law, to request the completion of the data concerning you or the rectification of the incorrect data concerning you.
- Right to Erasure and Right to Restriction of Processing: In accordance with the statutory provisions, you have the right to demand that the relevant data be erased immediately or, alternatively, to demand that the processing of the data be restricted in accordance with the statutory provisions.
- Right to data portability: You have the right to receive data concerning you which you have provided to us in a structured, common and machine-readable format in accordance with the legal requirements, or to request its transmission to another controller.
- Complaint to the supervisory authority: You also have the right, under the conditions laid down by law, to lodge a complaint with a supervisory authority, in particular in the Member State of your habitual residence, place of work or place of the alleged infringement if you consider that the processing of personal data relating to you infringes the GDPR.
Supervisory authority competent for us:
Barichgasse 40-42, 1030 Vienna
Phone: +43 1 52 152-0
Terminology and Definitions
- Cross-Device Tracking: Cross-Device Tracking is a form of tracking in which behavior and interest information of the user is recorded across all devices in so-called profiles by assigning an online identifier to the user. This means that user information can usually be analysed for marketing purposes, regardless of the browser or device used (e.g. mobile phone or desktop computer). With most Cross-Device Tracking providers, the online identifier is not linked to plain data such as names, postal addresses or e-mail addresses.
- IP Masking: IP masking is a method by which the last octet, i.e. the last two numbers of an IP address, are deleted so that the IP address alone can no longer be used to uniquely identify a person. IP masking is therefore a means of pseudonymising processing methods, particularly in online marketing.
- Interest-based and behavioral marketing: Interest-related and/or behaviour-related marketing is the term used when potential user interest in advertisements and other content is predicted if possible. This is done on the basis of information on the previous behaviour of users (e.g. visiting and staying on certain websites, purchasing behaviour or interaction with other users), which is stored in a so-called profile. For these purposes cookies are usually used.
- Clicktracking: Clicktracking allows users to keep track of their movements within an entire website. Since the results of these tests are more accurate if the interaction of the users can be followed over a certain period of time (e.g. if a user likes to return), cookies are usually stored on the computers of the users for these test purposes.
- Conversion tracking: Conversion tracking is a method used to evaluate the effectiveness of marketing measures. For this purpose, a cookie is usually stored on the devices of the users within the websites on which the marketing measures take place and then called up again on the target website (e.g. we can thus trace whether the advertisements placed by us on other websites were successful).
- Personal Data: "personal data" means any information relating to an identified or identifiable natural person ("data subject"); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
- Profiling: "Profiling" means any automated processing of personal data consisting in the use of such personal data to analyse, evaluate or predict certain personal aspects relating to a natural person (depending on the type of profiling, this includes information regarding age, gender, location and movement data, interaction with websites and their contents, shopping behaviour, social interactions with other people) (e.g. interests in certain contents or products, click behaviour on a website or the location). Cookies and web beacons are often used for profiling purposes.
- Web Analytics: Web Analytics serves the evaluation of visitor traffic of online services and can determine their behavior or interests in certain information, such as content of websites. With the help of web analytics, website owners, for example, can recognize at what time visitors visit their website and what content they are interested in. This allows them, for example, to optimize the content of the website to better meet the needs of their visitors. For purposes of web analytics, pseudonymous cookies and web beacons are frequently used in order to recognise returning visitors and thus obtain more precise analyses of the use of an online service.
- Server monitoring and error detection: With the help of server monitoring and error detection, we ensure the availability and integrity of our online service and use the data processed in this process to technically optimise our online services. For this purpose, performance, utilization and comparable technical values, which provide information about the stability and any conspicuous features of our online offer, are processed. In the event of errors and irregularities, individual requests from users of our online services are recorded in order to identify and eliminate sources of problems.
- Location data: Location data is created when a mobile device (or another device with the technical requirements for a location determination) connects to a radio cell, a WLAN or similar technical means and functions of location determination. Location data serve to indicate the geographically determinable position of the earth at which the respective device is located. Location data can be used, for example, to display map functions or other information dependent on a location.
- Location history and mobility profiles: Location history (also referred to as " mobility profile") is the collection of location data over a certain period of time. The location history allows conclusions to be drawn about the geographical movements (i.e. changes in position) of devices and/or their users.
- Web Analytics:Web Analytics serves the evaluation of visitor traffic of online services and can determine their behavior or interests in certain information, such as content of websites. With the help of web analytics, website owners, for example, can recognize at what time visitors visit their website and what content they are interested in. This allows them, for example, to optimize the content of the website to better meet the needs of their visitors. For purposes of web analytics, pseudonymous cookies and web beacons are frequently used in order to recognise returning visitors and thus obtain more precise analyses of the use of an online service.
- Controller: "Controller" means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data.
- Processing: The term "processing" covers a wide range and practically every handling of data, be it collection, evaluation, storage, transmission or erasure.
- Affiliate Tracking: Custom Audiences refers to the process of determining target groups for advertising purposes, e.g. the display of advertisements. For example, a user's interest in certain products or topics on the Internet may be used to conclude that the user is interested in advertisements for similar products or the online store in which the user viewed the products. "Lookalike Audiences" is the term used to describe content that is viewed as suitable by users whose profiles or interests presumably correspond to the users for whom the profiles were created. For the purposes of creating custom audiences and lookalike audiences, cookies and web beacons are typically used.
Our contact information
Company: SummitLynx GmbH
Company address: Silberbergweg 237, 8971 Schladming, Austria
Authorized representatives: DI (FH) Peter Höflehner & Mag. Michael Tritscher
Company registry number: 384313t
Email address: email@example.com
Created with Datenschutz-Generator.de by Dr. jur. Thomas Schwenke, legal texts adapted by the website owner