Back to TacOps

Privacy Policy

As of February 13, 2026

Summary

This privacy policy provides an overview of the processing of your data by TacOps ("we," "us"). We take the protection of your personal data very seriously and treat your personal data confidentially and in accordance with the statutory data protection regulations and this privacy policy.

Preamble

With the following privacy policy, we would like to inform you about the types of your personal data (hereinafter also referred to as "data") we process, for what purposes, and to what extent. The privacy policy applies to all processing of personal data carried out by us, both in the context of providing our services and, in particular, on our websites, in mobile applications and within external online presences, such as our social media profiles (hereinafter collectively referred to as "online offering").

The terms used are not gender-specific.

Table of contents

Responsible Person (Imprint)

Patrick Probst
c/o IP-Management #8844
Ludwig-Erhard-Str. 18
20459 Hamburg

Email address: admin@tacops.gg

Overview of processing

The following overview summarizes the types of data processed and the purposes for which they are processed and refers to the data subjects.

Types of data processed

  • Inventory data.
  • Contact data.
  • Content data.
  • Usage data.
  • Meta, communication, and procedural data.
  • Log data.

Categories of data subjects

  • Communication partners.
  • Users.

Purposes of processing

  • Provision of contractual services and fulfillment of contractual obligations.
  • Communication.
  • Security measures.
  • Reach measurement.
  • Tracking.
  • Office and organizational procedures.
  • Audience building.
  • Organizational and administrative procedures.
  • Feedback.
  • Marketing.
  • Profiles with user-related information.
  • Registration procedures.
  • Provision of our online services and user-friendliness.
  • Information technology infrastructure.
  • Public relations.

Relevant legal bases

Relevant legal bases under the GDPR: Below you will find an overview of the legal bases of the GDPR on the basis of which we process personal data. Please note that in addition to the provisions of the GDPR, national data protection regulations may apply in your or our country of residence or domicile . If more specific legal bases are relevant in individual cases, we will inform you of this in the privacy policy.

  • Consent (Art. 6 (1) (a) GDPR) - The data subject has given their consent to the processing of their personal data for a specific purpose or several specific purposes.
  • Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (b) GDPR) - Processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract.
  • Legitimate interests (Art. 6 (1) (f) GDPR) - Processing is necessary for the pursuit of the legitimate interests of the controller or a third party, provided that the interests, fundamental rights, and freedoms of the data subject requiring the protection of personal data do not prevail.

National data protection regulations in Germany: In addition to the data protection regulations of the GDPR, national regulations on data protection apply in Germany. These include, in particular, the Act on the Protection against Misuse of Personal Data in Data Processing (Federal Data Protection Act - BDSG). The BDSG contains in particular special regulations on the right to information, the right to erasure, the right to object, the processing of special categories of personal data, processing for other purposes and transfer as well as automated decision-making in individual cases, including profiling. Furthermore, state data protection laws of the individual federal states may apply.

Security measures

We take appropriate technical and organizational measures to ensure a level of protection appropriate to the risk, taking into account the state of the art, implementation costs and the nature, scope, context and purposes of processing as well as the different probabilities of occurrence and the severity of the risk to the rights and freedoms of natural persons.

These measures include, in particular, ensuring the confidentiality, integrity, and availability of data by controlling physical and electronic access to the data as well as access to it, input, disclosure, securing availability, and separation. Furthermore, we have established procedures that ensure the exercise of data subjects' rights, the deletion of data, and responses to threats to data. In addition, we take the protection of personal data into account as early as the development or selection stage of hardware, software, and procedures in accordance with the principle of data protection, through technology design and data protection-friendly default settings.

Truncation of the IP address: If IP addresses are processed by us or by the service providers and technologies we use and the processing of a complete IP address is not necessary, the IP address is truncated (also known as "IP masking"). This involves removing the last two digits or the last part of the IP address after a dot or replacing them with placeholders. The purpose of shortening the IP address is to prevent or significantly impede the identification of a person based on their IP address.

Securing online connections with TLS/SSL encryption technology (HTTPS): To protect the data of users that is transmitted via our online services from unauthorized access, we use TLS/SSL encryption technology. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are the cornerstones of secure data transmission on the Internet. These technologies encrypt the information that is transmitted between the website or app and the user's browser (or between two servers), thereby protecting the data from unauthorized access. TLS, as the more advanced and secure version of SSL, ensures that all data transfers meet the highest security standards. When a website is secured by an SSL/TLS certificate, this is signaled by the display of HTTPS in the URL. This serves as an indicator to users that their data is being transmitted securely and encrypted.

Transfer of personal data

In the course of our processing of personal data, it may happen that this data is transferred to or disclosed to other bodies, companies, legally independent organizational units, or persons. The recipients of this data may include, for example, service providers commissioned with IT tasks or providers of services and content that are integrated into a website. In such cases, The recipients of this data may include, for example, service providers commissioned with IT tasks or providers of services and content that are integrated into a website. In such cases, we observe the legal requirements and, in particular, conclude appropriate contracts or agreements with the recipients of your data that serve to protect your data.

International data transfers

Data processing in third countries: If we transfer data to a third country (i.e., outside the European Union (EU) or the European Economic Area (EEA)) or if this occurs in the context of the use of third-party services or the disclosure or transfer of data to other persons, bodies, or companies (which can be identified by the postal address of the respective provider or if the privacy policy expressly refers to the transfer of data to third countries), this is always done in accordance with the legal requirements.

For data transfers to the USA, we primarily rely on the Data Privacy Framework (DPF), which was recognized as a secure legal framework by an adequacy decision of the EU Commission on July 10, 2023. In addition, we have concluded standard contractual clauses with the respective providers that comply with the requirements of the EU Commission and stipulate contractual obligations to protect your data.

This double safeguard ensures comprehensive protection of your data: The DPF forms the primary level of protection, while the standard contractual clauses serve as additional security. Should changes occur within the framework of the DPF, the standard contractual clauses will serve as a reliable fallback option. In this way, we ensure that your data will always remain adequately protected , even in the event of political or legal changes.

We will inform you whether the individual service providers are certified under the DPF and whether standard contractual clauses are in place. Further information on the DPF and a list of certified companies can be found on the US Department of Commerce website at https://www.dataprivacyframework.gov/ (in English).

Appropriate security measures apply to data transfers to other third countries, in particular standard contractual clauses, express consent, or transfers required by law. Information on third country transfers and applicable adequacy decisions can be found in the information provided by the EU Commission at : https://commission.europa.eu/law/law-topic/data-protection/international-dimension-data-protection_en?prefLang=de.

General information on data storage and deletion

We delete personal data that we process in accordance with the statutory provisions as soon as the underlying consents are revoked or there are no further legal grounds for processing . This applies to cases in which the original purpose of processing no longer applies or the data is no longer required. Exceptions to this rule exist if legal obligations or special interests require longer storage or archiving of the data.

In particular, data that must be retained for commercial or tax reasons or whose storage is necessary for legal prosecution or to protect the rights of other natural or legal persons must be archived accordingly.

Our data protection information contains additional information on the storage and deletion of data that specifically applies to certain processing procedures.

If there are several specifications regarding the retention period or deletion deadlines for a piece of data, the longest period shall always apply. Data that is no longer required for its original purpose but is retained due to legal requirements or other reasons shall be processed by us exclusively for the reasons that justify its retention. Retention and deletion of data: The following general periods apply to the retention and

Storage and deletion of data: The following general periods apply to storage and archiving under German law:

  • 10 years - Retention period for books and records, annual financial statements, inventories, management reports, opening balance sheets, as well as the work instructions and other organizational documents required for their understanding (Section 147 (1) No. 1 in conjunction with (3) AO, Section 14b (1) UStG, Section 257 (1) No. 1 in conjunction with ( 4) HGB).
  • 8 years - Accounting documents, such as invoices and expense receipts (Section 147 (1) No. 4 and 4a in conjunction with (3) Sentence 1 AO and Section 257 (1) No. 4 in conjunction with (4) HGB).
  • 6 years - Other business documents: commercial or business letters received, copies of commercial or business letters sent , other documents relevant to taxation, e.g. hourly wage slips, operating statements, calculation documents, price labels, but also payroll documents, unless they are already accounting documents, and cash register receipts (Section 147 (1) No. 2, 3, 5 in conjunction with (3) AO, Section 257 (1) No. 2 and 3 in conjunction with (4) HGB).
  • 3 years - Data that is necessary to take into account potential warranty and damage claims or similar contractual claims and rights, as well as to process related inquiries based on previous business experience and customary industry practices, is stored for the duration of the regular statutory limitation period of three years (Sections 195, 199 BGB).

Start of the period at the end of the year: If a period does not expressly begin on a specific date and is at least one year, it automatically begins at the end of the calendar year in which the event triggering the period occurred . In the case of ongoing contractual relationships in which data is stored, the event triggering the period is the date on which the termination or other termination of the legal relationship takes effect.

Rights of data subjects

Rights of data subjects under the GDPR: As a data subject, you have various rights under the GDPR, which arise in particular from Articles 15 to 21 GDPR:

  • Right to object: You have the right to object at any time, on grounds relating to your particular situation, to the processing of personal data concerning you which is carried out on the basis of Art. 6 para. 1 lit. e or f GDPR; this also applies to profiling based on these provisions. If personal data concerning you is processed for the purpose of direct marketing, you have the right to object at any time to the processing of personal data concerning you for the purpose of such marketing. If the personal data concerning you is processed for the purpose of direct marketing, you have the right to object at any time to the processing of personal data concerning you for the purpose of such marketing; this also applies to profiling insofar as it is related to such direct marketing.
  • Right to withdraw consent: You have the right to withdraw your consent at any time .
  • Right to information: You have the right to request confirmation as to whether relevant data is being processed and to obtain information about this data as well as further information and a copy of the data in accordance with legal requirements.
  • Right to rectification: In accordance with legal requirements, you have the right to request the completion of data concerning you or the rectification of inaccurate data concerning you . Right to erasure and restriction of processing: In accordance with legal requirements, you have the right to request that data concerning you be erased without delay or, alternatively, that processing be restricted.
  • Right to erasure and restriction of processing: In accordance with legal requirements, you have the right to request that data concerning you be erased immediately or, alternatively, in accordance with legal requirements, to request a restriction on the processing of the data.
  • Right to data portability: You have the right to receive data concerning you that you have provided to us in a structured, commonly used, and machine-readable format in accordance with legal requirements, or to request that it be transferred to another controller .
  • Complaint to supervisory authority: You have the right to lodge a complaint with a supervisory authority, without prejudice to any other administrative or judicial remedy, you have the right to lodge a complaint with a supervisory authority, in particular in the Member State of your habitual residence, your place of work or the place of the alleged infringement, if you consider that the processing of personal data concerning you violates the provisions of the GDPR. Types of data processed: Usage data (e.g., page views and length of stay,

Competent supervisory authority: Hamburg Commissioner for Data Protection and Freedom of Information (HmbBfDI), Ludwig-Erhard-Str. 22, 20459 Hamburg; website: https://datenschutz-hamburg.de.

Provision of online services and web hosting

We process user data in order to provide them with our online services. For this purpose, we process the user's IP address, which is necessary to transmit the content and functions of our online services to the user's browser or end device.

  • Types of data processed: Usage data (e.g., page views and length of stay, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions); Meta, communication, and procedural data (e.g., IP addresses, time stamps, identification numbers, persons involved). Log data (e.g., log files relating to logins or the retrieval of data or access times).
  • Data subjects: Users (e.g., website visitors, users of online services).
  • Purposes of processing and legitimate interests: Provision of our online offering and user-friendliness; IT infrastructure (operation and provision of information systems and technical equipment (computers, servers, etc.)). Security measures.
  • Storage and deletion: Deletion in accordance with the information in the section "General information on data storage and deletion."
  • Legal basis: Legitimate interests (Art. 6 (1) (f) GDPR).

Further information on processing procedures, methods, and services:

  • Provision of online services on rented storage space: To provide our online services, we use storage space, computing capacity, and software that we rent or otherwise obtain from a corresponding server provider (also known as a "web host"); Legal basis: Legitimate interests (Art. 6(1)(f) GDPR).
  • Collection of access data and log files: Access to our online offering is logged in the form of so-called "server log files." The server log files may include the address and name of the web pages and files accessed, the date and time of access, the amount of data transferred, notification of successful retrieval, browser type and version, the user's operating system, referrer URL (the previously visited page) and, as a rule, IP addresses and the requesting provider. The server log files can be used on the one hand for security purposes, e.g. to prevent server overload (especially in the case of malicious attacks, known as DDoS attacks), and to ensure the utilization of the servers and their stability; legal basis: legitimate interests (Art. 6 (1) (1) (f) GDPR). Deletion of data: Log file information is stored for a maximum of 30 days and then deleted or anonymized. Data that must be retained for evidential purposes is excluded from deletion until the respective incident has been finally clarified by the authorities.
  • Content delivery network: We use a "content delivery network" (CDN). A CDN is a service that helps deliver content from an online offering, especially large media files such as graphics or program scripts, faster and more securely with the help of regionally distributed servers connected via the internet. Legal basis: Legitimate interests (Art. 6 (1) (f) GDPR).
  • Hetzner: Services in the field of providing information technology infrastructure and related services (e.g., storage space and/or computing capacity); Service provider: Hetzner Online GmbH, Industriestr. 25, 91710 Gunzenhausen, Germany; Legal basis: Legitimate interests (Art. 6 para. 1 sentence 1 lit. f) GDPR); Website: https://www.hetzner.com; Privacy policy: https://www.hetzner.com/de/rechtliches/datenschutz. Data processing agreement: https://docs.hetzner.com/de/general/general-terms-and-conditions/data-privacy-faq/.
  • Cloudflare: Content delivery network and edge services for the delivery of static content (e.g., map tiles); Service provider: Cloudflare, Inc., 101 Townsend St, San Francisco, CA 94107, USA; Legal basis: Legitimate interests (Art. 6 (1) (1) lit. f) GDPR); Website: https://www.cloudflare.com; Privacy policy: https://www.cloudflare.com/de-de/privacypolicy/. Basis for third country transfers: Data Privacy Framework (DPF), standard contractual clauses.

Use of cookies

The term "cookies" refers to functions that store information on users' end devices and read it from them . Cookies can also be used for various purposes, such as to ensure the functionality, security, and convenience of online offerings and to create analyses of visitor traffic. We use cookies in accordance with legal requirements. To this end, we obtain the consent of users in advance where necessary. If consent is not necessary, we rely on our legitimate interests. This applies if the storage and retrieval of information is essential in order to provide expressly requested content and functions. This includes, for example, the storage of settings and the ensuring of the functionality and security of our online offering. Consent can be revoked at any time. We provide clear information about their scope and which cookies are used.

Information on the legal basis for data protection: Whether we process personal data using cookies depends on consent. If consent has been given, it serves as the legal basis. Without consent, we rely on our legitimate interests, which are explained above in this section and in the context of the respective services and procedures.

Storage period: Withregard to the storage period, the following types of cookies are distinguished:

  • Temporary cookies (also known as session cookies): Temporary cookies are deleted at the latest after a user leaves an online offering and closes their device (e.g., browser or mobile application).
  • Permanent cookies: Permanent cookies remain stored even after the device is closed. This allows, for example, the login status to be saved and preferred content to be displayed directly when the user visits a website again. Similarly, the user data collected with the help of cookies can be used to measure reach. Unless we provide users with explicit information about the type and storage period of cookies (e.g., when obtaining consent), they should assume that they are permanent and that the storage period can be up to two years.

General information on revocation and objection (opt-out): Userscan revoke their consent at any time and also object to the processing in accordance with the legal requirements, including through their browser's privacy settings.

  • Types of data processed: Meta, communication, and process data (e.g., IP addresses, time stamps, identification numbers, persons involved).
  • Data subjects: Users (e.g., website visitors, users of online services).
  • Legal basis: Legitimate interests (Art. 6 (1) (f) GDPR).

Registration, login, and user account

Users can create a user account. During registration, users are informed of the required mandatory information and this is processed for the purpose of providing the user account on the basis of contractual obligation fulfillment. The data processed includes, in particular, login information (user name, password, and email address).

When using our registration and login functions and the user account, we store the IP address and the time of the respective user action. Storage is based on our legitimate interests and those of the users in protection against misuse and other unauthorized use. This data is not passed on to third parties unless it is necessary for the pursuit of our claims or there is a legal obligation to do so.

Users can be informed by email about processes that are relevant to their user account, such as technical changes. Further information on processing processes, procedures, and services:

  • Types of data processed: Inventory data (e.g., full name, residential address, contact information, customer number, etc.); contact data (e.g., postal and email addresses or telephone numbers); Content data (e.g., text or image messages and posts, as well as related information, such as details of authorship or time of creation); Usage data (e.g., page views and length of stay, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions). Log data (e.g., log files relating to logins or the retrieval of data or access times).
  • Data subjects: Users (e.g., website visitors, users of online services).
  • Purposes of processing and legitimate interests: Provision of contractual services and fulfillment of contractual obligations; security measures; organizational and administrative procedures. Provision of our online offering and user-friendliness.
  • Storage and deletion: Deletion in accordance with the information in the section "General information on data storage and deletion." Deletion after termination.
  • Legal basis: Contract fulfillment and pre-contractual inquiries (Art. 6 para. 1 sentence 1 lit. b) GDPR). Legitimate interests (Art. 6 para. 1 sentence 1 lit. f) GDPR).

Further information on processing procedures, processes, and services:

  • Deletion of data after termination: When users terminate their user account, their data relating to the user account will be deleted, subject to legal permission, obligation, or consent of the users; legal basis: contract fulfillment and pre-contractual inquiries (Art. 6 (1) (b) GDPR).
  • No obligation to retain data: It is the responsibility of users to back up their data upon termination before the end of the contract. We are entitled to irretrievably delete all user data stored during the term of the contract ; Legal basis: Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (b) GDPR).

Community functions

The community functions provided by us allow users to engage in conversations or otherwise interact with each other. Please note that the use of the community functions is only permitted in compliance with the applicable legal situation, our terms and conditions and guidelines, and the rights of other users and third parties.

  • Types of data processed: Inventory data (e.g., full name, residential address, contact information, customer number, etc.). Usage data (e.g., page views and length of stay, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions).
  • Data subjects: Users (e.g., website visitors, users of online services).
  • Purposes of processing and legitimate interests: Provision of contractual services and fulfillment of contractual obligations; security measures. Provision of our online offering and user-friendliness.
  • Storage and deletion: Deletion in accordance with the information in the section "General information on data storage and deletion."
  • Legal basis: Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (1) (b) GDPR). Legitimate interests (Art. 6 (1) (1) (f) GDPR).

Further information on processing procedures, methods, and services:

  • Protection of own data: Users decide for themselves what data they disclose about themselves within our online offering. For example, when users provide personal information or participate in conversations. We ask users to protect their data and to publish personal data only with caution and only to the extent necessary. In particular, we ask users to note that they must protect their access data with particular care and use secure passwords (i.e., above all, as long and random combinations of characters as possible); Legal basis: Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (b) GDPR).
  • Access logs for shared maps (share access log): When accessing map plans shared by users , an access log is created for security and misuse protection purposes . The truncated IP address (last octet anonymized) and a generalized browser identifier are stored. This data is automatically deleted after 90 days; Legal basis: Legitimate interests (Art. 6 (1) (f) GDPR).

Single sign-on

"Single sign-on" or "single sign-on login or authentication" refers to procedures that allow users to log in to our online offering using a user account with a single sign-on provider (e.g., a social network). The prerequisite for single sign-on authentication is that users are registered with the respective single sign-on provider and enter the required access data in the online form provided for this purpose, or are already logged in with the single sign-on provider and confirm the single sign-on login via a button.

Authentication takes place directly with the respective single sign-on provider. As part of such authentication, we receive a user ID with the information that the user is logged in under this user ID with the respective single sign-on provider and an ID that cannot be used by us for other purposes (so-called "user handle"). Whether additional data is transmitted to us depends solely on the single sign-on procedure used, the data releases selected during authentication, and also on which data users have released in the privacy or other settings of their user account with the single sign-on provider. Depending on the single sign-on provider and the user's choice, this may be different data, but it is usually the email address and username. We cannot see the password entered during the single sign-on process with the single sign-on provider, nor do we store it.

Users are asked to note that the information we have stored about them can be automatically synchronized with their user account with the single sign-on provider, but that this is not always possible or actually happens. If, for example, users' email addresses change, they must change them manually in their user account with us .

We can use the single sign-on registration, if agreed with the users, within the scope of or prior to the performance of the contract, insofar as the users have been asked to do so within the scope of a consent and otherwise use it on the basis of our legitimate interests and the interests of the users in an effective and secure login system.

If users decide that they no longer wish to use the link to their user account with the single sign-on provider for the single sign-on procedure, they must remove this link within their user account with the single sign-on provider. If users wish to delete their data from our system, they must cancel their registration with us .

  • Types of data processed: Inventory data (e.g., full name, residential address, contact information, customer number, etc.); contact data (e.g., postal and email addresses or telephone numbers); usage data (e.g., page views and dwell time, click paths, usage intensity and frequency, types of devices and operating systems used , interactions with content and functions). Meta, communication, and process data (e.g., IP addresses, time stamps, identification numbers, persons involved).
  • Data subjects: Users (e.g., website visitors, users of online services).
  • Purposes of processing and legitimate interests: Provision of contractual services and fulfillment of contractual obligations; security measures; registration procedures. Provision of our online offering and user-friendliness.
  • Storage and deletion: Deletion in accordance with the information in the section "General information on data storage and deletion." Deletion after termination.
  • Legal basis: Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (1) (b) GDPR). Legitimate interests (Art. 6 (1) (1) (f) GDPR).

Further information on processing procedures, processes, and services:

  • OpenID Single Sign-On: Authentication services for user logins, provision of single sign-on functions, management of identity information and application integrations; Service provider: OpenID Foundation, 2400 Camino Ramon, Suite 375, San Ramon, CA 94583, USA; Legal basis: Legitimate interests (Art. 6 para. 1 sentence 1 lit. f) GDPR); Website: https://openid.net; Privacy policy: https://openid.net/policies/. Basis for third country transfers: Data Privacy Framework (DPF).
  • Steam (Valve Corporation): Authentication service for user login via Steam OpenID. During the login process, the Steam ID (SteamID 64), Steam username, and Steam avatar URL are transmitted and stored by us. The user's Steam password is neither visible to us nor stored by us; Service provider: Valve Corporation, 10400 NE 4th Street, Bellevue, WA 98004, USA; Legal basis: Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (b) GDPR), legitimate interests (Art. 6 (1) (1) lit. f) GDPR); Website: https://store.steampowered.com; Privacy policy: https://store.steampowered.com/privacy_agreement/. Basis for third country transfers: Standard contractual clauses.

Contact and inquiry management

When contacting us (e.g., by mail, contact form, email, telephone, or social media) and within the framework of existing user and business relationships, the information provided by the inquiring persons is processed to the extent necessary to respond to contact inquiries and any requested measures.

  • Types of data processed: Contact details (e.g., postal and email addresses or telephone numbers); content data (e.g., text or image messages and posts, as well as related information, such as details of authorship or time of creation). Meta, communication, and process data (e.g., IP addresses, time stamps, identification numbers, persons involved).
  • Data subjects: Communication partners.
  • Purposes of processing and legitimate interests: Communication; organizational and administrative procedures; feedback (e.g., collecting feedback via online form). Provision of our online offering and user-friendliness.
  • Storage and deletion: Deletion in accordance with the information in the section "General information on data storage and deletion."
  • Legal basis: Legitimate interests (Art. 6 (1) (1) (f) GDPR). Contract fulfillment and pre-contractual inquiries (Art. 6 (1) (1) (b) GDPR).

Further information on processing procedures, methods, and services:

  • Contact form: When you contact us via our contact form, by email, or other means of communication, we process the personal data you provide to respond to and process your request. This usually includes information such as your name, contact information, and any other information you provide that is necessary for us to process your request appropriately . . We use this data exclusively for the stated purpose of establishing contact and communication; Legal bases: Contract fulfillment and pre-contractual inquiries (Art. 6 para. 1 sentence 1 lit. b) GDPR), legitimate interests (Art. 6 para. 1 sentence 1 lit. f) GDPR).

Web analysis, monitoring, and optimization

Web analysis (also known as "reach measurement") is used to evaluate visitor flows to our online offering and may include behavior, interests, or demographic information about visitors, such as age or gender, as pseudonymous values. With the help of reach analysis, we can With the help of reach analysis, we can, for example, identify at what time our online offering or its functions or content are most frequently used or invite reuse. It also enables us to understand which areas require optimization.

In addition to web analysis, we can also use test procedures to test and optimize different versions of our online offering or its components.

Unless otherwise stated below, profiles, i.e., data summarized for a usage process, can be created for these purposes, and information can be stored in a browser or on a terminal device and then read. The information collected includes, in particular, visited websites and elements used there, as well as The information collected includes, in particular, websites visited and elements used there, as well as technical information such as the browser used, the computer system used, and information on usage times. If users have agreed to the collection of their location data by us or by the providers of the services we use , the processing of location data is also possible.

In addition, the IP addresses of users are stored. However, we use an IP masking procedure (i.e. pseudonymization by shortening the IP address) to protect users. In general, no clear data of users (such as email addresses or names) is stored in the context of web analysis, web analysis, A/B testing, and optimization, no clear data of users (such as email addresses or names) is stored, but rather pseudonyms. This means that neither we nor the providers of the software used know the actual identity of the users, but only the information stored in their profiles for the purpose of the respective procedures.

Information on legal bases: If we ask users for their consent to the use of third-party providers , the legal basis for data processing is consent. Otherwise, user data is processed on the basis of our legitimate interests (i.e., interest in efficient, economical, and recipient-friendly services). In this context, we would also like to refer you to the information on the use of cookies in this privacy policy.

  • Types of data processed: Usage data (e.g., page views and length of stay, click paths, usage intensity and frequency, device types and operating systems used, interactions with content and functions). Meta, communication, and process data (e.g., IP addresses, time stamps, identification numbers, persons involved).
  • Data subjects: Users (e.g., website visitors, users of online services).
  • Purposes of processing and legitimate interests: Reach measurement (e.g., access statistics, recognition of returning visitors); profiles with user-related information (creation of user profiles). Provision of our online offering and user-friendliness.
  • Storage and deletion: Deletion in accordance with the information in the section "General information on data storage and deletion." Storage of cookies for up to 2 years (unless otherwise specified, cookies and similar storage methods may be stored on users' devices for a period of two years ). Security measures: IP masking (pseudonymization of the IP address).
  • Security measures: IP masking (pseudonymization of the IP address).
  • Legal basis: Consent (Art. 6 (1) (a) GDPR). Legitimate interests (Art. 6 (1) (f) GDPR).

Further information on processing procedures, methods, and services:

  • Umami (self-hosted): We use Umami as a self-hosted, cookie-free web analytics solution for the anonymized evaluation of the use of our online offering. Umami is operated on our own infrastructure; no data is transmitted to third parties. No cookies are set and no personal data such as IP addresses are stored permanently. The data collected (page views, referral source, browser, operating system, device type) is anonymized and does not allow any conclusions to be drawn about individual users; legal basis: legitimate interests (Art. 6 para. 1 sentence 1 lit. f) GDPR); website: https://umami.is.

Current Data Processors (Key Services)

The following table lists key third-party services used for analytics, error monitoring, logging, and feedback processing, including the data processed and legal basis. Additional providers used for hosting, content delivery, and authentication are described in the relevant sections of this privacy policy.

Processor Purpose Data Collected Retention Lawful Basis
Umami Anonymous usage analytics Page views, device type, browser (no PII) 12 months Legitimate interest (Art. 6(1)(f))
Sentry Error tracking Error stack traces, browser and operating system details, IP address 90 days Legitimate interest (Art. 6(1)(f))
BetterStack Log aggregation & uptime monitoring Server logs, IP addresses 30 days Legitimate interest (Art. 6(1)(f))
GitHub Feedback via issue tracker Username, feedback content Until issue closed Legitimate interest (Art. 6(1)(f))

Management, organization, and support tools

We use services, platforms, and software from other providers (hereinafter referred to as "third-party providers") for the purposes of organizing, managing, planning, and providing our services. When selecting the third-party providers and their services, we comply with the legal requirements.

In this context, personal data may be processed and stored on the servers of third-party providers. This may affect various data that we process in accordance with this privacy policy. This data may include, in particular, master data and contact details of users, data on transactions, contracts, other processes and their contents.

If users are referred to third-party providers or their software or platforms in the context of communication, business or other relationships with us, the third-party providers may process usage data and metadata for security purposes, service optimization or marketing purposes. We therefore ask you to observe the privacy policies of the respective third-party providers.

  • Types of data processed: Content data (e.g., textual or pictorial messages and posts as well as information relating to them, such as details of authorship or time of creation); Usage data (e.g., page views and dwell time, click paths, usage intensity and frequency, types of devices and operating systems used , interactions with content and functions). Meta, communication, and process data (e.g., IP addresses, time stamps, identification numbers, persons involved).
  • Data subjects: Communication partners. Users (e.g., website visitors, users of online services).
  • Purposes of processing and legitimate interests: Provision of contractual services and fulfillment of contractual obligations. Office and organizational procedures.
  • Storage and deletion: Deletion in accordance with the information in the section "General information on data storage and deletion."
  • Legal basis: Legitimate interests (Art. 6 (1) (f) GDPR).

Further information on processing procedures, methods, and services:

  • Sentry: We use Sentry to detect, diagnose, and fix software errors in our online offering. When an error occurs, technical information such as browser type, operating system, error details (stack traces), and the user's IP address are transmitted to Sentry. The processing serves to ensure the functionality and stability of our service; Service provider: Functional Software, Inc. (dba Sentry), 45 Fremont Street, 8th Floor, San Francisco, CA 94105, USA; Legal basis: Legitimate interests (Art. 6 (1) (f) GDPR); Website: https://sentry.io; Privacy policy: https://sentry.io/privacy/. Basis for third country transfers: Data Privacy Framework (DPF), standard contractual clauses.
  • BetterStack (Logtail): We use BetterStack (Logtail) to aggregate and analyze server log data. Server log data is transmitted to BetterStack for monitoring, troubleshooting, and ensuring the proper operation of our infrastructure. Technical data such as IP addresses, timestamps, error messages, and request information may be processed in the process; Service provider: Better Stack, Inc., 2261 Market Street #4242, San Francisco, CA 94114, USA; Legal basis: Legitimate interests (Art. 6 (1) (f) GDPR); Website: https://betterstack.com; Privacy policy: https://betterstack.com/privacy. Basis for third-country transfers: Standard contractual clauses.
  • GitHub (for feedback processing): When users send feedback via the feedback function in our application, the content of the feedback is transmitted to GitHub together with the user's Steam username and stored there as an issue. The processing serves to handle user feedback and improve our service; Service provider: GitHub, Inc. (Microsoft Corporation), 88 Colin P Kelly Jr St, San Francisco, CA 94107, USA; Legal basis: Legitimate interests (Art. 6 (1) (1) lit. f) GDPR); Website: https://github.com; Privacy policy: https://docs.github.com/de/site-policy/privacy-policies/github-general-privacy-statement. Basis for third country transfers: Data Privacy Framework (DPF), standard contractual clauses.

Changes and updates

We ask you to regularly review the content of our privacy policy. We will amend the privacy policy as soon as changes to the data processing we carry out make this necessary . We will inform you as soon as the changes require action on your part (e.g. consent) or other individual notification.

If we provide addresses and contact information for companies and organizations in this privacy policy, please note that the addresses may change over time and we ask you to check the information before contacting them.

Definition of terms

This section provides an overview of the terms used in this privacy policy. Where the terms are defined by law, their legal definitions apply. The following explanations are primarily intended to aid understanding. Created with free Datenschutz-Generator.de by Dr. Thomas

  • Inventory data: Inventory data includes essential information necessary for the identification and management of contractual partners, user accounts, profiles, and similar assignments. This data may include personal and demographic information such as names, contact information (addresses, phone numbers, email addresses), dates of birth, and specific identifiers (user IDs). Inventory data forms the basis for any formal interaction between individuals and services, facilities, or systems by enabling unique assignment and communication.
  • Content data: Content data includes information generated in the course of creating, editing, and publishing content of all kinds. This category of data can include text, images, videos, audio files, and other multimedia content published on various platforms and media. Content data Content data is not limited to the actual content itself, but also includes metadata that provides information about the content, such as tags, descriptions, author information, and publication dates.
  • Contact data: Contact data is essential information that enables communication with individuals or organizations. It includes telephone numbers, postal addresses, and email addresses, as well as communication tools such as social media handles and instant messaging identifiers.
  • Meta, communication, and procedural data: Meta, communication, and procedural data are categories that contain information about how data is processed, transmitted, and managed . Meta data, also known as data about data, includes information that describes the context, origin, and structure of other data. It may include details such as file size, creation date, the author of a document, and change histories. Communication data captures the exchange of information between users across various channels, such as email correspondence, call logs, social media messages and chat histories, including the individuals involved, timestamps, and transmission routes. Process data describes the processes and procedures within systems or organizations, including workflow documentation, transaction and activity logs, and audit logs used to track and review operations.
  • Usage data: Usage data refers to information that captures how users interact with digital products, services, or platforms. This data includes a wide range of information that shows how users use applications, which features they prefer, how long they stay on certain pages, and the paths they take through an application. Usage data can also include frequency of use, timestamps of activities, IP addresses, device information, and location data . It is particularly valuable for analyzing user behavior, optimizing user experiences, personalizing content, and improving products or services. In addition, usage data plays a crucial role in identifying trends, preferences, and potential problem areas within digital offerings.
  • Personal data: "Personal data" is any information relating to an identified or identifiable natural person (hereinafter "data subject"); a natural person is considered identifiable if they can be identified, directly or indirectly, in particular by means of assignment to an identifier such as a name, an identification number, location data, an online identifier (e.g., cookie) or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person.
  • Profiles with user-related information: The processing of "profiles with user-related information," or "profiles" for short, includes any type of automated processing of personal data that consists of using this personal data to analyze certain personal aspects relating to a natural person (depending on the type of profiling, this may include various information relating to demographics, behavior, and interests, such as interaction with websites and their content, etc.) in order to analyze, evaluate, or predict them (e.g., interest in certain content or products, click behavior on a website, or location). Cookies and web beacons are often used for profiling purposes.
  • Log data: Log data is information about events or activities that have been logged in a system or network. This data typically contains information such as timestamps, IP addresses, user actions, error messages, and other details about the use or operation of a system. Log data is often used to analyze system problems, monitor security, or create performance reports.
  • Reach measurement: Reach measurement (also known as web analytics) is used to evaluate visitor traffic to an online offering and can include the behavior or interests of visitors in certain information, such as website content. With the help of reach analysis , operators of online offerings can, for example, identify at what time users visit their websites and what content they are interested in. This enables them, for example, to better tailor the content of their websites to the needs of their visitors. For the purposes of reach analysis, pseudonymous cookies and web beacons are often used to recognize returning visitors and thus obtain more accurate analyses of the use of an online service .
  • Tracking: "Tracking" refers to the ability to trace user behavior across multiple online offerings. As a rule, behavioral and interest-related information about users is stored in cookies or on servers of tracking technology providers (so-called profiling). This information can then be used, for example, to display ads likely to match users' interests.
  • Audience building: Audience building (often called "custom audiences") refers to defining target groups for advertising purposes. For example, based on a user's interest in specific products or topics, it may be inferred that this user is interested in ads for similar products. "Lookalike audiences" refers to showing content to users whose assumed profiles or interests are similar to users for whom profiles were originally built. Cookies and web beacons are commonly used for this purpose.
  • Controller: The "controller" is the natural or legal person, authority, agency, or other body that, alone or jointly with others, determines the purposes and means of the processing of personal data.
  • Processing: "Processing" means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means. The term is broad and covers virtually every interaction with data, whether it is collection, evaluation, storage, transmission, or deletion.

Created with the free Datenschutz-Generator.de by Dr. Thomas Schwenke