Ever have that feeling you still have loads to do? Like ...
Not enough time to manage all the content and social media work that needs to be done
Crucial tasks slipping through the cracks
Increasing following and engagement on social media to improve sales conversion
Finding the time to do everything you want to do
Marketing taking up way too much time from other important stuff in your business.
You desperately need an extra pair of hands, but don't have the budget?
Get connected with motivated student and graduate Volunteers.
How It Works
Post a role on our job board
or Ask our team to match you with a Volunteer
Schedule an interview and get to know your potential hire
We share guidelines and best practices on how to run an effective interview
Make an Offer
Use our Volunteer Agreement to get up and running and start onboarding your Volunteers.
Get back your time
Find a Student Volunteer in these fields
Vetted Student and Graduate Volunteers
Find talent from around the world
87% Success rate of finding an ambitious Volunteer or your money back
Volunteers for your business working 10 or 20 hours a week
Loved by ❤️
Everything was very clearly explained. Loved everything. I really liked it since I am very new to everything.
- Samreen Tariq
I loved the networking opportunities. Do more of these kind of events.
- Angelica Liberato
It was very good to network with other Founders and hear their inspiring stories, But also meeting other Volunteers and connecting with everyone. It also had a very good atmosphere. The event was overall really good because of being able to network with other Founders and getting to know different backgrounds and sharing experiences.
- Pia Louise Aguilos
I love that you're thinking of other ways to engage Volunteers and Founders. Thanks for doing this!
- Erna Alfred Liousas
The Founders created a comfortable and informal environment which made me less nervous. It was lovely meeting all these amazing and inspiring women!
- Kelsey Searyoh
Learning and hearing about the Founder's backgrounds felt so empowering.
- Daniela Castillo Valdés
The networking setting is convenient and flexible to connect to Founders.
- Chou Fang-Yu
Created new connections with the other Founders with expertise that overlaps with my experience. Met women from other countries and hearing about their interests in startups was fun. Testing a new event platform, I liked the ease of switching between speakers and being able to share my screen.
- Susan Liao
It was good to meet the different Founders and Volunteers. This was my first time to pitch.
- Heidi Schutter
The general logistics and the very positive and friendly vibe.
- Petra Wintner
Well managed & a great platform, like the networking tool.
- Laura Bloomer
Great opportunity to connect with Volunteers. It also felt like a safe space.
- Magdalena Pire Schmidt
Loved the event and being able to interact with such a diverse group of Founders and Volunteers from around the world! Loved the structure of intro presentations and the Remo table setup. Thank you for the opportunity! You ladies hosted a great first event! Looking forward to securing my first Volunteers!
- Marjai Roberts
I liked the variety of Volunteer work available with the companies. The event was great.
- Raquel Campos
I got to meet wonderful women with great startups!
- Atira Pradeep
The event was helpful and this gives me hope that I will get something very soon
- Candi Adegunle
I loved the room setup :) Easy to use and gave me the chance to meet people.
- Urvi Bhandari
Hearing the Founders pitch their business ideas was really interesting and I liked how I had the freedom to choose which startups to get to know more about. Thank you for providing this opportunity! It was so nice meeting everyone.
- Lucy Furse
I loved the pitch and the table meetings.
- Sheri Kurdakul
It was very good, lots of fun and engaging.
- Rommy Barriga
Wait, are Founders expected to offer 2 hours of mentoring for each Volunteer?
No, it's a Group Mentoring session of 2 hours for 1-3 Volunteers to join together as a Group. The mentoring session heavily relies on incorporating Peer to Peer learning. We provide a template to all Founders and Volunteers.
How long will it take me to find a Volunteer?
To be honest, it really depends. We won't promise you a match within 48 hours (although some matches have happened that quick). We endeavour for Founders to match with Volunteers within 7 days of their application.
What does the verification and approval process look like?
We do a background check to see you are who you say you are. We review your motivations for joining and to understand if you are a good fit for our Volunteers.
How many Volunteers can I take on?
We recommend no more than 3 volunteers at a time.
Founders, get extra support and inspire a motivated Volunteer as a role model
sprinters is a community of ambitious, empowered, strong, busy womxn redefining success on their own terms. We provide community, resources, high-profile investors, mentors, startup bootcamps and more to enable the success of more womxn in entrepreneurship.
This agreement is in effect as of August 18, 2020.
We reserve the right to change this User Agreement from time to time without notice. You acknowledge and agree that it is your responsibility to review this User Agreement periodically to familiarize yourself with any modifications. Your continued use of this site after such modifications, will constitute acknowledgment and agreement of the modified terms and conditions.
Responsible Use and Conduct
By visiting our website, upon acceptance as a member and accessing the information, resources, services, products, and tools we provide for you, either directly or indirectly (hereafter referred to as ‘Resources’), you agree to use these Resources only for the purposes intended as permitted by (a) the terms of this User Agreement, and (b) applicable laws, regulations, licences and generally accepted online practices or guidelines.
Wherein, you understand that:
a. In order to access certain Resources, you may be required to provide certain information about yourself (such as identification, contact details, etc.) as part of the registration process, or as part of your ability to use the Resources. You agree that any information you provide will always be accurate, correct, and up to date.
b. You are responsible for maintaining the confidentiality of any login information associated with any account you use to access our Resources. Accordingly, you are responsible for all activities that occur under your account/s.
c. Accessing (or attempting to access) any of our Resources by any means other than through the means we provide, is strictly prohibited. You specifically agree not to access (or attempt to access) any of our Resources through any automated, unethical or unconventional means.
d. Engaging in any activity that disrupts or interferes with our Resources, including the servers and/or networks to which our Resources are located or connected, is strictly prohibited.
e. Attempting to copy, duplicate, reproduce, sell, trade, or resell our Resources is strictly prohibited, except in the case where those resources are licenced under a Creative Commons License, in which instance you are welcome to use and reproduce them in accordance with the terms of that license.
f. You are solely responsible for any consequences, losses, or damages that we may directly or indirectly incur or suffer due to any unauthorized activities conducted by you, as explained above, and may incur criminal or civil liability.
g. We provide various open communication tools on our website, such as blog comments, blog posts, public chat, forums, message boards, newsgroups, product ratings and reviews, various social media services, etc. You understand that generally we do not pre-screen or monitor the content posted by users of these various communication tools, which means that if you choose to use these tools to submit any type of content to our website, then it is your personal responsibility to use these tools in a responsible and ethical manner. By posting information or otherwise using any open communication tools as mentioned, you agree that you will not upload, post, share, or otherwise distribute any content that:
i. Is illegal, threatening, defamatory, abusive, harassing, degrading, intimidating, fraudulent, deceptive, invasive, racist, or contains any type of suggestive, inappropriate, or explicit language;
ii. Infringes on any trademark, patent, trade secret, copyright, or other proprietary right of any party;
iii. Contains any type of unauthorized or unsolicited advertising;
iiii. Impersonates any person or entity, including any sprinters Global CIC employees or representatives.
We have the right at our sole discretion to remove any content that we feel in our judgment does not comply with this User Agreement, along with any content that we feel is otherwise offensive, harmful, objectionable, inaccurate, or violates any 3rd party copyrights or trademarks. We are not responsible for any delay or failure in removing such content. If you post content that we choose to remove, you hereby consent to such removal, and consent to waive any claim against us.
i. You agree to indemnify and hold harmless www.sprinters.co and its parent company sprinters Global CIC and affiliates, and their directors, officers, managers, employees, donors, agents, and licensors, from and against all losses, expenses, damages and costs, including reasonable attorneys’ fees, resulting from any violation of this User Agreement or the failure to fulfil any obligations relating to your account incurred by you or any other person using your account. We reserve the right to assume the exclusive defence and control of any claim for which we are entitled to indemnification under this User Agreement. In such event, you shall provide us with such cooperation as is reasonably requested by us.
j. You agree to follow our Terms of Confidentiality for Group Members detailed further down this page.
k. You agree to the sprinters Online Community Member Guidelines stated below:
- Respect confidentiality within Groups.
- When you joined the community, you agreed with the [Terms of Confidentiality for Group Members]. Essentially, this means you agree to treat as confidential, any information disclosed by a community member in any Group, and to not share it outside of that Group without that member’s express consent.
- Being both vulnerable and safe is essential to our mutual success.
- Anyone who breaches this agreement will be asked to leave the community.
- Be supportive.
- Encourage and support your fellow members.
- Participate artfully, ask for help if you need it and choose consciously if and how you wish to respond to others requests for help from you.
- Share generously.
- Your stories and experiences may be exactly what another member needs to hear today, to solve a problem or seize an opportunity.
- Strive for balance.
- If you never contribute, we’ll be deprived of your experience and wisdom.
- If you “over-share” or monopolize, others might be overwhelmed and you run the risk of diluting the value your contribution brings.
- Be constructive. We’re here to encourage each other forward and lift each other up.
- Embrace differences of opinion and look for the positive essence lying at the heart of divergent points of view.
- Find ways to help each other think bigger, view challenges through the lens of opportunities, stay curious and look for the both-and-more.
- Keep it relevant.
- Please only post content that you feel is relevant to, or supportive of, learning about and applying sprinters Global CIC and evolving more effective ways of living and working together.
- Add a brief explanation as to why you’re sharing something, if the relevance might otherwise be unclear.
- Unrelated topics, spam, repetitive posts or those with no introduction may be removed by a host or moderator without warning.
- Inform, don’t sell.
- Some of us organize and or run sprinters Global CIC related workshops, courses and other learning events.
- As community members we’ll want to know about these opportunities for learning and it’s perfectly cool to share about a specific event you will be running and add a link that people can follow if they want.
- All we ask is that you avoid posting specific sales links, offers, pitches or repeat notifications of the same event, directly in the community.
- If you provide professional services, you are welcome to explain about these in your member bio.
- Members who want to learn more, can contact you through private messaging to continue the conversation.
Limitation of Warranties
By using our website, you understand and agree that all Resources we provide are “as is” and “as available”. This means that we do not represent or warrant to you that:
i) the use of our Resources will meet your needs or requirements.
ii) the use of our Resources will be uninterrupted, timely, secure or free from errors.
iii) the information obtained by using our Resources will be accurate or reliable, and
iv) any defects in the operation or functionality of any Resources we provide will be repaired or corrected.
Furthermore, you understand and agree that:
v) any content downloaded or otherwise obtained through the use of our Resources is done at your own discretion and risk, and that you are solely responsible for any damage to your computer or other devices for any loss of data that may result from the download of such content.
vi) no information or advice, whether expressed, implied, oral or written, obtained by you from www.sprinters.co or through any Resources we provide shall create any warranty, guarantee, or conditions of any kind, except for those expressly outlined in this User Agreement.
Limitation of Liability
In conjunction with the Limitation of Warranties as explained above, you expressly understand and agree that any claim against us shall be limited to the amount you paid, if any, for use of products and/or services. Sprinters Global CIC on will not be liable for any direct, indirect, incidental, consequential or exemplary loss or damages which may be incurred by you as a result of using our Resources, or as a result of any changes, data loss or corruption, cancellation, loss of access, or downtime to the full extent that applicable limitation of liability laws apply.
All content and materials available on www.sprinters.co, including but not limited to text, graphics, website name, code, images and logos are the intellectual property of www.sprinters.co, and are protected by applicable copyright and creative commons license law, except in the case where those resources are licensed under a creative commons license, in which instance you are welcome to use and reproduce them in accordance with the terms of that license. Any inappropriate use, including but not limited to the reproduction, distribution, display or transmission of any content on this site is strictly prohibited, unless specifically authorized by www.sprinters.co or by the terms of the license pertaining to said content.
Termination of Use
You agree that we may, at our sole discretion, suspend or terminate your access to all or part of our website and Resources with or without notice and for any reason, including, without limitation, breach of this User Agreement. Any suspected illegal, fraudulent or abusive activity may be grounds for terminating your membership and may be referred to appropriate law enforcement authorities. Upon suspension or termination, your right to use the Resources we provide will immediately cease, and we reserve the right to remove or delete any information that you may have on file with us, including any account or login information.
The sprinters website and community networks are controlled by sprinters Global CIC. It can be accessed by most countries around the world. As each country has laws that may differ from those of Bucharest, by accessing our website, you agree that the statutes and laws of the United Kingdo,, without regard to the conflict of laws and the United Nations Convention on the International Sales of Goods, will apply to all matters relating to the use of this website and the purchase of any products or services through this site.
Furthermore, any action to enforce this User Agreement shall be brought in the federal or state courts located in London, England You hereby agree to personal jurisdiction by such courts, and waive any jurisdictional, venue, or inconvenient forum objections to such courts.
UNLESS OTHERWISE EXPRESSED, SPRINTERS GLOBAL CIC EXPRESSLY DISCLAIMS ALL WARRANTIES AND CONDITIONS OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
If you have any questions or comments about our Terms and Conditions as outlined above, you can contact us by e-mail: email@example.com
**Last Update: 13. August 2020**
### **Overview of processing operations**
The following table summarises the types of data processed, the purposes for which they are processed and the concerned data subjects.
### **Categories of Processed Data**
- Inventory data (e.g. names, addresses).
- Content data (e.g. text input, photographs, videos).
- Contact data (e.g. e-mail, telephone numbers).
- Meta/communication data (e.g. device information, IP addresses).
- Usage data (e.g. websites visited, interest in content, access times).
- Contract data (e.g. contract object, duration, customer category).
- Payment Data (e.g. bank details, invoices, payment history).
### **Categories of Data Subjects**
- Business and contractual partners.
- Prospective customers.
- Communication partner (Recipients of e-mails, letters, etc.).
- Customers.Users (e.g. website visitors, users of online services).
### **Purposes of Processing**
- Affiliate Tracking.
- Provision of our online services and usability.
- Conversion Tracking.
- Office and organisational procedures.
- Content Delivery Network (CDN).
- Direct marketing (e.g. by e-mail or postal).
- Feedback (e.g. collecting feedback via online form).contact requests and communication.
- Profiling (Creating user profiles).
- Web Analytics (e.g. access statistics, recognition of returning visitors).
- Security measures.
- Contractual services and support.
- Managing and responding to inquiries.
### **Legal Bases for the Processing**
In the following we inform you about the legal basis of the General Data Protection Regulation (GDPR), on the basis of which we process personal data. Please note that, in addition to the regulations of the GDPR, the national data protection regulations may apply in your country or in our country of residence or domicile. If, in addition, more specific legal bases are applicable in individual cases, we will inform you of these in the data protection declaration.
- **Consent (Article 6 (1) (a) GDPR) –** The data subject has given consent to the processing of his or her personal data for one or more specific purposes.
- **Performance of a contract and prior requests (Article 6 (1) (b) GDPR) –** Performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract.
- **Compliance with a legal obligation (Article 6 (1) (c) GDPR) –** Processing is necessary for compliance with a legal obligation to which the controller is subject.
- **Protection of vital interests (Article 6 (1) (d) GDPR) –** Processing is necessary in order to protect the vital interests of the data subject or of another natural person.
- **Legitimate Interests (Article 6 (1) (f) GDPR) –** Processing is necessary for the purposes of the legitimate interests pursued by the controller or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data.
### **Security Precautions**
We take appropriate technical and organisational measures in accordance with the legal requirements, taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, in order to ensure a level of security appropriate to the risk.
The measures include, in particular, safeguarding the confidentiality, integrity and availability of data by controlling physical and electronic access to the data as well as access to, input, transmission, securing and separation of the data. In addition, we have established procedures to ensure that data subjects’ rights are respected, that data is erased, and that we are prepared to respond to data threats rapidly. Furthermore, we take the protection of personal data into account as early as the development or selection of hardware, software and service providers, in accordance with the principle of privacy by design and privacy by default.
SSL encryption (https): In order to protect your data transmitted via our online services in the best possible way, we use SSL encryption. You can recognize such encrypted connections by the prefix https:// in the address bar of your browser.
### **Transmission and Disclosure of Personal Data**
In the context of our processing of personal data, it may happen that the data is transferred to other places, companies or persons or that it is disclosed to them. Recipients of this data may include, for example, payment institutions within the context of payment transactions, service providers commissioned with IT tasks or providers of services and content that are embedded in a website. In such a case, the legal requirements will be respected and in particular corresponding contracts or agreements, which serve the protection of your data, will be concluded with the recipients of your data.
### **Data Processing in Third Countries**
If we process data in a third country (i.e. outside the European Union (EU), the European Economic Area (EEA)) or the processing takes place in the context of the use of third party services or disclosure or transfer of data to other persons, bodies or companies, this will only take place in accordance with the legal requirements.
Subject to express consent or transfer required by contract or law, we process or have processed the data only in third countries with a recognised level of data protection, on the basis of special guarantees, such as a contractual obligation through so-called standard protection clauses of the EU Commission or if certifications or binding internal data protection regulations justify the processing (Article 44 to 49 GDPR, information page of the EU Commission: [https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection_en).](https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection_en).)
Inside the Community we use the services of other US-based companies to embed content and enrich the community in other ways. In doing so, some of your personal data might be shared with US government agencies without giving you the rights you have under GDPR.
Here’s the list of companies we currently work with, and the type of personal data that is shared with them:
Google LLC for embedding YouTube videos and showing content in Google Drive in the community (your IP address will be transmitted to Google LLC)
This list of companies might change at any time.
Cookies are text files that contain data from visited websites or domains and are stored by a browser on the user’s computer. A cookie is primarily used to store information about a user during or after his visit within an online service. The information stored can include, for example, the language settings on a website, the login status, a shopping basket or the location where a video was viewed. The term “cookies” also includes other technologies that fulfil the same functions as cookies (e.g. if user information is stored using pseudonymous online identifiers, also referred to as “user IDs”).
**The following types and functions of cookies are distinguished:**
- **Temporary cookies (also: session cookies):** Temporary cookies are deleted at the latest after a user has left an online service and closed his browser.
- **Permanent cookies:** Permanent cookies remain stored even after closing the browser. For example, the login status can be saved or preferred content can be displayed directly when the user visits a website again. The interests of users who are used for range measurement or marketing purposes can also be stored in such a cookie.
- **First-Party-Cookies:** First-Party-Cookies are set by ourselves.
- **Third party cookies:** Third party cookies are mainly used by advertisers (so-called third parties) to process user information.
- **Necessary (also: essential) cookies:** Cookies can be necessary for the operation of a website (e.g. to save logins or other user inputs or for security reasons).
**Retention period:** Unless we provide you with explicit information on the retention period of permanent cookies (e.g. within the scope of a so-called cookie opt-in), please assume that the retention period can be as long as two years.
**Processed data types:** Usage data (e.g. websites visited, interest in content, access times), Meta/communication data (e.g. device information, IP addresses).
**Data subjects:** Users (e.g. website visitors, users of online services).
**Legal Basis:** Consent (Article 6 (1) (a) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
### **Commercial Services**
We process data of our contractual and business partners, e.g. customers and interested parties (collectively referred to as “contractual partners”) within the context of contractual and comparable legal relationships as well as associated actions and communication with the contractual partners or pre-contractually, e.g. to answer inquiries.
Which data are necessary for the aforementioned purposes, we inform the contracting partners before or in the context of the data collection, e.g. in on-line forms by special marking (e.g. colors), and/or symbols (e.g. asterisks or the like), or personally.
We delete the data after expiry of statutory warranty and comparable obligations, i.e. in principle after expiry of 4 years, unless the data is stored in a customer account or must be kept for legal reasons of archiving (e.g., as a rule 10 years for tax purposes). In the case of data disclosed to us by the contractual partner within the context of an assignment, we delete the data in accordance with the specifications of the assignment, in general after the end of the assignment.
If we use third-party providers or platforms to provide our services, the terms and conditions and privacy policies of the respective third-party providers or platforms shall apply in the relationship between the users and the providers.
**Online Shop and E-Commerce:** We process the data of our customers in order to enable them to select, purchase or order the selected products, goods and related services, as well as their payment and delivery, or performance of other services.
The required details are identified as such in the course of the ordering or comparable purchasing process and include the details required for delivery, or other way of making the product aviable and invoicing as well as contact information in order to be able to hold any consultation.
**Processed data types:** Inventory data (e.g. names, addresses), Payment Data (e.g. bank details, invoices, payment history), Contact data (e.g. e-mail, telephone numbers), Contract data (e.g. contract object, duration, customer category), Usage data (e.g. websites visited, interest in content, access times), Meta/communication data (e.g. device information, IP addresses).
**Data subjects:** Prospective customers, Business and contractual partners, Customers.
**Purposes of Processing:** Contractual services and support, contact requests and communication, Office and organisational procedures, Managing and responding to inquiries, Security measures.
**Legal Basis:** Performance of a contract and prior requests (Article 6 (1) (b) GDPR), Compliance with a legal obligation (Article 6 (1) (c) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
### Provision of online services and web hosting
In order to provide our online services securely and efficiently, we use the services of one or more web hosting providers from whose servers (or servers they manage) the online services can be accessed. For these purposes, we may use infrastructure and platform services, computing capacity, storage space and database services, as well as security and technical maintenance services.
The data processed within the framework of the provision of the hosting services may include all information relating to the users of our online services that is collected in the course of use and communication. This regularly includes the IP address, which is necessary to be able to deliver the contents of online services to browsers, and all entries made within our online services or from websites.
**E-mail Sending and Hosting:** The web hosting services we use also include sending, receiving and storing e-mails. For these purposes, the addresses of the recipients and senders, as well as other information relating to the sending of e-mails (e.g. the providers involved) and the contents of the respective e-mails are processed. The above data may also be processed for SPAM detection purposes. Please note that e-mails on the Internet are generally not sent in encrypted form. As a rule, e-mails are encrypted during transport, but not on the servers from which they are sent and received (unless a so-called end-to-end encryption method is used). We can therefore accept no responsibility for the transmission path of e-mails between the sender and reception on our server.
**Collection of Access Data and Log Files:** We, ourselves or our web hosting provider, collect data on the basis of each access to the server (so-called server log files). Server log files may include the address and name of the web pages and files accessed, the date and time of access, data volumes transferred, notification of successful access, browser type and version, the user’s operating system, referrer URL (the previously visited page) and, as a general rule, IP addresses and the requesting provider.
The server log files can be used for security purposes, e.g. to avoid overloading the servers (especially in the case of abusive attacks, so-called DDoS attacks) and to ensure the stability and optimal load balancing of the servers .
**Content-Delivery-Network:** We use a so-called “Content Delivery Network” (CDN). A CDN is a service with whose help contents of our online services, in particular large media files, such as graphics or scripts, can be delivered faster and more securely with the help of regionally distributed servers connected via the Internet.
**Processed data types:** Content data (e.g. text input, photographs, videos), Usage data (e.g. websites visited, interest in content, access times), Meta/communication data (e.g. device information, IP addresses).Data subjects: Users (e.g. website visitors, users of online services).Purposes of Processing: Content Delivery Network (CDN).Legal Basis: Legitimate Interests (Article 6 (1) (f) GDPR).
### **Blogs and publication media**
**Comment subscriptions:** When users leave comments or other contributions, their IP addresses may be stored based on our legitimate interests. This is done for our safety, if someone leaves illegal contents (insults, forbidden political propaganda, etc.) in comments and contributions. In this case, we ourselves can be prosecuted for the comment or contribution and are therefore interested in the author’s identity.
Furthermore, we reserve the right to process user data for the purpose of spam detection on the basis of our legitimate interests.
The personal information provided in the course of comments and contributions, any contact and website information as well as the content information will be stored permanently by us until the user objects.
**Processed data types:** Inventory data (e.g. names, addresses), Contact data (e.g. e-mail, telephone numbers), Content data (e.g. text input, photographs, videos), Usage data (e.g. websites visited, interest in content, access times), Meta/communication data (e.g. device information, IP addresses).
**Data subjects:** Users (e.g. website visitors, users of online services).
**Purposes of Processing:** Contractual services and support, Feedback (e.g. collecting feedback via online form), Security measures, Managing and responding to inquiries.
**Legal Basis:** Performance of a contract and prior requests (Article 6 (1) (b) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR), Consent (Article 6 (1) (a) GDPR), Pprotection of vital interests (Article 6 (1) (d) GDPR).
### **Contacting us**
When contacting us (e.g. by contact form, e-mail, telephone or via social media), the data of the inquiring persons are processed insofar as this is necessary to answer the contact enquiries and any requested activities.
The response to contact enquiries within the framework of contractual or pre-contractual relationships is made in order to fulfil our contractual obligations or to respond to (pre)contractual enquiries and otherwise on the basis of the legitimate interests in responding to the enquiries.
**Processed data types:** Inventory data (e.g. names, addresses), Contact data (e.g. e-mail, telephone numbers), Content data (e.g. text input, photographs, videos).Data subjects: Communication partner (Recipients of e-mails, letters, etc.).
**Purposes of Processing:** contact requests and communication.
**Legal Basis:** Performance of a contract and prior requests (Article 6 (1) (b) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
### **Newsletter and Electronic Communications**
We send newsletters, e-mails and other electronic communications (hereinafter referred to as “newsletters”) only with the consent of the recipient or a legal permission. Insofar as the contents of the newsletter are specifically described within the framework of registration, they are decisive for the consent of the user. Otherwise, our newsletters contain information about our services and us.
In order to subscribe to our newsletters, it is generally sufficient to enter your e-mail address. We may, however, ask you to provide a name for the purpose of contacting you personally in the newsletter or to provide further information if this is required for the purposes of the newsletter.
**Double opt-in procedure:** The registration to our newsletter takes place in general in a so-called Double-Opt-In procedure. This means that you will receive an e-mail after registration asking you to confirm your registration. This confirmation is necessary so that no one can register with external e-mail addresses.
The registrations for the newsletter are logged in order to be able to prove the registration process according to the legal requirements. This includes storing the login and confirmation times as well as the IP address. Likewise the changes of your data stored with the dispatch service provider are logged.
**Deletion and restriction of processing:** We may store the unsubscribed email addresses for up to three years based on our legitimate interests before deleting them to provide evidence of prior consent. The processing of these data is limited to the purpose of a possible defense against claims. An individual deletion request is possible at any time, provided that the former existence of a consent is confirmed at the same time. In the case of an obligation to permanently observe an objection, we reserve the right to store the e-mail address solely for this purpose in a blacklist.
**Information on legal bases:** The sending of the newsletter is based on the consent of the recipients or, if consent is not required, on the basis of our legitimate interests in direct marketing. Insofar as we engage a service provider for sending e-mails, this is done on the basis of our legitimate interests. The registration procedure is recorded on the basis of our legitimate interests for the purpose of demonstrating that it has been conducted in accordance with the law.
**Contents:** Information about new or updated resources, events or websites or services we are launching.
**Analysis and performance measurement:** The newsletters contain a so-called “web-beacon”, i.e. a pixel-sized file, which is retrieved from our server when the newsletter is opened or, if we use a mailing service provider, from its server. Within the scope of this retrieval, technical information such as information about the browser and your system, as well as your IP address and time of retrieval are first collected.
This information is used for the technical improvement of our newsletter on the basis of technical data or target groups and their reading behaviour on the basis of their retrieval points (which can be determined with the help of the IP address) or access times. This analysis also includes determining whether newsletters are opened, when they are opened and which links are clicked. For technical reasons, this information can be assigned to the individual newsletter recipients. It is, however, neither our endeavour nor, if used, that of the shipping service provider to observe individual users. The evaluations serve us much more to recognize the reading habits of our users and to adapt our content to them or to send different content according to the interests of our users.
The evaluation of the newsletter and the measurement of success is carried out, subject to the express consent of the user, on the basis of our legitimate interests for the purposes of using a user-friendly and secure newsletter system which serves both our business interests and the expectations of the user.
A separate objection to the performance measurement is unfortunately not possible, in this case the entire newsletter subscription must be cancelled or objected to.
Processed data types: Inventory data (e.g. names, addresses), Contact data (e.g. e-mail, telephone numbers), Meta/communication data (e.g. device information, IP addresses), Usage data (e.g. websites visited, interest in content, access times).
Data subjects: Communication partner (Recipients of e-mails, letters, etc.).
**Purposes of Processing:** Direct marketing (e.g. by e-mail or postal).
**Legal Basis:** Consent (Article 6 (1) (a) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
**Opt-Out:** You can cancel the receipt of our newsletter at any time, i.e. revoke your consent or object to further receipt. You will find a link to cancel the newsletter either at the end of each newsletter or you can otherwise use one of the contact options listed above, preferably e-mail.
### **Services and service providers being used:**
**Service Provider:** Flodesk ****Email marketing platform;
### **Web Analysis, Monitoring and Optimization**
Web analysis is used to evaluate the visitor traffic on our website and may include the behaviour, interests or demographic information of users, such as age or gender, as pseudonymous values. With the help of web analysis we can e.g. recognize, at which time our online services or their functions or contents are most frequently used or requested for repeatedly, as well as which areas require optimization.
In addition to web analysis, we can also use test procedures, e.g. to test and optimize different versions of our online services or their components.
For these purposes, so-called user profiles can be created and stored in a file (so-called “cookie”) or similar procedures in which the relevant user information for the aforementioned analyses is stored. This information may include, for example, content viewed, web pages visited and elements and technical data used there, such as the browser used, computer system used and information on times of use. If users have consented to the collection of their location data, these may also be processed, depending on the provider.
The IP addresses of the users are also stored. However, we use any existing IP masking procedure (i.e. pseudonymisation by shortening the IP address) to protect the user. In general, within the framework of web analysis, A/B testing and optimisation, no user data (such as e-mail addresses or names) is stored, but pseudonyms. This means that we, as well as the providers of the software used, do not know the actual identity of the users, but only the information stored in their profiles for the purposes of the respective processes.
### **Services and service providers being used:**
**Matomo:** The information generated by the cookie about your use of this website will only be stored on our server and not disclosed to third parties;
**Service provider:** Web analytics/ reach measurement in self-hosting; **Website: [https://matomo.org/](https://matomo.org/);**
**Retention period:** The cookies have a maximum storage period of 13 months.
### **Affiliate-Programmes und Affiliate-Links**
Within our online services, we include so-called affiliate links or other references (which for example may include search forms, widgets or discount codes) to the offers and services of third parties (collectively referred to as “affiliate links”). When users follow affiliate links or subsequently take advantage of offers, we may receive commission or other benefits (collectively referred to as “commission”) from these third parties.
In order to be able to track whether the users have followed the offers of an affiliate link used by us, it is necessary for the respective third party to know that the users have followed an affiliate link used within our online services. The assignment of affiliate links to the respective business transactions or other actions (e.g., purchases) serves the sole purpose of commission settlement and is removed as soon as it is no longer required for this purpose.
For the purposes of the aforementioned affiliate link assignment, the affiliate links may be supplemented by certain values that may be a component of the link or otherwise stored, for example, in a cookie. The values may include in particular the source website (referrer), time, an online identifier of the operator of the website on which the affiliate link was located, an online identifier of the respective offer, the type of link used, the type of offer and an online identifier of the user.
**Processed data types:** Contract data (e.g. contract object, duration, customer category), Usage data (e.g. websites visited, interest in content, access times), Meta/communication data (e.g. device information, IP addresses).
**Data subjects:** Users (e.g. website visitors, users of online services).
**Purposes of Processing:** Affiliate Tracking.Legal Basis: Consent (Article 6 (1) (a) GDPR), Performance of a contract and prior requests (Article 6 (1) (b) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
### **Plugins and embedded functions and content**
Within our online services, we integrate functional and content elements that are obtained from the servers of their respective providers (hereinafter referred to as “third-party providers”). These may, for example, be graphics, videos or social media buttons as well as contributions (hereinafter uniformly referred to as “Content”).
The integration always presupposes that the third-party providers of this content process the IP address of the user, since they could not send the content to their browser without the IP address. The IP address is therefore required for the presentation of these contents or functions. We strive to use only those contents, whose respective offerers use the IP address only for the distribution of the contents. Third parties may also use so-called pixel tags (invisible graphics, also known as “web beacons”) for statistical or marketing purposes. The “pixel tags” can be used to evaluate information such as visitor traffic on the pages of this website. The pseudonymous information may also be stored in cookies on the user’s device and may include technical information about the browser and operating system, referring websites, visit times and other information about the use of our website, as well as may be linked to such information from other sources.
**Processed data types:** Usage data (e.g. websites visited, interest in content, access times), Meta/communication data (e.g. device information, IP addresses), Inventory data (e.g. names, addresses), Contact data (e.g. e-mail, telephone numbers), Content data (e.g. text input, photographs, videos).
**Data subjects:** Users (e.g. website visitors, users of online services).
**Purposes of Processing:** Provision of our online services and usability, Contractual services and support, Security measures, Managing and responding to inquiries.
**Legal Basis:** Consent (Article 6 (1) (a) GDPR), Performance of a contract and prior requests (Article 6 (1) (b) GDPR), Legitimate Interests (Article 6 (1) (f) GDPR).
### **Services and service providers being used:**
**YouTube videos:** Video contents; Service provider: Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Ireland, , parent company: Google LLC, 1600 Amphitheatre Parkway, Mountain View, CA 94043, USA;
**Opt-Out: Opt-Out-Plugin: [https://tools.google.com/dlpage/gaoptout?hl=en](https://tools.google.com/dlpage/gaoptout?hl=en),**
**Settings for the Display of Advertisements: [https://adssettings.google.com/authenticated](https://adssettings.google.com/authenticated).**
### **Erasure of data**
The data processed by us will be erased in accordance with the statutory provisions as soon as their processing is revoked or other permissions no longer apply (e.g. if the purpose of processing this data no longer applies or they are not required for the purpose).
If the data is not deleted because they are required for other and legally permissible purposes, their processing is limited to these purposes. This means that the data will be restricted and not processed for other purposes. This applies, for example, to data that must be stored for commercial or tax reasons or for which storage is necessary to assert, exercise or defend legal claims or to protect the rights of another natural or legal person.
### **Rights of Data Subjects**
As data subject, you are entitled to various rights under the GDPR, which arise in particular from Articles 15 to 21 of the GDPR:
**Right to Object:** You have the right, on grounds arising from your particular situation, to object at any time to the processing of your personal data which is based on letter (e) or (f) of Article 6(1) GDPR, including profiling based on those provisions. Where personal data are processed for direct marketing purposes, you have the right to object at any time to the processing of the personal data concerning you for the purpose of such marketing, which includes profiling to the extent that it is related to such direct marketing.
**Right of withdrawal for consents:** You have the right to revoke consents at any time.
**Right of access:** You have the right to request confirmation as to whether the data in question will be processed and to be informed of this data and to receive further information and a copy of the data in accordance with the provisions of the law.
**Right to rectification:** You have the right, in accordance with the law, to request the completion of the data concerning you or the rectification of the incorrect data concerning you.
**Right to Erasure and Right to Restriction of Processing:** In accordance with the statutory provisions, you have the right to demand that the relevant data be erased immediately or, alternatively, to demand that the processing of the data be restricted in accordance with the statutory provisions.
**Right to data portability:** You have the right to receive data concerning you which you have provided to us in a structured, common and machine-readable format in accordance with the legal requirements, or to request its transmission to another controller.
**Complaint to the supervisory authority:** You also have the right, under the conditions laid down by law, to lodge a complaint with a supervisory authority, in particular in the Member State of your habitual residence, place of work or place of the alleged infringement if you consider that the processing of personal data relating to you infringes the GDPR.
### **Terminology and Definitions**
**Affiliate Tracking:** Affiliate tracking logs links that the linking websites use to refer users to websites with products or other offers. The owners of the respective linked websites can receive a commission if users follow these so-called “affiliate links” and subsequently take advantage of the offers (e.g. buy goods or use services). To this end, it is necessary for providers to be able to track whether users who are interested in certain offers subsequently follow the affiliate links. It is therefore necessary for the functionality of affiliate links that they are supplemented by certain values that become part of the link or are otherwise stored, e.g. in a cookie. The values include in particular the source website (referrer), time, an online identification of the owner of the website on which the affiliate link was located, an online identification of the respective offer, an online identifier of the user, as well as tracking specific values such as advertising media ID, partner ID and categorizations.
**Content Delivery Network (CDN):** A “Content Delivery Network” (CDN) is a service with whose help contents of our online services, in particular large media files, such as graphics or scripts, can be delivered faster and more securely with the help of regionally distributed servers connected via the Internet.
**Controller:** “Controller” means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data.
**Conversion Tracking:** “Conversion Tracking” refers to a procedure by which the effectiveness of marketing measures can be determined. As a rule, a cookie is stored on the devices of the users within the websites on which the marketing measures are carried out and then called up again on the target website (e.g. this enables us to track whether the ads we placed on other websites were successful).
**IP Masking:** IP masking is a method by which the last octet, i.e. the last two numbers of an IP address, are deleted so that the IP address alone can no longer be used to uniquely identify a person. IP masking is therefore a means of pseudonymising processing methods, particularly in online marketing.
**Personal Data:** “personal data” means any information relating to an identified or identifiable natural person (“data subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
**Processing:** The term “processing” covers a wide range and practically every handling of data, be it collection, evaluation, storage, transmission or erasure.
**Profiling:** “Profiling” means any automated processing of personal data consisting in the use of such personal data to analyse, evaluate or predict certain personal aspects relating to a natural person (depending on the type of profiling, this includes information regarding age, gender, location and movement data, interaction with websites and their contents, shopping behaviour, social interactions with other people) (e.g. interests in certain contents or products, click behaviour on a website or the location). Cookies and web beacons are often used for profiling purposes.
**Targeting:** Tracking” is the term used when the behaviour of users can be traced across several websites. As a rule, behavior and interest information with regard to the websites used is stored in cookies or on the servers of the tracking technology providers (so-called profiling). This information can then be used, for example, to display advertisements to users presumably corresponding to their interests.
**Web Analytics:** Web Analytics serves the evaluation of visitor traffic of online services and can determine their behavior or interests in certain information, such as content of websites. With the help of web analytics, website owners, for example, can recognize at what time visitors visit their website and what content they are interested in. This allows them, for example, to optimize the content of the website to better meet the needs of their visitors.
For purposes of web analytics, pseudonymous cookies and web beacons are frequently used in order to recognise returning visitors and thus obtain more precise analyses of the use of an online service.