Google Recaptcha Data Processing Agreement

The newsletter is sent as part of the processing on our behalf by a service provider to whom we transmit your e-mail address for this purpose. For this purpose, we have concluded a contract for the processing of orders. This service provider is based outside a country of the European Union for which there is no eu adequacy decision. The cooperation is therefore based on standard contractual clauses of the European Commission. The customer has control over certain data sharing policies. These policies allow Customer, in accordance with the functionality of the Services, to determine the product version settings applicable to End Users for specific purposes. Customer may choose to use the logging functionality provided by Google through the Services. The following data processing within the framework of the analysis and advertising tools takes place – unless we refer separately to another legal basis – on the basis of our legitimate interests in a meaningful analysis of the user behavior of our website visitors in order to optimize the website itself and the associated advertising. This is done on the basis of Article 6(1)(f) GDPR. Data Protection Officer for the purposes of the GDPR Our Data Protection Officer can be contacted at the above address or by e-mail at privacy@astronovainc.com.

2.2 The terms “personal data”, “data subject”, “processing”, “controller” and “processor” used in these terms and conditions have the meaning specified in the GDPR, regardless of whether European or non-European data protection law applies. If you wish to view our vacancies via our website and/or apply for a job online, you will be redirected via a hyperlink to a website of a third party outside the EU, as our online application process takes place centrally via this portal. Please read the privacy policy of the website to which you will be redirected for job offers and online applications before submitting any personal data. If you contact us via one of our contact forms or by e-mail, e.B. for information requests, advice to the media, technical support, warranty registration or to download applications, we store the personal data you have provided in this context for the purpose of processing your request, performing a contract, to carry out pre-contractual measures, to allow our free service offer (e.B. Media consulting) or to send interesting offers and information about our products by mail. Required fields are marked as such. The collected data can be found in the respective contact form. As the operator of this website, we do not receive any knowledge of the data collected in this way and cannot draw any conclusions about individual visitors to the website. If you have a Facebook account and are logged in to it, this account may be linked to the processing of data collected by Facebook, over which we have no influence in terms of content. Personalized ads can then be shown to you.

Detailed information on the use of data for advertising purposes on Facebook and Facebook`s current privacy policy can be found with further information on the protection of your personal data at the following address: www.facebook.com/about/privacy/. Power. Data center power systems are designed to be redundant and maintainable without compromising continuous operation, 24/7. In most cases, the data center`s critical infrastructure components come with a primary and alternative power source, each with the same capacity. Emergency power supply is provided by various mechanisms, for example. B uninterruptible power supplies (UPS batteries), which provide reliable power protection in the event of power failure, power failure, overvoltage, undervoltage and frequency conditions outside the tolerance. If power is interrupted, the backup power supply is designed to provide the data center with full-capacity transition power for 10 minutes until diesel generator systems are supported. Diesel generators are able to turn on automatically in seconds to provide enough backup power to typically run the data center at full capacity for a period of several days.

We would like to point out that, as the provider of this website, we do not know whether and what information Twitter collects and uses. Detailed information can be found in the provider`s privacy policy under the following link: twitter.com/privacy. You can change the privacy settings of your Twitter account by following this link: twitter.com/account/settings. By participating in the Privacy Shield program, Twitter ensures that an adequate level of data protection is respected. Before onboarding sub-processors, Google conducts an audit of the sub-processors` security and privacy practices to ensure that sub-processors provide an appropriate level of security and confidentiality for their access to data and the scope of services they provide. Once Google has assessed the risks posed by the Sub-Processor, the Sub-Processor shall enter into appropriate contractual terms of security, privacy and data protection, subject to the requirements set out in Section 11.3 (Requirements for a Sub-Processor Order) of these Terms. 12.1 Google`s Cloud Team for Privacy. Google`s Cloud Data Protection team may be contacted at support.google.com/cloud/contact/dpo (and/or by other means that Google makes available from time to time). Consents to the receipt of our newsletter and current offers are recorded in order to be able to prove this in accordance with legal requirements. This includes the time of consent, the IP address used, the personal data you have provided and the text of the data protection declaration brought to your attention in this context.

This is typical of any Google product where responsibility for the protection of personal data and the enforcement of local laws is the duty of the user. In this situation, you should know that even when using tools from large companies that may have in-depth knowledge of data protection laws, you should still perform your own due diligence. 7.1.4 Google Security Support. Google helps Customer (taking into account the nature of Customer`s processing of Personal Data and the information available to Google) to comply with its obligations under Sections 32 to 34 of the GDPR by: (a) storing, isolating and storing data. Google stores the data in a shared environment on Google`s own servers. Subject to instructions to the contrary from the customer (e.g. B in the form of a data location selector), Google replicates customer data across multiple geographically dispersed data centers. Google also logically isolates customer data. The customer has control over certain data sharing policies. These policies, in accordance with the functionality of the Services, allow Customer to determine which product publishing settings apply to Customer`s end users for specific purposes.

Customer may use the logging feature provided by Google through the Services. Internal Data Access Processes and Policies – Access Policy. Google`s internal data access processes and policies are designed to prevent unauthorized persons and/or systems from accessing the systems used to process personal data. Google designs its systems in such a way that (i) only authorized persons can access the data to which they are authorized to access; and (ii) ensure that personal data cannot be read, copied, modified or deleted without permission during processing, use and after registration. The systems are designed to detect inappropriate access. Google uses a centralized access management system to control staff access to production servers and only provides access to a limited number of authorized employees. Google`s authentication and authorization systems use SSH certificates and security keys and are designed to provide Google with secure and flexible access mechanisms. These mechanisms are designed to grant only trusted access rights to site hosts, logs, data, and configuration information.

Google requires the use of unique user IDs, strong passwords, two-factor authentication, and carefully monitored access lists to minimize the risk of unauthorized account use. .

This entry was posted in Uncategorized. Bookmark the permalink.