(1) Our technical-organizational security measures, with which we protect all data from the access of unauthorized persons, are always kept up-to-date. As far as your data is collected and recorded by us, it is stored on specially protected servers. These are protected by technical and organizational measures against loss, destruction, access, modification or distribution by unauthorized persons. Access to your data is only possible for a limited number of authorized persons. All our employees are sworn to confidentiality. Personal information is always transmitted in encrypted form. The transmitted data is stored in a database that is only accessible to administrators.
(2) We point out, however, that data transmission via the Internet (for example, when communicating by email) may be vulnerable security wise. There is no complete protection from the data being accessed by third parties.
5. Links to websites of other providers
7. Integrated Maps from Google Maps
The website contains embedded maps from Google Maps to illustrate the university’s locations. The maps from Google Maps are a product of Google LLC, 1600 Amphitheatre Parkway, Mountain View, CA 94043, USA. When you visit a page with an embedded map, your browser usually connects directly to Google’s servers. By doing so, Google receives the information that your computer has called up the corresponding page of our website. This will also give Google your computer’s IP address and information about your browser. Google will receive this information even if you do not have a Google account. If you are logged in to your Google account when you visit the site, it is possible that Google may associate this directly with your account. If you use certain services of Google on the device used for retrieval and have not objected to access to your location data, processing of your location data may also occur in connection with accessing the page with the map. It is to be assumed that Google will use your data mentioned for commercial purposes in addition to enabling use, optimization, and prevention of misuse. For more information on data protection at Google, please visit policies.google.com/privacy. There you will also find information on how you can restrict the processing of your data at Google. The university has no influence on the processing of data at Google.
8. Contact form
You can contact us via our contact form. To use our contact form, you must first complete the mandatory fields.
We use this data on the basis of Article 6 (1) item (a) GDPR in order to respond to your inquiry.
Your data will only be stored to answer your request. We will delete your data as soon as it is no longer required and if there are no legal obligations to retain it. This is usually the case 90 days after processing your request.
You have the right to object to the storing of your data at any time in accordance with Article 6 (1) item (f) GDPR. To do so, please contact the email address provided in the legal notice below.
9. Newsletter data
You can subscribe to our newsletter via our website. When registering for the newsletter, please note that we require certain data (at least your email address).
The newsletter will only be sent if you have given us your explicit consent. Once you have subscribed, you will receive a confirmation email to the email address you have provided (known as double opt-in). You may revoke your consent at any time. An easy way to withdraw your consent is, for example, via the “unsubscribe” link in every newsletter.
When you sign up for our newsletter, we store further data in addition to the above mentioned data in order to prove that you have subscribed to our newsletter. This may include storing your full IP address at the time of ordering or confirmation of the newsletter, as well as a copy of the confirmation email sent by us. Legal basis for the processing of data is Article 6 (1) item (f) GDPR. Our legitimate interest here is to account for the user’s consent to the newsletter delivery..
10. SSL encryption
This site uses SSL encryption for security reasons and to protect the transmission of sensitive content, such as the requests you send to us as the site operator. You can recognize an encrypted connection when the address line of the browser changes from "http: //" to "https: //" and the lock symbol appears in your browser line. When SSL encryption is enabled, it is virtually impossible for third parties to read the data you transmit to us.