Welcome to iKokoon
BETA Version full access - without hidden costs.
Our hands-on experts assist to start and improve your project. Get a second opinion for free.
Manage internal and external resources in teams.
Helps you to find resources across your organizaton and from external providers or social platforms (e.g. Linked-In) integrating these into your teams.
The job search algorithm takes into consideration inter alia skills & qualifications, availability, resource & travel costs.
Easily adapt your jobs and search algorithm criterias to your needs.
Planning on Time & Budget
You can detail project and budget planning for project resources, resource backfill, travel costs, buffer, consumable items and work centers.
It adapts to your planning detail needs. Compare plannings to actuals.
Updates your budget dynamically as plannings are changing.
Compare budget accurancy factors with other KPIs.
Budget can be split to various phases and be followed up.
Plan resources on their availability and the estimated task durations.
Communication & Knowledge
Reporting adapts individually to your needs and is integrated into your dashboards and widgets.
You have a set of graphs at hand which help you to depict your statistics and KPIs as state of the art.
Statistical markers can be set individually throughout the system.
Statistics are customizable and are updated real-time without affecting system performance.
Manage, evaluate, accept and mitigate risks throughout your project or the whole organization.
You can link risks to tasks and project items.
Surveillance of classified risks is easily achievable.
Risks can be linked to budgets, tasks and projects for further mitigation and supervision.
Warnings and their markers are configurable for keeping you up-to-date throughout the risk process.
Communicate with your team and its members indivdually, as a group or within a task.
Send likes or emails around to groups or individuals. Link these to tasks for keeping information stored at the place you need it.
Announcements can be made to individuals, to a team, an organization or a corporation.
Create best practice or project learning centers as you like and exchange knowledge across teams and your organization .
iMethodology helps you to ensure that all members across a project are informed about their tasks requirements.
The task management system can be used stand-alone or can be integrated with your project.
It is perfectly embedded with your planning and budgeting tool.
As tasks may be changed, deleted or added their linked project sections are updated.
Change management means monitoring and controlling changes across iterations, business areas and project cycles. iKokoon helps to simplify complex tasks and avoid mistakes.
Task & Change Management
Try iKokoon Products
FREE Project Audit
Use our top project managers incl. project management office
Designed to manage both small and complex projects. Collaborate in teams.
Automated algorithms help keeping projects right under your control.
Risk Management with powerful reporting - Identify, manage, mitigate risks. You can link them to projects, budgets or tasks.
Fast and easy QA processes and workflows combined with powerful reporting. Setup, manage and tailor your QA libraries and labs. Monitor your QA sessions and combine these with KPIs, Contracts, Project or Task Management.
Methodologies streamline projects, align expectations and processes as well as task related knowledge. Easy to setup and adaptable to your necessities. Methodologies are a lot more than just templates! They streamline expertise across teams and can serve as project reference.
HUMAN CAPITAL MANAGEMENT
Manage resources within your organization. Plan each resource based on its availability. These adapt continously to project and task changes. Approve tasks and timesheets based on your project and organizational setup. Design workflows individually for external and internal resources.
Create your own investment portfolio and manage it. Adjust workflows and KPIs as to your necessities. Combines with the powerful iKokoon BI-Tool.
Efficient Team Management - manage your resources on availability, add resources to teams based on qualification, costs and travel implications, assign modules, manage team security, enhanced team communication etc.
Budgets can be linked to projects or to task management instances. It is completely integrated with the contract management. Define your level and groups of budgeting, split these into categories or group them into phases. Real-time updates as projects or tasks are changing. Integrated with the project planning tool e.g. resource costs, resource backfill costs, work-centers, consumable items, buffer and travel costs. Currency and unit of measure functionality is included.
Powerful Task Management - Design and setup your own workflows, iterations, areas, tasks types, statuses and many more.
MANAGE YOUR PROJECTS & INVESTMENTS PROFESSIONALLY
Be on time and budget.
Our experts may assist in setting up and managing your project.
iKokoon contains a lot of automated expert processes helping you to watch over your project properly on your own.
Usually, after a good and efficient expert project setup – projects can be mastered independently even by non-experienced professionals. Even afterwards, feel free to ask in case you need from time to time some assistance – either remote or on premise.
Data Protection and Privacy
The data protection and privacy details are in English as it is this website’s principal language.
Please, request a translation from DataProtectionOfficer@dynamix-it.com if not available in your language.
The following note give a simple overview of what happens to your personal information visiting our website.
“Personal Data” means any information relating to an identified or identifiable natural person. An identifiable natural person is one who can be identified directly or indirectly by referencing an identifier such as a name, an identification number, location data, an online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person.
As summary, personal data is all data that personally identifies you.
Website Data Collection
The data processing on this website is carried out by the website operator. Its contact details can be found in the legal notice of this website.
The data you provide us will be collected, e.g. your contact data you enter in a contact form.
Other data is collected automatically when visiting the website through our IT systems. These are above all technical data (for example Internet browser, operating system or time of the page request). The collection of this data is automatic as soon as you enter our website.
Part of the data is collected to ensure a flawless operation of the website. Other data is used for analyzing your user behavior.
At any time, you have the right to obtain free information about the origin, recipient and purpose of your stored personal data. You also have a right to request the correction, blocking or deletion of this data. For this purpose and for further questions about data protection, you can contact us at any time at the address given in the legal notice. Furthermore, you have a right of appeal to the competent supervisory authority.
Analysis and Third-Party Tools
Your surfing behavior can be statistically evaluated by mainly using cookies and analysis programs during our website visit. The analysis of your surfing behavior is usually anonymous; the surfing behavior cannot be traced back to you. You can object to this analysis or prevent it by not using certain tools. Detailed information can be found below.
You have the right to reject data analysis by using the below described possibilities.
General Information & Mandatory Information
If you use this website, various personal data will be collected.
Please note that data transmission over the Internet (for example, when communicating via e-mail) may have security vulnerabilities. A complete protection of the data from access by third parties is not possible.
Note to the responsible body
The responsible data processing unit of this website is:
Dynamix IT Services SRL
Strada Tudor Vladmirescu Nr. 36 Cladirea B, Et 5 Targoviste, jud. Dambovita, Romania
Company Register ID: J15/1092/2017
VAT ID: RO36144031
Tel: +40 784 00 10 66
Affiliated companies are:
Dynamix IT GmbH, Hamburg, Germany
Dynamix IT Limited, HongKong, HongKong
Responsible entity is the natural or legal person who, alone or in concert with others, decides on the purposes and means of processing personal data (such as names, e-mail addresses, etc.).
Data Processing Disclaimer
Many data processing operations are only possible with your expressed consent. You can cancel your existing consent at any time. An informal message by e-mail to us is sufficient. The lawfulness of data processing carried out until cancellation remains unaffected.
Right of Appeal to the Competent Supervisory Authority
In the case of violations of data protection law, the person concerned has the right of appeal to the competent supervisory authority. The competent supervisory authority for data protection issues is the data protection officer of the country or federal state in which the legal entity of the responsible data processing unit is based.
Right of Data Transfer
You or a third party named by you have the right to obtain data in a stadnard machine readable format which was processed, because of your consent or in fulfillment of a contract. In case it is required to transfer directly data to a third party in charge only to the extent of technical possibility.
SSL or TLS encryption
This site uses, for security reasons and to protect the transmission of confidential content, such as orders or requests that you send to us as a site operator, an SSL or TLS encryption.
You can recognize an encrypted connection by changing the address line of the browser from “http: //” to “https: //” and the lock symbol in your browser line.
If SSL or TLS encryption is enabled, the data submitted cannot be read by third parties.
Right of Information, Blocking, Deletion
Based on the current legal regulations there is at any time the right free of charge of information disclosure on stored personal data, its origin and recipients as well as the purpose of data processing and, if necessary, a right of data correction, blocking or deletion. For further information on personal data you can contact us at any time at the address given in the legal notice.
Advertising Mails Disclaimer
No one is allowed sending marketing, advertising or any information materials based on contact information of this website without our prior consent. We expressly reserve the right to take legal action in the event of the unsolicited receipt, e.g. spam e-mails.
Data Protection Officer
Our appointed data protection officer is:
Dynamix IT Services SRL
Strada Tudor Vladmirescu Nr. 36 Cladirea B Et 5 Targoviste, jud. Dambovi Romania
Tel: +40 784 001 066
Website Data Collection
We also use “session cookies”. They are deleted after website visit. Other cookies remain stored on your device until one deletes them. These cookies give the website the ability to recognize your browser and certain settings for and during one’s next visit.
One can set his browser settings for being informed when cookies are stored. These can be individually allowed also only user confirmation. They can be generally excluded or automatic deletion of cookies on browser closing can be set. Disabling cookies will limit the functionality of this website.
Server log files
The server automatically collects and stores information in log files, which your browser automatically transmits to us. These are inter alia:
• Browser type and browser version
• used operating system
• Referrer URL
• Host name of the accessing computer
• Time of the server request
• IP address
We do not merge it with other data sources.
The legal baseline for data processing is Art. 6 para. 1f DGPR, which allows data processing for contractual or pre-contractual measures.
Contact, Survey & Newsletter Form
All details regarding inquiries via the website contact, survey and newsletter forms are stored for processing the request, follow-up questions, sending you a newsletter and/or to provide you with better products and services.
We will not share this information without your consent.
The processing of the data entered the website’s contact, survey or newsletter form(s) is exclusively based on your consent (Art. 6 para. 1a DGPR). It can be any time disclaimed. An informal message by e-mail to us is sufficient. Mandatory statutory provisions – especially retention periods – remain unaffected.
The information you provide in the contact, survey or newsletter form(s) will remain with us until we are asked by you to delete it, revoke your consent to storage or delete the purpose for data storage (for example, after your request has been processed). Mandatory statutory provisions – especially retention periods – remain unaffected. The legality of the already finished data processing operations remains unaffected by the withdrawal or revocation.
We store in addition to comments, creation and update date and time, commenter’s e-mail address, IP address and username.
Comments and their related data are stored until the content has been completely deleted.
Comments are stored based on one’s consent (Art. 6 para. 1a DGPR). It can be any time revoked. An informal message by e-mail to us is sufficient. The legality of the already completed data processing operations remains unaffected by the disclaimer.
Website content can be shared in privacy-friendly social networks such as Facebook, Twitter or Google+. This site uses Shariff for it.
This tool establishes only direct contact between the social networks and users, if the respective button is clicked.
User data is not automatically transferred via Shariff to platform operators. Only in case the user is logged in to social networks and by clicking the buttons of Facebook, Google+, Twitter & Co. a confirmation window opens.
Our users can share website content in a privacy-compliant way on social networks, without creating complete surf profiles by the network operators.
The Shariff component provides social media buttons that comply with data protection laws. Shariff was developed for the German computer magazine c’t and is published by GitHub, Inc.
Developer of the component is GitHub, Inc. 88 Colin P. Kelly Junior Street, San Francisco, CA 94107, USA.
Find further information here https://www.heise.de/ct/artikel/Shariff-Social-Media-Buttons-mit-Datenschutz-2467514.html
Advertising and Analysis Tools
This website uses functions of the web analytics service Google Analytics. Provider is Google Inc., 1600 Amphitheater Parkway, Mountain View, CA 94043, USA.
The information generated about your use of this website is usually transmitted to a Google server in the USA and stored there.
Google Analytics cookies are stored based on Art. 6 para. 1f DGPR. The website operator has a legitimate interest in analyzing user behavior for optimizing both its website and advertising.
We have activated IP anonymization function for this website. As a result, your IP address will be truncated by Google within member states of the European Union or other parties to the Agreement on the European Economic Area prior to transmission to the United States. Only in exceptional cases will the full IP address be sent to a Google server in the US and shortened there. On behalf of the operator of this website, Google will use this information to evaluate your use of the website, to compile reports on website activity and to provide other services related to website activity and internet usage to the website operator. The IP address provided by Google Analytics as part of Google Analytics will not be merged with other Google data.
You can prevent the storage of cookies by a corresponding setting of your browser; however, please note you may not be able to use all the features of this website. In addition, you may prevent collection of data by Google generated by a cookie and related to your use of the website (including your IP address) as well as the processing of this data by Google by downloading the browser plug-in available under the following link and install: https://tools.google.com/dlpage/gaoptout?hl=en.
Data Collection Disclaimer
An opt-out cookie will be set which prevents the collection of your data on future visits to this website: disable Google Analytics.
We have entered into a contract data processing agreement with Google and fully implement the strict requirements of the German data protection authorities when using Google Analytics.
Plugins and tools
Our website uses plugins from the Google-powered YouTube page. Site operator is YouTube, LLC, 901 Cherry Ave., San Bruno, CA 94066, USA.
On visits of our YouTube plug-in-enabled sites, you will be connected to YouTube servers. Our visited sites and pages are transmitted to the YouTube servers.
If you’re logged into your YouTube account, YouTube will allow you to associate your browsing behavior directly with your personal profile. You can prevent it by logging out of your YouTube account.
The use of YouTube is in the interest of a proper online presentation for our company and website. This constitutes a legitimate interest within the meaning of Art. 6 para. 1f DGPR.
This site uses the mapping service Google Maps via an API. Provider is Google Inc., 1600 Amphitheater Parkway, Mountain View, CA 94043, USA.
Google Maps requires saving your IP address. This information is usually transmitted to and stored on a Google server in the United States. The provider of this site has no influence on this data transfer.
The use of Google Maps is in the interest of a proper presentation of our company and products. This constitutes a legitimate interest within the meaning of Art. 6 para. 1f GDPR.
Below you find the furhter details on privacy policies:
Anonymous data collection
You can visit our websites without providing any personal information. In this context we store no personal data. In order to improve our offer, we evaluate only statistical data from which we will not able to draw any conclusion on your person. Nevertheless, by using the contact form or e-mail-adress you are not anonymous any more. We collect personal data (details about personal or factual circumstances of an identified or identifiable natural person) only to the extent provided by you. We use your email address only to process your request. Your data is then deleted, unless you have agreed to the further processing and use. A transfer of your personal data to third parties for promotional reasons will not occur without your express consent.
Access, rectification, blocking and deletion of data
You always have the right of free information about your stored personal data and the right to rectification, erasure or blocking. You can contact us on request with the contact details found in our imprint.
What are cookies?
Cookies are files or pieces of information that may be stored on your computer (or other internet enabled devices, such as a smartphone or tablet) when you visit a Www.ikokoon.com Site. A cookie will usually contain the name of the website from which the cookie has come from, the “lifetime” of the cookie (i.e. how long it will remain on your device), and a value, which is usually a randomly generated unique number.
What types of cookies do we use?
Two types of cookies may be used on the Www.ikokoon.com Site – “session cookies” and “persistent cookies”. Session cookies are temporary cookies that remain on your device until you leave the Www.ikokoon.com Site. A persistent cookie remains on your device for much longer or until you manually delete it (how long the cookie remains on your device will depend on the duration or “lifetime” of the specific cookie and your browser settings). Some of the pages you visit may also collect information using pixel tags (also called clear gifs) that may be shared with third parties which directly support our promotional activities and website development, about visitors to Www.ikokoon.com Site. The information may be shared with our third party advertising agency to better target Internet banner advertisements on our websites. The information is not, however, personally identifiable, although it could be linked to your personal information.
Cookies used on Www.ikokoon.com Site
|Type of Cookie||What do they do?||Do these cookies collect my personal data / identify me?|
|Necessary||These cookies are essential to make Www.ikokoon.com websites work correctly, they enable you to move around our websites and use our features. Examples include remembering previous actions (e.g. entered text) when navigating back to a page in the same session.||These cookies don’t identify you as an individual. If you do not accept these cookies, it may affect the performance of the website, or parts of it.|
|Performance||These cookies help us understand how visitors interact with our websites by providing information about the areas visited, the time spent on the website, and any issues encountered, such as error messages. This helps us improve the performance of our websites.||These cookies don’t identify you as an individual. All data is collected and aggregated anonymously.|
|Functionality||These cookies allow our websites to remember the choices you make (such as your user name, language or the region you are in) to provide a more personalised online experience. They can also enable visitors to watch videos, play games and engage with social tools, such as blogs, chatrooms and forums.||The information these cookies collect may include personally identifiable information that you have disclosed, such as your username or profile picture. We shall always be transparent with you about what information we collect, what we do with it and with whom we share it. If you do not accept these cookies, it may affect the performance and functionality of the website and may restrict access to content on the website.|
|Targeting / advertising||These cookies are used to deliver content that is more relevant to you and your interests. They may be used to deliver targeted advertising or to limit the number of times you see an advertisement. They also help us measure the effectiveness of advertising campaigns on Www.ikokoon.com and non –Www.ikokoon.com websites. We may use these cookies to remember websites you have visited and we may share this information with other parties, including advertisers and our agencies.||Most types of these cookies track consumers via their IP address so may collect some personal identifiable information.|
Do we use third party cookies?
We use a number of suppliers that may also set cookies on your device on our behalf when you visit the Www.ikokoon.com Site to allow them to deliver the services they are providing. When you visit the Www.ikokoon.com Site you may receive cookies from third party websites or domains. We endeavour to identify these cookies before they are used so that you can decide whether or not you wish to accept them. More information about these cookies may be available on the relevant third party’s website.
How can I control or delete cookies?
Most internet browsers are initially set up to automatically accept cookies. You can change the settings to block cookies or to alert you when cookies are being sent to your device. There are a number of ways to manage cookies. Please refer to your browser instructions or help screen to learn more about how to adjust or modify your browser settings. If you disable the cookies that we use, this may impact your experience while on the Www.ikokoon.com Site, for example you may not be able to visit certain areas of a Www.ikokoon.com Site or you may not receive personalised information when you visit a Www.ikokoon.com Site. If you use different devices to view and access the Www.ikokoon.com Site (e.g. your computer, smartphone, tablet etc) you will need to ensure that each browser on each device is adjusted to suit your cookie preferences. Click here for more information.
Like most internet-service operators, tawk.to collects non-personally-identifying information of the sort that web browsers, apps and servers typically make available, such as the browser type, language preference, geographical location, referring site, and the date and time of each visitor request. tawk.to’s purpose in collecting non-personally identifying information is to better understand how tawk.to’s visitors use its services, and to provide tawk.to users the ability to understand how their visitors use their services. From time to time, tawk.to may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its services. tawk.to also collects potentially personally-identifying information like Internet Protocol (IP) addresses for users that use the services and visitors.
Gathering of Personally-Identifying Information
Certain visitors to tawk.to’s websites and users of tawk.to’s apps choose to interact with tawk.to in ways that require tawk.to to gather personally-identifying information. The amount and type of information that tawk.to gathers depends on the nature of the interaction. For example, we ask users of our app to provide an email address. In each case, tawk.to collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor’s interaction with tawk.to. tawk.to does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.
tawk.to may collect statistics about the behavior of visitors to its websites. However, tawk.to does not disclose personally-identifying information other than as described below.
Protection of Certain Personally-Identifying Information
tawk.to discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that: (i) need to know that information in order to process it on tawk.to’s behalf or to provide services available at tawk.to’s webservices, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using tawk.to’s webservices, you consent to the transfer of such information to them. tawk.to will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, tawk.to discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when tawk.to believes in good faith that disclosure is reasonably necessary to protect the property or rights of tawk.to, third parties or the public at large. If you are a registered user of tawk.to and have supplied your email address, tawk.to may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what’s going on with tawk.to and our products. We primarily use our various product blogs to communicate this type of information, so we expect to keep this type of email to a minimum. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. tawk.to takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.
If tawk.to, or substantially all of its assets, were acquired, or in the unlikely event that tawk.to goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of tawk.to may continue to use your personal information as set forth in this policy.
Linkedin Cookie and Privacy Policies
SlideShare, a content sharing platform, and LinkedIn Pulse, a news reading application, are part of the LinkedIn family.
Cookies on the LinkedIn site
What is a cookie?
A cookie is a small file placed onto your device that enables LinkedIn features and functionality. For example, cookies enable us to identify your device, secure your access to LinkedIn and our sites generally, and even know if someone attempts to access your account from a different device. Cookies also enable you to easily share content on LinkedIn and help us serve relevant ads to you.
What types of cookies does LinkedIn use?
We use two types: persistent cookies and session cookies. A persistent cookie helps us recognize you as an existing user, so it’s easier to return to LinkedIn without signing in again. After you sign in, a persistent cookie stays in your browser and will be read by LinkedIn when you return to the site. Session cookies only last for as long as the session (usually the current visit to a web site or a browser session). Adobe Flash is another technology that can provide cookie-equivalent functionality. Adobe Flash is capable of storing information on your device (in a file outside of your browser). Please note that not all browsers provide the ability to remove Adobe Flash “cookies” (also called “locally stored objects,” or “LSOs”). You can restrict or block Adobe Flash cookies/LSOs through the Adobe website. As with any cookie, if you do restrict flash cookies/LSOs, there may be some LinkedIn features you aren’t able to use.
What are cookies used for?
Cookies can be used to do lots of different things, like recognize you when you visit LinkedIn, remember your preferences, and give you a personalized experience that’s in line with your settings. Cookies also make your interactions with LinkedIn more secure and faster. Additionally, cookies allow us to bring you advertising both on and off the LinkedIn site, and bring customized features to you through LinkedIn plugins such as our “Share” button.
|Categories of Use||Description|
|Authentication||If you’re signed in to LinkedIn, cookies help us show you the right information and personalize your experience.|
To learn more about our cookies, take a look at our cookie table in more detail. Please note that the names of cookies, pixels and other technologies may change over time.
How are cookies used for advertising purposes?
What third-party cookies does LinkedIn use?
Most browsers allow you to control cookies through their settings preferences. However, if you limit the ability of websites to set cookies, you may worsen you overall user experience, since it will no longer be personalized to you. It may also stop you from saving customized settings like login information.
What to do if you don’t want cookies to be set
Other helpful resources
Your Privacy Matters
At LinkedIn, our fundamental philosophy is “members first.” That value powers all of the decisions we make, including how we gather and respect your personal information. We’ve crafted the policy below to be as clear and straightforward as possible. Our aim is for you—our members—to always feel informed and empowered with respect to your privacy on LinkedIn. Visit our Safety Center for tips on using LinkedIn smartly and securely. View our California DNT notice Introduction Information Collected Uses & Sharing of Personal Info Your Choices & Obligations Important Information
What information we collect
Address Book and Other Services That Sync with LinkedIn
Using the LinkedIn Sites and Applications
We collect information when you visit our Services (including, LinkedIn, SlideShare and Pulse), use our mobile applications, and interact with advertising on and off our Services. We collect information when you use (whether as a Member or a Visitor) our websites, applications, our platform technology (such as “Share on LinkedIn” plugins for publishers) or other Services. For example, we collect information when you view or click on ads on and off our Services, perform a search, import your address book, join and participate in groups, participate in polls, install one of our mobile applications, view content on Pulse or SlideShare, share articles on our Services and apply to jobs through our Services. If you are logged in on LinkedIn.com, SlideShare.net, the Pulse app or another Service or one of our cookies on your device identifies you, your usage information and the log data described in Section 1.10 of this policy, such as your IP address, will be associated by us with your account. Even if you’re not logged into a Service, we log information about devices used to access our Services, including IP address.
Using Third-Party Services and Visiting Third-Party Sites
We collect information when you use your account to sign in to other sites or services, and when you view web pages that include our plugins and cookies. You allow us to receive information when you use your account to log in to a third-party website or application. Also, when you visit a third-party site that embeds our social plugins (such as “Share on LinkedIn” for publishers) we receive information that those pages have loaded in your web browser. If you are logged in as a Member when you visit sites with our plugins, we use this information to recommend tailored content to you. We will use this information to personalize the functionality we provide on third-party sites, including providing you insights from your professional network and allowing you to share information with your network. Our retention of this data is addressed in Section 3.2. We may provide reports containing aggregated impression information to companies hosting our plugins and similar technologies to help them measure traffic to their websites, but no personal data. Please note that SlideShare.net, Pulse.me and the Pulse app are part of the LinkedIn Services, not third-party sites or applications. You also allow us to receive information about your visits and interaction with the sites and services of our partners that include our cookies and similar technologies, unless you opt out. If you are not a Member, we rely on the online terms between you and our partners.
Advertising Technologies and Web Beacons
Log Files, IP Addresses, and Information About Your Computer and Mobile Device
We collect information from the devices and networks that you use to access our Services. When you visit or leave our Services (whether as a Member or Visitor) by clicking a hyperlink or when you view a third-party site that includes our plugin or cookies (or similar technology), we automatically receive the URL of the site from which you came or the one to which you are directed. Also, advertisers receive the URL of the page that you are on when you click an ad on or through our Services. We also receive the internet protocol (“IP”) address of your computer or the proxy server that you use to access the web, your computer operating system details, your type of web browser, your mobile device (including your mobile device identifier provided by your mobile device operating system), your mobile operating system (if you are accessing LinkedIn using a mobile device), and the name of your ISP or your mobile carrier. We may also receive location data passed to us from third-party services or GPS-enabled devices that you have set up, which we use to show you local information (for example, Pulse articles about your area or jobs postings in your location) on our mobile applications and for fraud prevention and security purposes. Most mobile devices allow you to prevent real time location data being sent to us, and of course we will honor your settings. In the case of our Android apps, you will be provided notice of the types of data (e.g. location) that will be sent to us. If you choose to use our app after this notice, we process this data to enable registration or preview product features for you (e.g. jobs near you). If you choose not to become a Member, we will delete this information.
How we use your personal information
Consent to LinkedIn Processing Information About You
We communicate with you using LinkedIn messaging, email, and other ways available to us. We may send you messages relating to the availability of the Services, security, or other service-related issues. We also may send promotional InMail messages to your LinkedIn inbox. You can change your email settings at any time. We communicate with you through email, notices posted on the LinkedIn websites or apps, messages to your LinkedIn inbox, and other means available through the Services, including mobile text messages and push notifications. Examples of these communications include: (1) welcome and engagement communications – informing you about how to best use our Services, new features, updates about other Members you are connected to and their actions, etc.; (2) service communications – these will cover service availability, security, and other issues about the functioning of our Services; (3) promotional communications – these include both email and InMail messages (InMail messages are only delivered to your LinkedIn InBox), and may contain promotional information directly or on behalf of our partners, including job opportunities and information from companies that are hiring. These messages will be sent to you based on your profile information and messaging preferences. We track the open rate of your InMails to provide your InMail acceptance score. You may change your email and contact preferences at any time by signing into your account and changing yourLinkedIn or SlideShare email settings. You can also opt out of promotional messages by sending a request to LinkedIn Help Center. Please be aware that you cannot opt out of receiving service messages from us.
With certain communications you send on our Services, the recipient can see your name, email address, and some network information. Many communications that you initiate through our Services (for example, an invitation sent to a non-Member) will list your name and primary email address in the header of the message. Messages you initiate may also provide the recipient with aggregate information about your network (for example, how many people are in your network). Other communications that you initiate through the Services, like a request for an introduction, will list your name as the initiator but will not include your personal email address contact information. Once you have connected with an individual, regardless of who sent the invitation, your contact information will be shared with that individual. We use automatic scanning technology to help protect you and other Members. Such technology checks links and other content in your InMails, network updates and Group contributions to help us identify and block malicious links and malware, reduce spam and optimize the delivery of our Services.
Service Development; Customized Experience
We use the information and content you provide to us to conduct research and development and to customize your experience and try to make it relevant and useful to you. We use information and content that you and other Members provide to us to conduct research and development for the improvement of our Services in order to provide you and other Members and Visitors with a better, more intuitive experience and drive membership growth and engagement on our Services and to help connect professionals to economic opportunity. We also customize your experience and the experiences of others on our Services. For example, when you sign in to your account, we may display the names and photos of new Members who have recently joined your network or recent updates from your connections and companies you follow. We try to show you content, such as news and presentations, that is relevant to you, your industry, or your profession. We also use Members information and content for invitations and communications promoting our Services that are tailored to the recipient.
Sharing Information with Affiliates
We share your information across our different Services, among companies in the LinkedIn family. We may share your personal information with our affiliates (meaning entities controlled by, controlling or under common control with LinkedIn) outside of the LinkedIn entity that is your data controller (for example, LinkedIn Corporation may share your information with LinkedIn Ireland, or other LinkedIn operating entities) as reasonably necessary to provide the Services. You are consenting to this sharing. We combine information internally across different Services. For example, SlideShare may recommend better content to you based on your LinkedIn content preferences and the articles you read on Pulse, and LinkedIn could present you a better tailored network update stream based on your SlideShare activity, whether or not you tied your SlideShare, Pulse and/or LinkedIn accounts (e.g. by signing in SlideShare or Pulse with your LinkedIn account), as we may be able to identify you across different Services using cookies or similar technologies.
Sharing Information with Third Parties
Third Parties Using LinkedIn Platform Services
Polls and Surveys
We conduct our own surveys and polls and also help third parties do this type of research. Your participation in surveys or polls is up to you. You may also opt out of getting invitations to participate in surveys. Polls and Surveys may be conducted by us, Members, or third parties. Some third parties may target advertisements to you on the results page based on your answers in the poll. We or third parties may follow up with you via InMail regarding your participation unless you have opted out of receiving InMail messages. We may use third parties to deliver incentives to you to participate in surveys or polls. If the delivery of incentives requires your contact information, you may be asked to provide personal information to the third party fulfilling the incentive offer, which will be used only for the purpose of delivering incentives and verifying your contact information. It is up to you whether you provide this information, or whether you desire to take advantage of an incentive. Your consent to use any personal information for the purposes set forth in the poll or survey will be explicitly requested by the party conducting it. We are a member of the Council of American Survey Research Organizations (“CASRO”) and abides by CASRO guidelines for market research. You may opt out of participating in surveys by changing your settings to stop receiving these inquiries and requests.
Our Services help you search for other professionals, companies, groups, professional content, and jobs. You can search for Members, employment opportunities, information about companies, and community content from Groups on our Services. For example, you can find Members with particular expertise or experience, or Members that you may know from your industry or profession. You can also find employment opportunities and information about companies. You can also find content from Groups, SlideShare and Pulse. We use personal information from our Services, including Member profiles, Groups content, and Company Pages, to inform and refine our search service.
You are responsible for any information you post on our Services, and this content will be accessible to others. If you participate in Groups, share content on your network update stream, or import a blog or other content, you should be aware that any information you choose to disclose using these services can be read, collected, and used by other Members in these forums, developers, and other third parties, including advertisers. We are not responsible for the information you choose to submit in these forums. Your Groups contributions are typically searchable on our Services and some content in Groups may be public and searchable on the Internet if the group owner has not closed the group for public discussions. You can identify closed groups by the padlock icon next to the group name. You can remove your Groups posts at any time. However, others may have copied and used the information that you shared.
Testimonials and Advertisements Placed through LinkedIn Ads
Talent Recruiting, Marketing and Sales Solutions
We offer a premium service to recruiters and others, which can be used to search for, organize, and communicate with potential candidates or offer business opportunities. In some cases we allow the export of public profile information. You can control how your information is exported by changing which parts of your public profile are accessible to search engines. We offer customized people-search functionality along with organizational and communications tools (including activity alerts) as part of our talent recruiting, marketing and sales solutions. These services allow subscribers – generally, enterprises and professional organizations – to export limited information from Members’ public profiles, such as name, headline, current company, current title, and location (for example, San Francisco Bay Area), in order to effectively manage candidate sourcing. You may limit or prevent such subscribers from exporting your profile information by configuring your public profile visibility settings to restrict access to these fields. We do not provide email or other contact information to these subscribers. However, if you post that information as part of your profile it will be available to them and others. A recruiter or other such subscriber may also manage and store information it has independently obtained about you outside of our Services, such as a resume, in connection with our platform. Any personal information obtained independently of our Services will not be added by us to your profile and is not under our control but is subject to the policies of our recruiting, marketing or sales solution subscriber. We store such information on behalf of such subscriber who can remove it at any time. We do not further process such information.
Pages for Companies, Schools, Influencers, and Other Entities
Companies and other entities can create pages on our Services. If you follow one of these pages, non-identifiable information about you will be provided to the page’s administrators. Certain pages on the Services are public (e.g., company and college pages), and any communications or information shared through them will be accessible by the entity that created them. If you follow a person or organization, you will be listed among its followers, which can be viewed by others including the page owner. We use aggregate information about followers and viewers to provide data about such pages’ performance (for example, visits and updates).
Compliance with Legal Process and Other Disclosures
We may disclose your personal information if compelled by law, subpoena, or other legal process, or if necessary to enforce our User Agreement. It is possible that we may need to disclose personal information, profile information, or information about your activities as a Member or Visitor when required by law, subpoena, or other legal process, whether in the United States, Ireland, or other jurisdictions, or if we have a good faith belief that disclosure is reasonably necessary to (1) investigate, prevent, or take action regarding suspected or actual illegal activities or to assist government enforcement agencies; (2) enforce the User Agreement, investigate and defend ourselves against any third-party claims or allegations, or protect the security or integrity of our Service; or (3) exercise or protect the rights, property, or safety of LinkedIn, our Members, personnel, or others. We attempt to notify Members about legal demands for their personal information when appropriate in our judgment, unless prohibited by law or court order or when the request is an emergency. In light of our principles, we may dispute such demands when we believe, in our discretion, that the requests are overbroad, vague or lack proper authority, but do not commit to challenge every demand. To find out more about how we engage with government requests for data see our Law Enforcement Data Request Guidelines.
Disclosures to Others as the Result of a Change in Control or Sale of LinkedIn Corporation
We may employ third parties to help us with the Services We may employ third party companies and individuals to facilitate our Services (e.g. maintenance, analysis, audit, marketing and development). These third parties have limited access to your information only to perform these tasks on our behalf and are obligated to LinkedIn not to disclose or use it for other purposes.
Data Processing Outside Your Country
We may process your information outside the country where you live. We may transfer your information and process it outside your country of residence, wherever LinkedIn, its affiliates and service providers operate.
Your Choices & Obligations
Rights to Access, Correct, or Delete Your Information, and Closing Your Account
You can change your LinkedIn information at any time by editing your profile, deleting content that you have posted, or by closing your account. You can also ask us for additional information we may have about your account. You have a right to (1) access, modify, correct, or delete your personal information controlled by LinkedIn regarding your profile, (2) change or remove your content, and (3) close your account. You can request your personal information that is not viewable on your profile or readily accessible to you (for example, your IP access logs) through LinkedIn‘s Help Center. If you close your account(s), your information will generally be removed from the Service within 24 hours. We generally delete closed account information and will de-personalize any logs or other backup information through the deletion process within 30 days of account closure, except as noted below. With respect to SlideShare accounts and activity, if you would like us to delete your record and/or remove a particular comment you have made on SlideShare.net, or to provide a copy of any personal information to which you may be entitled, please contact us at email@example.com. We will remove your information from SlideShare.net within 24 hours and delete and/or de-personalize it from our systems within 30 days of closure, except as noted below. Please note: Information you have shared with others (for example, through InMail, network updates, content sharing, or Groups) or that others have copied may also remain visible after you have closed your account or deleted the information from your own profile. Groups content associated with closed accounts will show an unknown user as the source. In addition, you may not be able to access, correct, or eliminate any information about you that other Members copied or exported out of our Services, because this information may not be in our control. Your public profile may be displayed in search engine results until the search engine refreshes its cache.
You have to meet LinkedIn’s minimum age requirements to create an account. Visit our Safety Center for tips on using LinkedIn smartly and securely. As described in Section 2.1 of the User Agreement, persons must be of Minimum Age to use LinkedIn. Please visit our Safety Center for additional information about safely using our Services.
TRUSTe and Safe Harbor
California’s Shine the Light Law
We don’t share any of your personal information with third parties for direct marketing. California Civil Code Section 1798.83, known as the “Shine The Light” law, permits our customers who are California residents to request and obtain from us a list of what personal information (if any) we disclosed to third parties for direct marketing purposes in the preceding calendar year and the names and addresses of those third parties. Requests may be made only once a year and are free of charge. Under Section 1798.83, we currently do not share any personal information with third parties for their direct marketing purposes.
Wir nutzen Google Analytics zudem dazu, Daten aus AdWords und dem Double-Click-Cookie zu statistischen Zwecken auszuwerten. Sollten Sie dies nicht wünschen, können Sie dies über den Anzeigenvorgaben-Manager ( http://www.google.com/settings/ads/onweb/?hl=de ) deaktivieren.
Additionally, we use Google Analytics for statistical evaluation of data from AdWordsand the double-click-cookie. In case you do not wish, it can be deactivated via the tool managing marketing specifications, presets and defaults.
Einsatz von Google AdSense Unsere Website nutzt Google AdSense, einen Online-Werbedienst der Google Inc. („Google“). Google AdSense verwendet sog. „Cookies“, Textdateien, die auf dem Computer der Nutzer gespeichert werden und die eine Analyse der Benutzung der Website ermöglicht. Google AdSense verwendet auch sogenannte Web Beacons (unsichtbare Grafiken). Durch diese Web Beacons können Informationen wie der Besucherverkehr auf den Seiten dieses Angebots ausgewertet werden. Die durch Cookies und Web Beacons erzeugten Informationen über die Benutzung dieser Website (einschließlich der IP-Adresse der Nutzer) und Auslieferung von Werbeformaten werden an einen Server von Google in den USA übertragen und dort gespeichert. Diese Informationen können von Google an Vertragspartner von Google weiter gegeben werden. Google wird Ihre IP-Adresse jedoch nicht mit anderen von Ihnen gespeicherten Daten zusammenführen. Nutzer können die Installation der Cookies von Google AdSense auf verschiedene Weise verhindern: durch eine entsprechende Einstellung der Browser-Software; b) durch Deaktivierung der interessenbezogenen Anzeigen bei Google ; c) durch Deaktivierung der interessenbezogenen Anzeigen der Anbieter, die Teil der Selbstregulierungs-Kampagne „ About Ads “ sind; d) durch dauerhafte Deaktivierung durch ein Browser-Plug-in. Die Einstellungen unter b) und c) werden gelöscht, wenn Cookies in den Browsereinstellungen gelöscht werden. Nähere Informationen zu Datenschutz und Cookies für Werbung bei Google AdSense sind in der Datenschutzerklärung von Google , insbesondere unter den folgenden Links zu finden:http://www.google.de/policies/privacy/partners/ http://www.google.de/intl/de/policies/technologies/ads http://support.google.com/adsense/answer/2839090
Diese Formulierungen wurden übernommen von / Above quotes were taken from: www.datenschutzbeauftragter-info.de
Information we collect
We collect information to provide better services to all of our users – from figuring out basic stuff like which language you speak, to more complex things like which ads you’ll find most useful, the people who matter most to you online, or which YouTube videos you might like. We collect information in the following ways: Information you give us. For example, many of our services require you to sign up for a Google Account. When you do, we’ll ask for personal information, like your name, email address, telephone number or credit card to store with your account. If you want to take full advantage of the sharing features we offer, we might also ask you to create a publicly visible Google Profile, which may include your name and photo. Information we get from your use of our services. We collect information about the services that you use and how you use them, like when you watch a video on YouTube, visit a website that uses our advertising services, or view and interact with our ads and content. This information includes: Device information We collect device-specific information (such as your hardware model, operating system version, unique device identifiers, and mobile network information including phone number). Google may associate yourdevice identifiers or phone number with your Google Account. Log information When you use our services or view content provided by Google, we automatically collect and store certain information in server logs. This includes: details of how you used our service, such as your search queries. telephony log information like your phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls. Internet protocol address . device event information such as crashes, system activity, hardware settings, browser type, browser language, the date and time of your request and referral URL. cookies that may uniquely identify your browser or your Google Account. Location information When you use Google services, we may collect and process information about your actual location . We use various technologies to determine location, including IP address, GPS, and other sensors that may, for example, provide Google with information on nearby devices, Wi-Fi access points and cell towers. Unique application numbers Certain services include a unique application number. This number and information about your installation (for example, the operating system type and application version number) may be sent to Google when you install or uninstall that service or when that service periodically contacts our servers, such as for automatic updates. Local storage We may collect and store information (including personal information) locally on your device using mechanisms such asbrowser web storage (including HTML 5) and application data caches. Cookies and similar technologies We and our partners use various technologies to collect and store information when you visit a Google service, and this may include using cookies or similar technologies to identify your browser or device. We also use these technologies to collect and store information when you interact with services we offer to our partners, such as advertising services or Google features that may appear on other sites. Our Google Analytics product helps businesses and site owners analyze the traffic to their websites and apps. When used in conjunction with our advertising services, such as those using the DoubleClick cookie, Google Analytics information is linked, by the Google Analytics customer or by Google, using Google technology, with information about visits to multiple sites . Information we collect when you are signed in to Google, in addition to information we obtain about you from partners, may be associated with your Google Account. When information is associated with your Google Account, we treat it as personal information. For more information about how you can access, manage or delete information that is associated with your Google Account, visit the Transparency and choice section of this policy. Back to top
How we use information we collect
Transparency and choice
People have different privacy concerns. Our goal is to be clear about what information we collect, so that you can make meaningful choices about how it is used. For example, you can: Review and update your Google activity controls to decide what types of data, such as videos you’ve watched on YouTube or past searches, you would like saved with your account when you use Google services. Review and control certain types of information tied to your Google Account by using Google Dashboard. View and edit your preferences about the Google ads shown to you on Google and across the web, such as which categories might interest you, using Ads Settings. You can also opt out of certain Google advertising services here. Adjust how the Profile associated with your Google Account appears to others. Control who you share information with through your Google Account. Take information associated with your Google Account out of many of our services. Choose whether your Profile name and Profile photo appear in shared endorsements that appear in ads. You may also set your browser to block all cookies, including cookies associated with our services, or to indicate when a cookie is being set by us. However, it’s important to remember that many of our services may not function properly if your cookies are disabled. For example, we may not remember your language preferences. Back to top
Information you share
Many of our services let you share information with others. Remember that when you share information publicly, it may be indexable by search engines, including Google. Our services provide you with different options on sharing and removing your content. Back to top
Accessing and updating your personal information
Whenever you use our services, we aim to provide you with access to your personal information. If that information is wrong, we strive to give you ways to update it quickly or to delete it – unless we have to keep that information for legitimate business or legal purposes. When updating your personal information, we may ask you to verify your identity before we can act on your request. We may reject requests that are unreasonably repetitive, require disproportionate technical effort (for example, developing a new system or fundamentally changing an existing practice), risk the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup systems). Where we can provide information access and correction, we will do so for free, except where it would require a disproportionate effort. We aim to maintain our services in a manner that protects information from accidental or malicious destruction. Because of this, after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems. Back to top
Information we share
We work hard to protect Google and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular: We encrypt many of our services using SSL. We offer you two step verification when you access your Google Account, and a Safe Browsing feature in Google Chrome. We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorized access to systems. We restrict access to personal information to Google employees, contractors and agents who need to know that information in order to process it for us, and who are subject to strict contractual confidentiality obligations and may be disciplined or terminated if they fail to meet these obligations. Back to top
Compliance and cooperation with regulatory authorities
Specific product practices
The following notices explain specific privacy practices with respect to certain Google products and services that you may use: Chrome and Chrome OS Books Payments FiberFor more information about some of our most popular services, you can visit the Google Product Privacy Guide. Back to top
Other useful privacy and security related materials
How Google uses data when you use our partners’ sites or apps
Many websites use Google technologies to improve their content and keep it free. When you visit a website that uses our advertising products (like AdSense), social products (like the +1 button) or analytics tools (Google Analytics), your web browser automatically sends certain information to Google. This includes, for example, the web address of the page that you’re visiting and your IP address. We may also set cookies on your browser, or read cookies that are already there. Similarly, apps that partner with Google can send us information such as the name of the app and an identifier that helps us to determine which ads we’ve served to other apps on your device.
How we use the information sent by your browser
When you visit websites or use apps that use Google technologies, we may use the information we receive from those websites and apps to, for example: Make ads more effective Provide reports of ads activity to advertisers and websites hosting the ads, and to ensure payment to those website publishers Help website and app owners using Google Analytics to understand how visitors engage with their sites or apps Improve your Google+ experience Detect and defend against fraud and other security risks to protect users and partners Meet our legal duties Improve our products
How you can control the information sent to Google
For tips and advice on staying safe and managing your data online, visit the Google Safety Center. Here are some of the ways you can control the information that is shared by your web browser when you visit or interact with Google services on partners’ sites across the web: Ads Settings helps you control the ads by Google that you see across the web. You can learn how ads are selected for you, opt out of certain categories and block specific advertisers. Learn more about advertising. Many sites across the web use Google Analytics to understand how visitors engage with their sites or apps. If you don’t want Analytics to be used in your browser, you can install the Google Analytics browser add-on. Learn more about Google Analytics and privacy. Google makes it easy for you to make recommendations for your friends – for example, by clicking the +1 button on content you like. Some of your +1s may show your name and Google+ profile photo in ads, but you can opt out if you don’t want to appear in ads. You can also visit the +1 tab on your Google+ profile to review and manage all of your +1’s. Learn more about how to get to your +1 tab. Incognito mode in Chrome allows you to browse the web without recording webpages and files in your browser history. Cookies are deleted after you’ve closed all of your incognito windows and tabs, and your bookmarks and settings are stored until you delete them. Learn more about cookies. https://support.google.com/analytics/answer/6004245?hl=en http://www.google.com/policies/privacy/ YoutubeProtecting your privacy If someone has posted your personal information or uploaded a video of you without your consent, start by contacting the uploader and asking them to remove the content. If you can’t reach an agreement with the uploader, or if you are uncomfortable contacting them, you canrequest removal of content based on our Privacy Guidelines. For content to be considered for removal, an individual must be uniquely identifiable. When assessing if an individual is uniquely identifiable, we consider the following factors: Your image or voice Full name Financial information Contact information Other personally identifiable information When you report a privacy complaint, we consider public interest, newsworthiness, and consent as factors in our final decision. Check out our Privacy Guidelines for a more detailed explanation of our privacy complaint process and the factors we take into account when evaluating privacy claims. Tips on how to protect your privacy on YouTube: Think carefully before you post personal information. This includes things like the town you live in, where you go to school, or your home address. Protect your account data and don’t share your password with others.YouTube employees will never ask you for your password. Don’t be fooled if someone contacts you pretending to be from YouTube.
Get permission first. As a rule of thumb, you should get permission before filming other people or posting their personal information. Visit our Privacy and Safety Settings page for a list of tools that you can use to manage your content and experience on the site.
Terms and Conditions on Data Protection “XING” refers to the service provided subject to these General Terms and Conditions and/or XING AG. The protection of your personal data is of utmost concern to XING. In these terms and conditions on data protection XING would like to inform you about how XING treats your personal data and how you can exchange this data with other users of XING. Additional Privacy Policies apply to the following XING applications, which you can view on the application’s respective website: XING applications XING Talent Manager XING AdCreator XING Events kununu (German only) Contaxt (German only) Lebenslauf.com (German only) Jobbörse.com (German only) Basic Principles of XING for handling your Personal Data XING strictly adheres to the following basic principles in the protection of your Personal Data: XING shall collect, process and use your Personal Data in accordance with the laws and statutes on data protection of the Federal Republic of Germany and those of the European Union. XING shall use your Personal Data solely to provide you the XING Services on the Internet for which you have registered. XING will never pass your Personal Data on to any third party, neither for advertising, nor for marketing or for any other purposes without your consent. With the exception of some general information about your profession you alone decide which of the Personal Data you have made available to XING in your profile may be displayed by XING to other members of XING (cf. Section 3 of these Terms and Conditions on Data Protection). Persons not registered with XING may only view your Personal Data to the extent that you enable and allow them to do so (cf. Section 4). Definitions The following terms used in these Terms and Conditions on Data Protection shall have the following meanings: “Personal Data” shall mean all data and/or information about your profession or your person. “XING Websites” shall mean all websites on which XING provides the XING Services. “Social Network” shall mean the contact and communication forums that belong to the applications of the XING service. “Profile” shall mean the XING Website where the Personal Data you have made available to XING is displayed in accordance with your specifications and your consent. “XING Members” shall mean all registered users with a visible profile in the Social Network. “XING Services” shall mean all registration-based services provided by XING on the XING Websites. “Registration Data” shall mean the Personal Data you are obliged to make available to XING in the registration process for the XING Services (mandatory fields).
What does XING know about you, what do you give XING and XING Members permission to do, and what happens with your Personal Data? Registration Data In order for the XING Services to function, XING needs to collect and process certain elements of your Personal Data in the course of the registration process. First of all, this consists of the following data: Username Password Your password and/or your username are never visible to any XING Member at any time. XING shall never disclose or pass your password and/or your username on to any third party. Furthermore, you will need to fill out certain mandatory fields in the course of creating a Profile, such as: Business e-mail account Business telephone number First name, last name, form of address Date of birth Professional status Company name Position (Title) Industry Country, state and city of your company The following Personal Data from the Profile is accessible to other XING Members without any restrictions: First name, last name Professional status Company name Position (Title) Industry Country, state and city of your company With respect to the following Personal Data in the Profile, you may choose in each individual case whether the data shall be displayed to a specific other XING Member or not: Business e-mail account Business telephone number Date of birth Voluntary Data in the Profile If you wish, you may add more information about yourself to your Profile on a voluntary basis (hereinafter referred to as “Voluntary Data” ), to allow other XING Members to get to know you better and possibly encourage them to choose you as an appropriate business contact. At the moment, you are able to choose from the following Voluntary Data, for example: your interests, your education, companies you have previously worked for, what you have to offer to other XING Members, what you are looking for from other XING Members, etc. You may also upload a photograph of yourself, if you wish. The Voluntary Data you choose to enter in your profile is accessible to all other XING Members. With some of the Voluntary Data you may choose in each individual case if the data shall be displayed to a specific other XING Member. You can revoke Voluntary Data at any time by deleting the data in question from your profile.
Your Profile, Contact Management The following sections of the Personal Data you have made available to XING is visible to all other XING Members: First name, last name Professional status Company name Position (Title) Industry Country, state and city of your company All other XING Members may access your Profile and view the information displayed on the Profile, including such Voluntary Data you have specified to be made available to all other XING Members. Certain XING Members may be able to access further of your Voluntary Data in accordance with your specifications (chosen settings) for the respective XING Member in each individual case. If you send XING Members a request for personal contact, these XING Members are then saved in your Profile on a contact list. Should a XING Member confirm your request for contact, this XING Member shall be listed as a so called “confirmed contact”. Confirmed and unconfirmed contacts shall be registered separate from one another. Other XING Members may only ever view your list of confirmed contacts. XING has set your privacy settings under “Privacy” by default so that your list of confirmed contacts is displayed to all XING Members. However, you may change this setting at any time by yourself to the effect that your list of confirmed contacts is not visible to anybody at all or only to certain of your contacts, for example to the direct contacts of your contacts (i.e. second-level contacts) or only to third-level or fourth-level contacts. The following of your personal statistics are visible to all XING Members at all times: Number of your confirmed contacts Number of hits on your Profile Month and year of your membership Type of membership On your profile you will find an activity meter. This meter indicates whether you use the XING services regularly, however, it does not show any details about the way or the times you use the XING services. The activity meter is intended as an indication for other XING members to determine how intensely you use the XING services so that the other XING members can evaluate whether you will presumably react fast on a request via the XING services. You may suppress the activity meter at any time in the settings to your privacy under “Privacy” to the effect that the activity meter is not visible to other XING members. Other XING Members may send you private messages in order to establish contact with you. XING has set your privacy settings under “Privacy” by default so that all XING Members may send you private messages. You may restrict the ability of XING Members to send you private messages at any time to the effect that either no XING Members or only selected contacts may send you private messages, for example only the direct contacts of your contacts (i.e. second-level contacts) or only third-level or fourth-level contacts. As you can see, XING gives you complete control over your own privacy at all times.
Your comments You can like, find interesting and comment on your contacts’ activity (hereinafter referred to as “comments”). Your comments are then visible to the network of the contact on whose activity you commented. You can delete your comments at any time.
Billing details If you use any of XING’s paid services, XING will collect and use your billing details such as your credit card or bank details for billing and payment purposes. If you select credit card as your method of payment and pay with your MasterCard or Visa credit card (not American Express), XING S.à r.l. shall process your billing data along with any other details required for billing purposes (e.g. name and billing address). In such cases, XING AG and XING S.à r.l. shall process your data in accordance with applicable Luxembourg law, in particular the Law of 2 August 2002 on the Protection of Persons with regard to the Processing of Personal Data. XING S.à r.l. shall not process your data in any other cases, including if you choose a payment method other than credit card. To the extent required, your billing details are sent to, collected and processed by service providers such as credit card companies in order to process payments. Your billing details are saved in order to process payments for automatic user account extensions.
Visibility of your Profile to Non-Members of XING Under “Privacy” you can set the level of your Profile’s privacy at any time. This means that you decide whether to increase your level of privacy or opt in favour of more visibility online, enabling more exposure of your profile for potential business partners. When you register, your default privacy settings rather promote the spirit of networking. The data contained in your profile is visible to non-members of XING and traceable by search engines on the Internet. This, however, does not include personal contact details such as e-mail addresses or phone numbers. If you signed up to XING before 17/08/2007 the following regulation continues to apply: Your profile is preset to be invisible to non-members of XING and not traceable by search engines on the Internet. You can, of course, adjust these settings at any time. However, please note that if you do release your profile to non-members or search engines, this will automatically mean that the following sections of your registration data are displayed to non-members of XING: First name, last name, professional status, position (title), previous companies and positions, industry, country, state and city of your company If your profile shall be visible to non-members of XING or traceable by search engines on the Internet, such voluntary data that you have specified in the settings under “Privacy” to be visible to other XING members will also automatically be visible to non-members of XING. Finally, a maximum of four (4) of your confirmed contacts will automatically be visible, chosen at random. You may prevent the display of these four (4) confirmed contacts at any time by changing the setting for the display of confirmed contacts under “Privacy” to any other setting than “all members”.
Groups On the XING Websites, XING offers certain groups, forums and similar services. Each group has one (1) or more moderator(s). The moderator decides for each group whether the group is public or whether it is only accessible to a specific group of people, as well as who has read and/or write access for each relevant group. This information will be displayed on the XING Websites for the relevant group. It is visible to XING Members and it may also be visible to non-members of XING, depending on the settings chosen by the moderator. Please note: where a group is specified as “public” on the XING Website and in the event that the moderator has not restricted the access rights to the group, all contributions of XING Members to such a group can be read by all other XING Members, and these contributions are then also accessible to non-members of XING on the Internet without any restrictions. You may deactivate the traceability of your contributions to a group by Internet search engines or by so-called RSS readers in your privacy settings under “Privacy”. However, any contributions you posted on the group prior to deactivation will remain visible after the deactivation as well. RSS readers are programs which trace updates of a website, providing the website technically supports the so called RSS standard. Where Internet groups support the RSS standard, the RSS reader may track if, when and which new articles have been published.
Appointments, Activities, Event Management On the XING Websites, XING offers you the possibility to enter your appointments, activities and events as well as similar services (collectively hereinafter referred to as “events”). With this function you may manage and coordinate your events with other XING Members and/or with non-members of XING, and you may also invite other XING Members and/or non-members to specific events. Each event has one (1) or more hosts (organisers). The host decides for each event if and which information about the event is visible to other XING Members and/or for non-members of XING. Among other things, this information may include whether the event is reserved to XING Members or whether it is a public event and as such accessible to non-members, whether the number of participants is limited, whether the guest list is visible without any restrictions or if and which restrictions should apply to the visibility of the guest list. The above information shall be displayed on the XING Websites for the relevant event. It is visible to XING Members, and it may also be visible to non-members, depending on the settings chosen by the host.
Invitations As a XING Member you may invite others to join XING. XING shall process personal data collected in the course of the invitation on behalf of the XING member solely for expanding their network, e.g. through contact suggestions, and shall not use it for any other purposes. XING will send a reminder e-mail (“automatic reminder”) on behalf of the XING member to the recipient of the invitation 21 days after you send the invitation. You can deactivate the automatic reminder feature in your settings. You are also able to send out manual reminder e-mails in addition to the automatic reminder feature. XING only saves encrypted copies of the e-mail addresses to which you send invitations. This encryption is removed temporarily when you view these e-mail addresses in your XING account. You can delete the data in your account at any time. Invitation recipients have the right to revoke the use of their e-mail address for invitation purposes at any time. Please note that the following sections of your Personal Data are displayed to the recipient of the invitation: Your name Your company name Your position Your e-mail address Your photograph Your membership status
What does “Clickpath” mean? “Clickpath” is a function of the XING Services which registers access to XING Members’ Profiles by other XING Members, to event pages or access to specific information within XING Members’ Profiles. The information registered by Clickpath is only available to Premium Members of XING XING and organizers who have booked the Event Plus option for their events. By using Clickpath you can see which Profiles of other XING Members you have visited. You can also check which other XING Members have visited your Profile. By the same token, all other Premium Members of XING can do the same, i.e. they may see whether you have visited their Profile.
This feature is an essential part of contact management on XING and as such an essential feature of the XING Services: you are not able to deactivate this feature in your privacy settings. If you do not agree that other XING Members may see that you have visited their Profile, you should not use the XING Services.Furthermore, Clickpath registers which XING Members have visited your XING “About me” page which you can set up within the framework of XING Services, and which XING Members have visited the website of one of your previous companies. Any information registered by Clickpath is deleted by XING automatically within three (3) months after its registration.
Search Functions The XING Services offer various possibilities to search for particular XING Members, including a Power Search feature and a Search Agent feature. These various search functions may assist you, for example, in finding other XING Members with similar interests. The search functions can also help you to initiate contact with other XING Members who offer exactly what you are looking for. Thus, you can find the contacts you need – and systematically expand your personal network.
Newsletter, weekly status e-mails XING uses the electronic e-mail address(es) you entered to send you regular newsletters, status e-mails, advertising for similar products and services, and surveys for internal market research purposes (collectively hereinafter referred to as the “newsletter”), unless you object to such use. In these newsletters XING may inform you, among other things, about new features on XING, interesting contacts and certain personal statistics. You may choose to unsubscribe from the newsletter at any time by changing your notification settings on XING or by sending an e-mail to the link provided at the end of each newsletter without costs arising by virtue thereof, other than transmission costs pursuant to the basic rates.
Log Files/Mobile Handshake Each time you access a website from the XING Websites, XING will save the following data in a log file (the so called “server log”): The time, status, and amount of the transferred data, as well as the website from which you have reached the requested page of the XING Websites (the so-called “referrer”) The product and release information from your Internet browser (the so called “user agent”). This log file will be stored by XING in the standardised “combined” log file format for the Apache web server. XING will not store your IP address once you leave the XING Websites. Except for legislation regarding the storage of data, Users’ IP addresses will be deleted or anonymised once they end their session on the XING Websites. Anonymisation means that IP addresses are modified in such a way that specific personal and/or factual information cannot be attributed to a certain identified or identifiable person or can only be attributed by deploying a disproportionately large amount of time, effort and cost. XING uses the data from this log file in anonymous form without reference to your person for statistical purposes. In doing so, XING may analyse on which days and at which time the XING Websites are particularly frequented and how much data volume is created on the XING Websites. Furthermore, by using the log file, XING can identify defects on the XING Websites, such as defective hyperlinks or program defects, and thus continually improve the quality of the XING Websites. XING does not attribute the website demands stored in the log file to specific individual users. However, XING reserves the right to review the log files if XING has reasonable cause to believe that the member is using XING Services and/or XING Websites in breach of contractual agreements or the applicable legislation. In doing this, XING is protecting other XING Members and users, the safety of XING Members’ and users’ data, as well as XING Websites and the XING Services. The “Mobile Handshake” function allows you to see if there are XING Members in your vicinity who are also using this function. It allows other XING Members to find you if you have the “Mobile Handshake” function activated. To do this, XING needs to determine your location for a short period of time. In doing so, XING saves your position (longitude and latitude) and the point in time at which you used the “Mobile Handshake” function in its server log file. This information is only stored while XING determines your location. Once this process has been completed, your data will be deleted or anonymised.
Minors Membership of XING Services is reserved for persons who have reached the legal age of 18. Parents and legal guardians are responsible for the protection of their children’s privacy.
What kinds of information do we collect?
Depending on which Services you use, we collect different kinds of information from or about you.
Things you do and information you provide. We collect the content and other information you provide when you use our Services, including when you sign up for an account, create or share, and message or communicate with others. This can include information in or about the content you provide, such as the location of a photo or the date a file was created. We also collect information about how you use our Services, such as the types of content you view or engage with or the frequency and duration of your activities.
Things others do and information they provide. We also collect content and information that other people provide when they use our Services, including information about you, such as when they share a photo of you, send a message to you, or upload, sync or import your contact information.
Your networks and connections. We collect information about the people and groups you are connected to and how you interact with them, such as the people you communicate with the most or the groups you like to share with. We also collect contact information you provide if you upload, sync or import this information (such as an address book) from a device.
Information about payments. If you use our Services for purchases or financial transactions (like when you buy something on Facebook, make a purchase in a game, or make a donation), we collect information about the purchase or transaction. This includes your payment information, such as your credit or debit card number and other card information, and other account and authentication information, as well as billing, shipping and contact details.
Device information. We collect information from or about the computers, phones, or other devices where you install or access our Services, depending on the permissions you’ve granted. We may associate the information we collect from your different devices, which helps us provide consistent Services across your devices. Here are some examples of the device information we collect: Attributes such as the operating system, hardware version, device settings, file and software names and types, battery and signal strength, and device identifiers. Device locations, including specific geographic locations, such as through GPS, Bluetooth, or WiFi signals. Connection information such as the name of your mobile operator or ISP, browser type, language and time zone, mobile phone number and IP address.
Information from websites and apps that use our Services. We collect information when you visit or use third-party websites and apps that use our Services (like when they offer our Like button or Facebook Log In or use our measurement and advertising services). This includes information about the websites and apps you visit, your use of our Services on those websites and apps, as well as information the developer or publisher of the app or website provides to you or us.
Information from third-party partners. We receive information about you and your activities on and off Facebook from third-party partners, such as information from a partner when we jointly offer services or from an advertiser about your experiences or interactions with them.
Facebook companies. We receive information about you from companies that are owned or operated by Facebook, in accordance with their terms and policies. Learn more about these companies and their privacy policies. Return to top
How do we use this information?
We are passionate about creating engaging and customized experiences for people. We use all of the information we have to help us provide and support our Services. Here’s how:
Provide, improve and develop Services. We are able to deliver our Services, personalize content, and make suggestions for you by using this information to understand how you use and interact with our Services and the people or things you’re connected to and interested in on and off our Services. We also use information we have to provide shortcuts and suggestions to you. For example, we are able to suggest that your friend tag you in a picture by comparing your friend’s pictures to information we’ve put together from your profile pictures and the other photos in which you’ve been tagged. If this feature is enabled for you, you can control whether we suggest that another user tag you in a photo using the “Timeline and Tagging” settings. When we have location information, we use it to tailor our Services for you and others, like helping you to check-in and find local events or offers in your area or tell your friends that you are nearby. We conduct surveys and research, test features in development, and analyze the information we have to evaluate and improve products and services, develop new products or features, and conduct audits and troubleshooting activities.
Communicate with you. We use your information to send you marketing communications, communicate with you about our Services and let you know about our policies and terms. We also use your information to respond to you when you contact us.
How is this information shared?
Sharing On Our Services People use our Services to connect and share with others. We make this possible by sharing your information in the following ways:
People you share and communicate with. When you share and communicate using our Services, you choose the audience who can see what you share. For example, when you post on Facebook, you select the audience for the post, such as a customized group of individuals, all of your Friends, or members of a Group. Likewise, when you use Messenger, you also choose the people you send photos to or message. Public information is any information you share with a public audience, as well as information in your Public Profile, or content you share on a Facebook Page or another public forum. Public information is available to anyone on or off our Services and can be seen or accessed through online search engines, APIs, and offline media, such as on TV. In some cases, people you share and communicate with may download or re-share this content with others on and off our Services. When you comment on another person’s post or like their content on Facebook, that person decides the audience who can see your comment or like. If their audience is public, your comment will also be public.
People that see content others share about you. Other people may use our Services to share content about you with the audience they choose. For example, people may share a photo of you, mention or tag you at a location in a post, or share information about you that you shared with them. If you have concerns with someone’s post, social reporting is a way for people to quickly and easily ask for help from someone they trust. Learn More. Apps, websites and third-party integrations on or using our Services. When you use third-party apps, websites or other services that use, or are integrated with, our Services, they may receive information about what you post or share. For example, when you play a game with your Facebook friends or use the Facebook Comment or Share button on a website, the game developer or website may get information about your activities in the game or receive a comment or link that you share from their website on Facebook. In addition, when you download or use such third-party services, they can access your Public Profile, which includes your username or user ID, your age range and country/language, your list of friends, as well as any information that you share with them. Information collected by these apps, websites or integrated services is subject to their own terms and policies. Learn more about how you can control the information about you that you or others share with these apps and websites.
Sharing within Facebook companies. We share information we have about you within the family of companies that are part of Facebook. Learn more about our companies.
New owner. If the ownership or control of all or part of our Services or their assets changes, we may transfer your information to the new owner.
Sharing With Third-Party Partners and Customers We work with third party companies who help us provide and improve our Services or who use advertising or related products, which makes it possible to operate our companies and provide free services to people around the world. Here are the types of third parties we can share information with about you:
Advertising, Measurement and Analytics Services (Non-Personally Identifiable Information Only). We want our advertising to be as relevant and interesting as the other information you find on our Services. With this in mind, we use all of the information we have about you to show you relevant ads. We do not share information that personally identifies you (personally identifiable information is information like name or email address that can by itself be used to contact you or identifies who you are) with advertising, measurement or analytics partners unless you give us permission. We may provide these partners with information about the reach and effectiveness of their advertising without providing information that personally identifies you, or if we have aggregated the information so that it does not personally identify you. For example, we may tell an advertiser how its ads performed, or how many people viewed their ads or installed an app after seeing an ad, or provide non-personally identifying demographic information (such as 25 year old female, in Madrid, who likes software engineering) to these partners to help them understand their audience or customers, but only after the advertiser has agreed to abide by our advertiser guidelines. Please review your advertising preferences to understand why you’re seeing a particular ad on Facebook. You can adjust your ad preferences if you want to control and manage your ad experience on Facebook.
Vendors, service providers and other partners. We transfer information to vendors, service providers, and other partners who globally support our business, such as providing technical infrastructure services, analyzing how our Services are used, measuring the effectiveness of ads and services, providing customer service, facilitating payments, or conducting academic research and surveys. These partners must adhere to strict confidentiality obligations in a way that is consistent with this Data Policy and the agreements we enter into with them. Return to top
How can I manage or delete information about me?
You can manage the content and information you share when you use Facebook through the Activity Log tool. You can also download information associated with your Facebook account through our Download Your Information tool. We store data for as long as it is necessary to provide products and services to you and others, including those described above. Information associated with your account will be kept until your account is deleted, unless we no longer need the data to provide products and services. You can delete your account any time. When you delete your account, we delete things you have posted, such as your photos and status updates. If you do not want to delete your account, but want to temporarily stop using Facebook, you may deactivate your account instead. To learn more about deactivating or deleting your account, click here. Keep in mind that information that others have shared about you is not part of your account and will not be deleted when you delete your account. Return to top
How do we respond to legal requests or prevent harm?
We may access, preserve and share your information in response to a legal request (like a search warrant, court order or subpoena) if we have a good faith belief that the law requires us to do so. This may include responding to legal requests from jurisdictions outside of the United States where we have a good faith belief that the response is required by law in that jurisdiction, affects users in that jurisdiction, and is consistent with internationally recognized standards. We may also access, preserve and share information when we have a good faith belief it is necessary to: detect, prevent and address fraud and other illegal activity; to protect ourselves, you and others, including as part of investigations; or to prevent death or imminent bodily harm. For example, we may provide information to third-party partners about the reliability of your account to prevent fraud and abuse on and off of our Services. Information we receive about you, including financial transaction data related to purchases made with Facebook, may be accessed, processed and retained for an extended period of time when it is the subject of a legal request or obligation, governmental investigation, or investigations concerning possible violations of our terms or policies, or otherwise to prevent harm. We also may retain information from accounts disabled for violations of our terms for at least a year to prevent repeat abuse or other violations of our terms. Return to top
How our global services operate
Facebook, Inc. complies with the US-EU and US-Swiss Safe Harbor framework for the collection, use and retention of information from the European Union and Switzerland, as set out by the Department of Commerce. To view our certification, visit the Safe Harbor website. As part of our participation in the Safe Harbor program, we will resolve disputes you have with us in connection with our policies and practices through TRUSTe. You can contact TRUSTe through their website . Facebook may share information internally within our family of companies or with third parties for purposes described in this policy. Information collected within the European Economic Area (“EEA”) may, for example, be transferred to countries outside of the EEA for the purposes as described in this policy. Return to top
How will we notify you of changes to this policy?
We’ll notify you before we make changes to this policy and give you the opportunity to review and comment on the revised policy before continuing to use our Services. Return to top
How to contact Facebook with questions
Cookies, Pixels & Similar Technologies
Technologies like cookies, pixel tags (“pixels”), device or other identifiers and local storage (collectively, “Cookies and similar technologies”) are used to deliver, secure, and understand products, services, and ads, on and off the Facebook Services. We offer a range of products and features that involve the use of these technologies to reach you based on your activity on and off our Services. You can learn more about our advertising products and the controls you have by visiting our “Advertising on Facebook” page. As described in more detail below, we also use these technologies in other ways, like for security purposes, to deliver and enable products and services, as well as to understand and measure products, services and advertisements. Third parties that you interact with as you use the Facebook Services may also use these technologies for a variety of purposes.
Check back here from time to time to get the latest information about these technologies and how they are used.
Your browser or device may offer settings related to these technologies. For more information about whether these settings are available, what they do, and how they work, visit your browser or device’s help material. We may not recognize or respond to browser or device signals around tracking, and some settings may interfere with your use of features we offer. Additionally, the settings offered by a browser or device often only apply to that particular browser or device.
What are some of these technologies?
|Categories of use||Examples|
|Authentication||These technologies tell us when you’re logged in, so we can show you the appropriate experience and features. For example, Cookies and similar technologies tell us when you are logged in to Facebook so we can show you relevant and social information when you visit other websites that use our social plugins. We also use this information to understand how you use our Platform and other apps and services.|
|Localization||These help us provide localized experiences. For example, we may store information in a cookie that is placed on your browser or device so you will see the site in your preferred language.|
You can also take a look at the cookies section of our publicly available audit, carried out by the Office of the Data Protection Commissioner in Ireland, which explains more about the cookies we use.
We may place or use these technologies when you interact with our Services, our related companies, or with an advertiser or partner (whether or not you are logged in to the particular Service) using a browser or device that permits the placement or use of the relevant technology. For example, when you visit our site or use our app, we may place or read cookies or receive information from your devices. We may also place cookies through a pixel on an advertiser’s or partner’s site.
When might we read the cookies on your computer or device?
Web browsers send any cookies for a particular web domain (ex: facebook.com) to the website each time a machine with those cookies accesses content served from that domain. This means that any facebook.com cookies will be sent to Facebook when any page is accessed at facebook.com by that machine. It also means that these cookies are sent to Facebook when someone accesses a third-party website or application that integrates or uses our Services, like one of our plugins. Sometimes we work with websites, apps and their partners so that we can place or read Facebook cookies on your browsers or devices when you visit third-party services. This allows us to do things like read and reference cookies from more than one device or browser that you use, on and off of our Services, so we can provide you Facebook Services across all of your devices and improve and understand the products, ads and services we offer to you and others across the Internet.
Atlas General information: http://atlassolutions.com/home Choices: http://atlassolutions.com/privacy-policy/about-our-ads/
Weborama General information: http://weborama.com/ Choices: http://weborama.com/2/page-en-confidentialite.html
The owner of this website and reliable Content Provider by Law is
Dynamix IT GmbH, Schulweg 6, 23860 Klein Wesenberg, Germany
CEO (Geschäftsführer): Benjamin Wagemann
German Trade Register ID (HRG): HRB15511HL
Tax ID (Steuernummer): 30/290/07014
VAT ID (USt-Nr.): DE304635783
All pictures, graphics and texts used on this website are the property of the operating company and/or its owner. All product and trade names as well as logos used on this website are the property of the respective right holders. We respect all rights of the trademark owners and are not intending to use the trademarks as an own.
Disclaimer: For all means of cross-references (links) and related Web content we assume no responsibility, as far as it is not our own content. The linked sites were checked for illegal content at the time of such links were not recognizable. The owner of the linked websites is responsible for the content of linked pages. We have no general monitoring and review requirements. Upon notification of an infringement, the corresponding link will be removed immediately. No content may be published without the written approval of DYNAMIX IT GmbH.
iKokoon GDPR Compliance
iKokoon is a product of the Dynamix Group and has been developed by Dynamix IT Services SRL.
iKokoon takes personal data protection seriously respecting the General Data Protection Regulation (GDPR).
This document servers also the purpose for all websites owned by Dynamix Group to cover the legal requirements of the GDPR. Therefore, iKokoon refers where applicable also to Dynamix Group legal entity or its websites.
Our mission is to provide iKokoon clients and the iKokoon community with a reliable software which allows fulfilling all duties of Data Processors efficiently.
- As Data Processor, can I be compliant with the GDPR using iKokoon?
- Is the iKokoon cloud product service compliant with the GDPR?
- Has iKokoon all GDPR needed security processes in place?
iKokoon is a product of the Dynamix Group.
“Data Protection Law” means any laws applicable to you or Microsoft, relating to data security, data protection and/or privacy, including Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to processing of Personal Data and the free movement of that data (“GDPR”).
“Personal Data” means any information relating to an identified or identifiable natural person. An identifiable natural person is one who can be identified directly or indirectly by referencing an identifier such as a name, an identification number, location data, an online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person.
Data Controller – the entity determining purposes, conditions, and meaning of processing personal data. In this document, it is your organization.
Data Processor – the entity that processes data on behalf of the Data Controller.
In this document:
- iKokoon cloud version: iKokoon is, in terms of the GDPR, the Data Processor. The data is processed based on rules setup by you in your iKokoon tenant of the cloud application.
- iKokoon on premise: iKokoon is not a Data Processor, but will help you to setup and organize your data properly.
iKokoon is an application which may or may not be used to process data by the Data Controller.
Each party will comply with Data Protection Law (as defined below). Without limiting the foregoing, each party will:
- not use or share Personal Data received from the other party for a purpose for which it has not obtained consent;
- establish independent procedures for managing and responding to any communication from a customer seeking to exercise its rights under Data Protection Laws;
- provide reasonable assistance to the other in responding to any requests, investigation, consultation, or claims from a customer, regulator, or supervisory authority concerning Data Protection Law;
- take appropriate security measures that are required by Data Protection Law, and in accordance with good industry practice relating to data security; and
- refrain from transmitting unsolicited commercial communications in any manner that would violate applicable laws.
Dynamix IT Services SRL as the developing company of iKokoon is assisting Data Controllers fulfilling their GDPR obligations.
As cloud client you are informed hereby, about iKokoon as Data Processor.
iKokoon is fully compliant with GDPR requirements.
3. iKokoon – Data Controllers
iKokoon brings following features to increase data security and specific demand of GDPR to Data Controllers.
- Extended Password Policy Obligation
- use minimum length, usage of big letters, numbers and special characters in the password
- time limit for password validity and password repetition control
- auto sign-off user after a period
- re-enter your password once manipulating with user roles and privileges
- GDPR specific features
- Right to be Forgotten: Deleting resource data is a traditional feature but it may disturb data consistency, reports etc. There is a possibility to have resource data linked to modules and their instances and teams. Also, it would corrupt data about your resource profiling. Resource anonymization would allow deleting data from resources, users or contact data which allows identifying the individual, but anonymous data about services, tasks and other linked to the anonymized data will stay.
- Right to Access: A specific button which would export resource data details in automated readable format (XML) would fulfill your obligation to provide individual information regarding collected data.
- Limited data visibility – it is a critical requirement of GDPR asking Data Controllers to limit access to personal data only to those people they need to have access. iKokoon brings couple approaches to this problem:
- A limitation to access resource data in general.
- A limitation to access resource data only for by specific roles. Typically, everyone can access company data (companies are not subject to GDPR) and limit access to resource data only to users having a specific role. Users or Team Members without the resource permissions may see the linked resource name without seeing data of personal identification.
- Custom field visibility – certain data can be restricted to be seen only by
- User / list of users
- User group / list of user groups
- User type / list of user types
- Custom field visibility – certain data can be restricted to be seen only by
- User Action Audits
- iKokoon provides logs about user actions including view actions.
- iKokoon logs can usually only be viewed by the user himself or the team the user is part of (historical views)
- iKokoon helps you to manage logs.
- User Action Audits
Data Controller – GDPR Compliance with iKokoon
- Identify all Personal Data you collect in iKokoon.
- Setup internal regulations on how to use data in iKokoon. The recommended approach is to store personal identifying data only in resources.
- If you like to use anonymization you shall have a regulation that all personal data is stored only in resource data.
- Identify what data are subject for deletion due to anonymization.
- Decide what resource data iKokoon users need to access. The access can be limited via permissions and roles.
- Identify what data outside of resource data needs to be protected and set data visibility and accessibility accordingly.
- Increase password policy enforcement of iKokoon.
- We recommend defining a template which would formalize all steps to delete personal data from iKokoon with all details. Once a request comes you can simply document that all steps were done according to your internal process.
- Setup a rule of keeping user audit data (logs) and configure accordingly in iKokoon.
4. iKokoon (SaaS)
Dynamix Group provides iKokoon as cloud based software-as-a-service. Here iKokoon acts as Data Processor. As such iKokoon fulfills GDPR requirements as follows:
- iKokoon Software implemented technical and process measures to limit potential access to data only on exceptions and requested occasions.
- If you are an EU organization, it is guaranteed that your iKokoon database tenant instance (and so data and their backups at disaster recovery sites) are stored within the EU.
- iKokoon uses only verified Data Centers with high-end security and all relevant ISO certifications. Details can be provided upon request.
- Regular backups, https for browsers, SSH-2 encryption is used for the backup transfer. Firewall limited to HTTPS and other regular settings are meeting GDPR requirements. If you need more information please require these from our technical support team.
- Security can be further increased with iKokoon private cloud service, i.e. individual security can be extended by a specific configuration of the dedicated server.
- Dynamix IT GmbH is a German company but the GDPR regulation was implemented in all aspects of an organization and for all products and services.
5. iKokoon – Personal Data
iKokoon is a business-to-business application, i.e. all collected data supports iKokoon services for businesses and organizations.
As per GDPR regulation, there is data of individuals collected under the protection of the GDPR.
5.1. Personal data collected
- all data within the resource section
- jobs, skills and related information
- history of visiting iKokoon
- history on tasks, achievements, timesheet (i.a. working time, costs, holiday, absence) and travel. All details can be provided on request.
- IP address
5.2. Purpose of data collection, processing, and profiling
iKokoon collects data for following scopes and purposes:
- setup a commercial co-operation with organizations.
- provide service for existing customers and organizations.
- inform customers and potential customers about new features functions, releases and other messages of both informational and marketing character.
- all information collected about individuals are gathered through contact forms.
- iKokoon does not possess or use data about individuals from external sources.
Data combination and profiling:
- iKokoon does not profile any individuals, all data collected serves as contact information.
- iKokoon profiles organizations for marketing and business purposes. Not subject to these analyses.
- iKokoon combines all data in the own information system (iKokoon). Other systems use only data fragments and hence are not considered as data under GDPR.
See further details on the Data Protection and Privacy section of this website.