Deutsch | English

Privacy Policy

1. Preamble / Publication Notice

1.1 Purpose and Scope (Website PHP without CMS)

This privacy policy provides transparent information about the nature, scope, purposes, legal bases, and recipients of personal data processing in connection with:

  • the impressum.gobbltech.com website (PHP-based without CMS) and
  • related services and communications.

It specifically describes:

  • which data is processed locally on the server and which data might be processed by third parties,
  • which legal bases apply in each case (including consent),
  • which third parties/recipients are involved (e.g., ProtonMail, hosting providers),
  • retention periods, deletion concepts, and data subject rights,
  • as well as the technical and organizational measures (TOMs) for data protection.

This declaration is directed at users and visitors of the website and applies regardless of how the website is accessed or which functions are used.

1.2 Notice: This version will be published on the website

  • This privacy policy will be published identically on the website (separate page).
  • Changes/versioning will be made transparently visible in both publications (see chapter "Changes & Updates").
  • As individual services are activated in the future, the corresponding sections will be supplemented and – where necessary – new consent will be obtained.

1.3 Validity for Website without Tracking

  • Website: This privacy policy applies to the published website impressum.gobbltech.com.
  • Privacy-focused approach: The website deliberately refrains from tracking/analytics and marketing cookies. Only technically necessary data is processed (e.g., server log files, contact form emails) – details in the website chapters.
  • No tracking: We consciously avoid analytics tools, social media plugins, and marketing technologies that would require extensive data processing.

2. Data Controller, Contact & Imprint

2.1 Data Controller (Name, Legal Form, Addresses incl. c/o Delivery Address)

Data Controller within the meaning of Art. 4 No. 7 GDPR

Danilo Endesfelder – Sole Proprietorship

Delivery/Service Address (c/o): c/o Nico Eberhardt, Pfotenhauerstraße 65, 01307 Dresden, Germany

Note on address protection: The specified address is a delivery address (c/o). The private address of the operator is not published for privacy protection reasons.

VAT ID: TBD (to be added)

Responsible for content (§ 18 Abs. 2 MStV): Danilo Endesfelder, c/o Nico Eberhardt, Pfotenhauerstraße 65, 01307 Dresden, Germany

2.2 Communication Channels (Email general, Phone, Contact Form)

gobbltech@proton.me

We use ProtonMail service from Proton AG, Route de la Galaise 32, 1228 Plan-les-Ouates, Switzerland for email communication. Data processing is based on Art. 6 Para. 1 lit. f GDPR. Proton AG processes data in a country with recognized adequate data protection level according to Art. 45 GDPR. Further information can be found at: https://proton.me/legal/privacy

via the website https://impressum.gobbltech.com/contact.php

Legal notice: A telephone number is not mandatory (ECJ, C-298/07; BGH, PM 41/2025). For the legally required quick and direct contact, we provide email and a contact form.

2.3 Data Protection Contact

For all data protection concerns (e.g., access, rectification, deletion, withdrawal, objection) you can reach us at:

gobbltech@proton.me

All data protection requests are processed via the main email address.

2.4 Official Imprint (binding URL)

Binding exclusively: https://impressum.gobbltech.com/

2.5 Competent Data Protection Supervisory Authority (Address, Tel., Fax, Email, Web)

Saxon Data Protection and Transparency Commissioner

Maternistraße 17, 01067 Dresden, Germany

+49 351 85471-101

+49 351 85471-109

post@sdtb.sachsen.de

www.datenschutz.sachsen.de

2.6 Data Protection Officer (Status: not appointed)

Currently, no data protection officer is appointed as there is no legal obligation.

Should the obligation arise, the information will be supplemented here immediately.

3. Definitions (GDPR Definitions)

3.1 Personal Data

Personal data means any information relating to an identified or identifiable natural person (hereinafter "data subject"). An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.

3.2 Data Subject

Data subject is any identified or identifiable natural person whose personal data is processed by the controller responsible for the processing.

3.3 Processing

Processing means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

3.4 Restriction of Processing

Restriction of processing is the marking of stored personal data with the aim of limiting their processing in the future.

3.5 Profiling

Profiling means any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyze or predict aspects concerning that natural person's performance at work, economic situation, health, personal preferences, interests, reliability, behavior, location or movements.

3.6 Pseudonymization

Pseudonymization means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.

3.7 Controller

Controller means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.

3.8 Processor

Processor means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller.

3.9 Recipient

Recipient means a natural or legal person, public authority, agency or another body, to which the personal data are disclosed, whether a third party or not. However, public authorities which may receive personal data in the framework of a particular inquiry in accordance with Union or Member State law shall not be regarded as recipients.

3.10 Third Party

Third party means a natural or legal person, public authority, agency or body other than the data subject, controller, processor and persons who, under the direct authority of the controller or processor, are authorized to process personal data.

3.11 Consent

Consent means any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.

4. Principles of Data Processing

4.1 Lawfulness, Purpose Limitation, Transparency

Lawfulness (Art. 5 Para. 1 lit. a, Art. 6 GDPR)

We process personal data exclusively on a legal basis (in particular contract/contract performance, consent, legitimate interests, legal obligations). For consent, we inform in advance, document consent verifiably (timestamp/scope) and enable withdrawal at any time with future effect.

Purpose Limitation (Art. 5 Para. 1 lit. b)

Data is only processed for clearly defined, legitimate purposes (e.g., website provision, contact form processing, support communication). We examine purpose changes according to Art. 6 Para. 4 GDPR (compatibility test).

Transparency (Art. 5 Para. 1 lit. a, Art. 12–14)

We inform clearly and understandably about purposes, legal bases, retention periods, recipients, third country transfers, rights of data subjects as well as about the voluntary/mandatory nature of providing data. Changes to this declaration are versioned and published on the website.

4.2 Data Minimization & Storage Limitation

Data Minimization (Art. 5 Para. 1 lit. c)

We only collect data that is necessary for the respective function. The website deliberately refrains from tracking/analytics and marketing cookies. Only technically necessary data is processed.

Storage Limitation (Art. 5 Para. 1 lit. e)

We store data only as long as necessary for the purposes or as long as legal obligations exist. Specific deadlines and deletion concepts are described in Chapter 10.

Accuracy Principle (Art. 5 Para. 1 lit. d)

We take appropriate measures to ensure that stored data is factually correct and up-to-date. Corrections are made upon request.

4.3 Integrity & Confidentiality (Security)

Protection Goals (Art. 5 Para. 1 lit. f, Art. 32)

We ensure confidentiality, integrity, availability and resilience of systems.

Technical and Organizational Measures (TOMs)

Encryption in transit (TLS), server-side security, access controls (Least Privilege), logging/audit, server hardening/firewalls, backup/recovery concepts, incident response procedures including notifications according to Art. 33/34 GDPR. Details in Chapter 11.

Confidentiality on the Website

No disclosure of contact data without express consent. Minimal data processing through deliberate avoidance of tracking.

Access by Third Parties

Processors act under instruction based on Art. 28 GDPR and corresponding agreements; sub-processors are included under controlled conditions (see Chapters 8–9).

4.4 Privacy by Design & by Default

By Design (Art. 25 Para. 1)

The website is designed to process as little personal data as possible (no tracking, minimal log files, deliberate avoidance of analytics).

By Default (Art. 25 Para. 2)

Privacy-friendly default settings: No tracking activated, no marketing cookies, no analytics, minimal server logs.

Accountability (Art. 5 Para. 2)

We document processing (register according to Art. 30), control legal bases/consent, check DPIA when necessary (Art. 35) and train processes for data subject rights, deletions and incidents.

5. Website Processing (Operations & Legal Bases)

5.1 Server Logs (Technically Necessary Processing)

When accessing the website, the web server automatically processes certain technical data for the provision and security of the website.

IP address of the requesting device

Date and time of access

Called page/resource

HTTP status code

Browser/client information

Referring page (if any)

  • Technical provision of the website
  • Ensuring IT security
  • Detection and defense against attacks
  • Error analysis for technical problems

Art. 6 Para. 1 lit. f GDPR (legitimate interest in secure and stable website operation)

Automatic deletion after 7 days

These logs serve exclusively technical purposes. No profiling or disclosure to third parties takes place.

5.2 Contact Form (if implemented)

When using the contact form, the data you enter is processed to handle your inquiry.

Email address

Name (if provided)

Message content

Time of message

  • Processing and responding to your inquiry
  • Communication regarding your request

Art. 6 Para. 1 lit. b GDPR (contract performance) or Art. 6 Para. 1 lit. f GDPR (legitimate interest in communication)

Deletion after completion of the inquiry, at the latest after 2 years

Providing data in the contact form is voluntary. Without providing data, we cannot respond to your inquiry.

5.3 Deliberate Avoidance of Tracking

This website deliberately refrains from the following data processing:

  • No analytics tools (Google Analytics, etc.)
  • No marketing cookies
  • No social media plugins with data transmission
  • No tracking pixels or web beacons
  • No profiling or behavioral targeting
  • No remarketing or conversion tracking

This privacy-friendly approach corresponds to the principle of data minimization according to Art. 5 Para. 1 lit. c GDPR.

Only technically necessary session cookies are used (e.g., for language settings), these contain no personal data and are deleted after the session ends.

6. Website Processing

6.1 Server Logfiles (Contents, Purposes, Separate Storage)

The website impressum.gobbltech.com is operated without tracking. When accessing the pages, technically necessary server protocols are generated. These serve exclusively for operation, security and error analysis.

6.1.1 Processed Protocol Data (typical)

  • IP address of the requesting device
  • Date and time of access (timestamp)
  • Retrieved resource/URL, HTTP method (e.g., GET/POST)
  • Status code (e.g., 200, 404, 500), transmitted data volume
  • Referrer URL (the previously visited page, if transmitted by browser)
  • User agent (browser/OS type and version, device type)
  • Error/diagnostic entries in error logs (e.g., stack traces for server errors)
  • Server-side protection signals (e.g., rate limit hits, firewall events, bot/spam indicators)
  • No content analysis: No analysis of the contents of your inputs for marketing/profiling purposes.
  • No merging with other data sources (e.g., app usage data).

6.1.2 Purposes of Processing

  • Operation & functionality of the website, delivery of content
  • Security/defense against attacks, abuse and fraud prevention (e.g., DDoS detection, bot defense, firewall rules)
  • Error analysis & stability, performance monitoring, capacity planning
  • Traceability for technical failures and illegal access

6.1.3 Legal Bases

  • Art. 6 Para. 1 lit. f GDPR (legitimate interest) – secure, stable website operation and defense against attacks
  • Art. 6 Para. 1 lit. c GDPR (legal obligation) – if and to the extent we are legally obliged to provide or maintain data on order (e.g., in the context of investigations)

6.1.4 Retention Period & Deletion

  • Access/access logs: short-term retention for technical operation (usually 7–14 days).
  • Error logs/security events: Storage until incident resolution/clarification; temporary extension may be necessary for security incidents.
  • Then deletion or anonymization (e.g., IP address shortening).

Specific deadlines depend on technical necessity in hosting operations; no long-term retention for marketing purposes.

6.1.5 Recipients & Data Processing

  • Hosting/operating service providers (data center/managed hosting) as processors according to Art. 28 GDPR – processing strictly purpose-bound according to instruction.
  • IT security service providers (if involved) in the context of fault/incident analyses – also commissioned processing.
  • Authorities/law enforcement – only within the legally prescribed framework and with corresponding obligation.

6.1.6 Separation from Other Data / No Profiling

  • Server log files are kept separate from other user-related data (e.g., contact form data, see 6.2).
  • No profiling, no cross-site tracking, no marketing/analysis purposes.

6.1.7 Security of Processing

  • TLS encryption (HTTPS) for transport paths
  • Hardening & firewalling at server/application level, rate limiting, bot/spam protection
  • Access/role principle (need-to-know), administration access logged
  • Regular updates/patches (website, server stack)

In connection with section 6.4 (Cookies & Tracking) we confirm that no analytics/marketing cookies are set and no third-party trackers are loaded.

6.2 Contact Form & Email (Purposes, Contents, Sending)

On the website we provide a contact form. Inputs are not stored in the website database but transmitted as email to us. Sending is done via ProtonMail. Alternatively, you can write to us directly by email.

6.2.1 Functional Description (Website)

  • Contact form: Transmission of form fields to the web server; immediate forwarding as email to our target mailboxes.
  • No ticket system: No separate helpdesk exists; processes are handled as emails.
  • No DB storage: Form contents are not persistently stored on the website (except short-term technical buffer storage/error queues, if necessary).

6.2.2 Processed Data (Contents)

  • Required/voluntary fields (form-dependent): Name (optional), email address, subject, message; optional phone number/attachment, if provided.
  • Metadata: Sending/receiving time, technical headers (message ID, routing), delivery status.
  • Server logs (see 6.1): Time, IP, user agent only in the context of website access (operation/security).

Please no sensitive content: Do not transmit special categories of personal data (Art. 9 GDPR) via the form/email, unless this is necessary and expressly desired (see 6.2.9).

6.2.3 Purposes

  • Processing your inquiry, follow-up questions and communication.
  • Evidence and documentation of case processing, as required.
  • Ensuring deliverability/error analysis (ProtonMail sending logs).

6.2.4 Legal Bases

  • Art. 6 Para. 1 lit. b GDPR (contract/initiation), if the inquiry relates to contractual reference/use.
  • Art. 6 Para. 1 lit. f GDPR (legitimate interest) for general communication, support organization as well as IT security/deliverability (minimal protocols).
  • Art. 6 Para. 1 lit. c GDPR (legal obligation), if retention/evidence is legally required (only to the extent personal).
  • Art. 6 Para. 1 lit. a in conjunction with Art. 9 Para. 2 lit. a GDPR for voluntary transmission of sensitive data (explicit consent required).

6.2.5 Recipients / Processors

  • ProtonMail (Proton AG, Switzerland) – for email sending of the form (adequate data protection level according to Art. 45 GDPR; no planned third country transfer).
  • Mail providers/mail clients – delivery/pickup of emails (transport TLS).
  • No disclosure for advertising/analysis purposes; no other third parties, except when legally obliged (authorities/law enforcement).

6.2.6 Retention Period & Deletion

  • Email mailbox: No automatic deletion; manual deletion after problem resolution.
  • ProtonMail sending logs: According to ProtonMail policies (see privacy policy of Proton AG).
  • Legal/evidence obligations: As applicable (e.g., correspondence with contractual reference), retention according to legal deadlines; otherwise deletion after purpose achievement.

6.2.7 Security

  • Transport encryption: Form → Server → ProtonMail → Target mailbox via TLS/end-to-end encryption.
  • Spam/abuse protection: Validations/CSRF protection (without tracking); no marketing pixels.
  • Access protection: Access only for authorized persons (need-to-know), administration access logged; strong passwords/MFA.

6.2.8 Voluntary Nature & Consequences of Non-Provision

  • Providing your email address and a message is required for processing. Without sufficient information, meaningful feedback may not be possible.
  • Alternatives: Direct sending by email or post (see contacts in section 2.2).

6.2.9 Special Categories (Art. 9 GDPR)

  • Please no sensitive data (e.g., health data) via form/email transmission.
  • If this is exceptionally necessary, processing takes place only with your explicit consent solely for the purpose of handling the request; then deletion, unless mandatory reasons prevent it.

6.2.10 Transparency Notes (References)

  • ProtonMail (data processing in Switzerland; adequate data protection level): Further information at https://proton.me/legal/privacy
  • Email security: Emails are end-to-end encrypted by ProtonMail. Additional PGP/SMIME encryption possible if you send particularly sensitive content.

6.3 Registration on the Website (currently not active)

6.3.1 Status

  • No registration for visitors is provided on the website.
  • No user accounts for website functions (e.g., comments, shop, customer area) are offered.
  • No user-relevant data processing for website logins is implemented.

6.3.2 Current Data Processing

  • Since no registration on the website is possible, no corresponding processing (collection, storage or use of registration data) takes place.
  • No passwords, no user profiles and no social logins are processed on the website.

6.3.3 Outlook (if activated in the future)

Should optional website registration be introduced in the future (e.g., for support portal, customer area, training material), corresponding data protection principles apply – only from activation. Before the start, we will update this privacy policy and – if necessary – obtain consent.

6.4 Cookies & Similar Technologies

Our website does not use statistics or marketing cookies. Only technically necessary cookies/similar technologies are used – especially for session control and possibly language settings.

6.4.1 Usage Overview

  • No tracking/analysis cookies, no marketing/retargeting cookies, no third-party pixels.
  • Technically necessary cookies (e.g., session, CSRF/security tokens, language settings).
  • No consent management required, as no optional tracking categories are active.

6.4.2 Technically Necessary Cookies (Examples)

  • Session/security cookies: for page delivery, session control, CSRF protection.
  • Language setting cookie: stores your chosen language (German/English).
  • Properties: purely functional, no tracking across websites, no profiling.

6.4.3 No Statistics/Marketing Cookies

  • No services like Google Analytics, Facebook Pixel, Hotjar or similar are loaded.
  • External content/fonts are self-hosted to avoid additional tracking cookies.
  • For future introduction of optional services: 1. Update of this privacy policy, 2. Obtaining consent via appropriate consent management.

6.4.4 Legal Bases

  • Technically necessary cookies: Art. 6 Para. 1 lit. f GDPR (legitimate interest in secure, functional operation).
  • Optional categories (currently none active): would be set exclusively on the basis of Art. 6 Para. 1 lit. a GDPR (consent).

6.4.5 Control & Browser Settings

  • Browser settings: You can delete/block cookies at browser level.
  • Consequences: If all cookies are blocked, certain website functions (e.g., language settings) may no longer work.
  • The website remains basically usable even without cookies.

6.4.6 Retention Periods & Deletion

  • Session cookies: Session-based (until browser closure).
  • Language setting cookie: 30 days, then automatic deletion.
  • Early deletion: possible at any time through browser settings.

7. Relevant Legal Bases (Overview)

7.1 Art. 6 Para. 1 lit. a–f GDPR (specifically related to impressum.gobbltech.com)

a) Consent (Art. 6 Para. 1 lit. a GDPR)

Used when a function is legally only permissible with prior opt-in or we voluntarily design it as such:

  • Special categories in contact form (e.g., health data): only voluntarily by the user and exclusively for request processing (Art. 9 Para. 2 lit. a, see 7.4).
  • Possibly future optional services (e.g., newsletter, extended analytics): consent via appropriate consent management before activation.
  • Future optional tracking/marketing cookies: would only be set after explicit opt-in.

b) Contract/Contract Performance (Art. 6 Para. 1 lit. b GDPR)

Required for providing the agreed website functions:

  • Contact form: Processing and answering inquiries with contractual reference.
  • Support communication: Answering/handling contract-related concerns.
  • Website provision: Basic technical functions for content delivery.

c) Legal Obligation (Art. 6 Para. 1 lit. c GDPR)

As applicable:

  • Evidence obligations (e.g., consent evidence Art. 7 Para. 1 GDPR for optional services).
  • Information/cooperation with authorities/courts, when legally prescribed.
  • Commercial/tax law retention, only to the extent personal and actually occurring with us (e.g., correspondence with billing reference).

d) Vital Interests (Art. 6 Para. 1 lit. d GDPR)

Usually not applicable for website operation. If processing should exceptionally be necessary to protect vital interests, we rely on this (currently no corresponding standard process on the website).

e) Public Task (Art. 6 Para. 1 lit. e GDPR)

Not applicable (no sovereign tasks).

f) Legitimate Interest (Art. 6 Para. 1 lit. f GDPR)

Balancing of interests with right to object (see 12.7). Typical cases:

  • Website operation & security: Server log files, firewall/rate limiting, error analysis (6.1).
  • Website stability: minimal protocols/error codes for technical problems, abuse/fraud prevention.
  • Communication: general support communication and organizational processes.
  • IT security: Protection against attacks, spam defense, technical integrity of the website.

7.2 Purpose Changes (Art. 6 Para. 4 GDPR)

Should processing for a purpose other than the originally collected one occur, we check compatibility according to Art. 6 Para. 4 GDPR based on:

  • Connection between original and intended purpose,
  • Collection circumstances (relationship to us, user expectations),
  • Nature of data (including special categories),
  • possible consequences for data subjects,
  • existing guarantees (e.g., pseudonymization, encryption, access restrictions).

Only when requirements are met (or a new legal basis, especially consent, exists), the purpose change occurs. Transparent information and possibly renewed consent are ensured.

7.3 Consent & Withdrawal (Art. 7 GDPR) – plus national ePrivacy rule

Transparency & Proof

Consent is clearly explained, obtained per purpose and logged (time, scope). For optional services, appropriate consent management is used.

Withdrawal

possible at any time with future effect – via website settings (if future optional services are offered), as well as via browser settings (cookies).

Consequences of Withdrawal

Website functionality basically remains intact; the respective affected optional function (e.g., extended analytics, marketing tools) is no longer used.

Additionally (Germany/ePrivacy): § 25 TTDSG

  • For storing/reading information on end devices (e.g., cookies, tracking IDs) – outside technically necessary cases – prior consent is generally required.
  • Our use: only technically necessary cookies (session, language settings), no statistics/marketing cookies (6.4).

7.4 Special Categories of Personal Data (Art. 9 Para. 2 GDPR)

Principle

We do not process special categories (Art. 9 Para. 1 GDPR) except when you voluntarily transmit them in contact forms or emails (e.g., health data for support-relevant inquiries).

Legal Basis

Art. 9 Para. 2 lit. a GDPR (explicit consent), given by your voluntary disclosure; the data is used exclusively for processing your inquiry.

Processing

  • No systematic collection of sensitive data.
  • No transmission of such content to third parties without explicit consent.
  • No processing for medical purposes, no profiling based on sensitive data.
  • Deletion after purpose achievement (processing of inquiry), unless legal retention obligations exist.

Application Process (only if used, see 15)

If applicants voluntarily provide sensitive information, processing also only according to Art. 9 Para. 2 lit. a GDPR; additionally § 26 BDSG (Germany) for employee data.

8. Third Parties/Processors

8.1 ProtonMail (Proton AG) – Email Communication

8.1.1 Role, Contract & Scope

  • Role: ProtonMail processes email communication as its own controller for the email infrastructure. We use ProtonMail for business communication and contact form forwarding.
  • Contractual basis: Usage agreement with Proton AG including their privacy policy and terms of service.
  • Instruction binding: ProtonMail acts as an independent email provider, not as a processor in the classic sense.

8.1.2 Processing Subject & Data Categories

  • Content data: Email contents from contact form submissions (name optional, email address, subject, message).
  • Communication data: Email correspondence between us and website visitors.
  • Metadata: Email headers, timestamps, routing information.
  • Account data: Our business email addresses and account information.

8.1.3 Purposes of Processing

  • Provision of email infrastructure for business communication.
  • Forwarding and storage of contact form inquiries.
  • Enabling secure, encrypted email communication.
  • Operational security and spam/abuse protection at email level.

8.1.4 Legal Bases

  • Art. 6 Para. 1 lit. b GDPR (contract/initiation) for processing contact inquiries.
  • Art. 6 Para. 1 lit. f GDPR (legitimate interest) for secure business communication and IT security.
  • Art. 6 Para. 1 lit. c GDPR (legal obligation) to the extent retention/evidence is legally required.

8.1.5 Location & International Transfers

  • Primary processing location: Switzerland (Proton AG, Geneva).
  • Legal status: Switzerland has an EU adequacy decision according to Art. 45 GDPR.
  • No planned third country transfers outside the adequate data protection level.
  • Server locations: Exclusively in Switzerland (no cloud providers in third countries).

8.1.6 Technical & Organizational Measures (TOMs)

  • End-to-end encryption: All emails are automatically encrypted.
  • Zero-access architecture: ProtonMail cannot view email contents in plain text.
  • Transport encryption: TLS for all connections.
  • Server security: Physical security in Swiss data centers, access control, monitoring.
  • Compliance: SOC 2 Type II, ISO 27001 certifications.

8.1.7 Retention Periods & Deletion

  • Email mailbox: No automatic deletion by ProtonMail; manual management by us.
  • Our deletion practice: Emails are deleted after purpose achievement (processing of inquiry), at latest after 2 years.
  • Legal retention: To the extent commercial/tax law retention obligations exist.
  • ProtonMail logs: Minimal connection logs for security purposes, limited retention.

8.1.8 Data Subject Rights & Transparency

  • Access/deletion/rectification: Requests are processed directly by us.
  • ProtonMail support: For technical questions about email infrastructure.
  • Transparency: Complete information in ProtonMail privacy policy.
  • Complaint right: With ProtonMail data protection officer or Swiss supervisory authority.

8.1.9 Special Notes & Controls

  • High security: End-to-end encryption and zero-access architecture provide additional protection.
  • Voluntary nature: Use of contact form is voluntary; alternative contact methods available.
  • No marketing use: Email addresses are not used for newsletters/marketing.
  • PGP support: Additional encryption for particularly sensitive content possible.

8.1.10 References & Further Information

  • ProtonMail Privacy Policy: https://proton.me/legal/privacy
  • ProtonMail Transparency Report: https://proton.me/legal/transparency
  • Swiss Data Protection Law: https://www.edoeb.admin.ch/

8.2 Hosting Provider (Web Server)

8.2.1 Role & Scope

  • Role: The hosting provider processes technical data as a processor according to Art. 28 GDPR.
  • Scope: Provision of server infrastructure for impressum.gobbltech.com.
  • Contractual basis: Data processing agreement (DPA) with corresponding technical and organizational measures.

8.2.2 Processed Data Categories

  • Server log files: IP addresses, timestamps, accessed URLs, HTTP status codes.
  • Technical metadata: User agent, referrer, transmitted data volume.
  • Security logs: Firewall events, attack detection, rate limiting data.
  • Performance data: Loading times, server utilization (anonymized).

8.2.3 Purposes & Legal Bases

  • Purposes: Website provision, technical operation, security, error analysis.
  • Legal basis: Art. 6 Para. 1 lit. f GDPR (legitimate interest in secure website operation).
  • Balancing of interests: Technical necessity outweighs minimally invasive data processing.

8.2.4 Technical & Organizational Measures

  • Encryption: TLS 1.3 for all connections, encrypted storage.
  • Access control: Role principle, multi-factor authentication, audit logs.
  • Network security: Firewalls, DDoS protection, intrusion detection.
  • Backup & Recovery: Encrypted backups, disaster recovery plans.
  • Compliance: ISO 27001, SOC 2 or comparable certifications.

8.2.5 Retention Periods & Deletion

  • Access logs: 7-14 days for technical operation.
  • Security logs: Until resolution of security incidents.
  • Error logs: Until problem resolution, maximum 30 days.
  • Automatic deletion: After expiration of technical retention periods.

8.2.6 Location & Data Protection Level

  • Server location: European Union (Germany/France/Netherlands).
  • No third country transfer: All data remains in the EU.
  • GDPR compliance: Full compliance with European data protection standards.

8.3 Other Processors (as needed)

8.3.1 Content Delivery Network (CDN) - if used

  • Purpose: Acceleration of website delivery through geographically distributed servers.
  • Data processing: Anonymized performance data, no tracking cookies.
  • Legal basis: Art. 6 Para. 1 lit. f GDPR (legitimate interest in performance).
  • Location: Only EU-based CDN providers with GDPR compliance.

8.3.2 SSL Certificate Provider

  • Purpose: Provision and management of SSL/TLS certificates.
  • Data processing: Domain validation, technical metadata.
  • Legal basis: Art. 6 Para. 1 lit. f GDPR (legitimate interest in security).
  • Typical providers: Let's Encrypt, DigiCert (with corresponding guarantees).

8.3.3 Domain Registrar

  • Purpose: Registration and management of the domain gobbltech.com.
  • Data processing: WHOIS data, technical DNS management.
  • Legal basis: Art. 6 Para. 1 lit. c GDPR (legal obligation for domain registration).
  • Data protection: WHOIS privacy protection activated for personal data.

8.4 Exclusion of Certain Third Parties

  • No tracking services: Google Analytics, Facebook Pixel, etc. are deliberately not used.
  • No marketing tools: No CRM systems, newsletter tools or remarketing providers.
  • No social media plugins: No direct integrations of social networks with data transmission.
  • No advertising networks: No use of advertising banners or affiliate marketing tools.
  • Self-hosting: Fonts, JavaScript libraries and CSS frameworks are self-hosted.

This deliberate renunciation corresponds to our approach of data minimization and privacy-friendly website operation.

8.5 Future Extensions

  • Transparency principle: When introducing new processors, this privacy policy will be updated in advance.
  • GDPR compliance: All future service providers will be checked according to Art. 28 GDPR and contractually bound.
  • Consent when needed: Optional services (e.g., extended analytics) only after prior consent.
  • EU focus: Preference for EU-based providers with high data protection standards.

9. International Data Transfers

9.1 Overview of International Data Flows

Primary Processing

The main processing (website hosting, server logs, contact form) takes place exclusively in the European Union.

Minimal International Transfers

Only email communication via ProtonMail takes place in Switzerland, which has an EU adequacy decision.

No Tracking Transfers

Since we deliberately refrain from tracking, analytics and marketing tools, the typical third country transfers to US tech companies are eliminated.

9.2 ProtonMail (Switzerland) – Adequacy Decision

Adequate Data Protection Level

Switzerland has an EU adequacy decision according to Art. 45 GDPR. Transfers to ProtonMail (Proton AG, Switzerland) are therefore permissible without additional guarantees.

Transferred Data Categories

Email contents from contact form submissions and business correspondence.

Additional Protection

ProtonMail offers end-to-end encryption and zero-access architecture, achieving a data protection level that exceeds GDPR minimum requirements.

Legal Framework

Swiss data protection law (nDSG) provides a protection level comparable to GDPR. ProtonMail is also subject to strict Swiss privacy protection laws.

9.3 EU Hosting – No International Transfers

Server Locations

All website servers are located in the European Union (Germany/France/Netherlands).

Data Residency

Website data (server logs, technical data, temporary files) remains completely in the EU.

No Third Country Transfers

For website operation, no transfers to countries outside the EU/EEA occur.

EU Compliance

All hosting service providers are fully GDPR compliant and subject to European data protection law.

9.4 Guarantees for Future Services

Assessment Framework

Should services with international data transfers be introduced in the future, an adequacy assessment and transfer impact assessment will be conducted in advance.

Protection Mechanisms

  • EU adequacy decisions (Art. 45 GDPR) for countries with comparable data protection level
  • EU Standard Contractual Clauses (SCC) according to Art. 46 lit. c GDPR
  • EU-US Data Privacy Framework (DPF) for certified US providers
  • Additional technical/organizational measures (TOMs) as safeguards

Technical Safeguards

  • End-to-end encryption during data transmission
  • Encryption of data at rest
  • Pseudonymization and data minimization
  • EU proxy architectures for IP shielding
  • Strong authentication and access control

9.5 Exclusion of Problematic Transfers

No US Tech Giants

Deliberate renunciation of Google Analytics, Facebook Pixel, Amazon Web Services and similar services that regularly lead to problematic third country transfers.

No Tracking Networks

No integration of advertising networks, social media plugins or marketing tools with international data flows.

Self-Hosting Approach

Fonts, JavaScript libraries and CSS frameworks are self-hosted to avoid external dependencies and unwanted data transfers.

Privacy by Design

Architectural decisions follow the principle of data minimization and consider international data protection risks from the beginning.

9.6 Data Subject Rights for International Transfers

Information Rights

You have the right to be informed about all international transfers of your data (Art. 13, 14 GDPR).

Right to Object

For transfers based on legitimate interests, you can object to the processing (Art. 21 GDPR).

Withdrawal of Consent

Should future optional services with third country transfer based on consent be offered, you can withdraw this at any time.

Right to Complain

For concerns about international data transfers, you can contact the competent data protection supervisory authority (see section 2.5).

9.7 Monitoring and Updates

Legal Development

We actively monitor changes in international data protection law and adapt our practice accordingly.

Adequacy Decisions

Changes in EU adequacy decisions (e.g., for Switzerland, UK) are considered and documented.

Documentation

This privacy policy is updated promptly when international data flows change.

Transparency Commitment

Significant changes in international transfers are proactively communicated.

10. Retention Periods, Deletion & Storage

10.1 Server Log Files

Access Logs

IP addresses, timestamps, accessed URLs, HTTP status codes, user agent, referrer

Retention period: 7-14 days for technical operation

Purpose: Website functionality, performance monitoring

Automatic deletion after expiration of retention period

Error Logs

Server errors, application errors, debugging information

Retention period: Until problem resolution, maximum 30 days

Purpose: Error analysis, stability improvement

Manual deletion after problem resolution or automatically after 30 days

Security Logs

Firewall events, attack detection, rate limiting data, bot detection

Retention period: Until resolution/clarification of security incident

Purpose: IT security, attack defense, incident response

Deletion after incident clarification, max. 90 days for longer investigations

10.2 Contact Form & Email Communication

Contact Form Data

Name (optional), email address, subject, message content

Retention period: Processing of inquiry + 2 years

Purpose: Request processing, traceability

Manual deletion after purpose achievement, at latest after 2 years

Email Correspondence (ProtonMail)

Business email communication, support inquiries

Retention period: No automatic deletion in ProtonMail

Purpose: Business communication, support, documentation

Manual management: Deletion after problem resolution or inactivity

Legal Retention Obligations

Business correspondence with contractual reference or tax relevance

Retention period: According to commercial/tax law provisions (6-10 years)

Purpose: Compliance, evidence and documentation obligations

Automatic deletion after expiration of legal deadlines

10.3 Cookies & Session Data

Session Cookies (technically necessary)

Session ID, CSRF tokens, temporary security data

Retention period: Until browser closure (session-based)

Purpose: Security, session control, CSRF protection

Automatic deletion when browser closes

Language Setting Cookie

Selected language (German/English)

Retention period: 30 days

Purpose: User friendliness, language persistence

Automatic deletion after 30 days or manually via browser settings

No Tracking Cookies

We deliberately do not use analytics, marketing or tracking cookies

Retention period: Not applicable

Purpose: Privacy-friendly website operation

Not required

10.4 Website Cache & Temporary Files

Server-side Cache

Cached website content, CSS, JavaScript, images

Retention period: After update/deployment or maximum 7 days

Purpose: Performance optimization, faster loading times

Automatic update when content changes

Temporary Processing Files

Upload buffers, processing queues, temporary configuration files

Retention period: Few minutes to hours

Purpose: Technical processing, error handling

Automatic cleanup after processing end

10.5 Backup & Recovery Data

Website Backups

Complete website snapshots (code, configuration, content)

Retention period: 30 days (daily), 12 months (weekly)

Purpose: Disaster recovery, data protection in case of system failure

Rotation-based deletion according to backup scheme

Database Backups (if present)

Structural database snapshots (no user data on this website)

Retention period: 7 days (point-in-time recovery)

Purpose: Data loss prevention, fast recovery

Overwriting in rotation cycle after 7 days

Backup Security

All backups are encrypted and access-restricted

Retention period: According to respective backup category

Purpose: Protection against unauthorized access to backup data

Secure deletion with overwriting of encryption keys

10.6 Automated Deletion Processes

Log Rotation

Automatic deletion of old log files after defined periods

Daily at 2:00 AM (server time)

  • Access logs: 14 days
  • Error logs: 30 days
  • Security logs: 90 days (for active incidents)

Cache Cleanup

Automatic deletion of outdated cache files

Every 6 hours

  • Page cache: 7 days
  • Asset cache: After deployment
  • Temporary files: 24 hours

Session Cleanup

Automatic deletion of expired session data

Every 2 hours

  • Active sessions: 24 hours without activity
  • Expired sessions: Immediate deletion
  • Orphaned session files: 48 hours

10.7 Manual Deletion Procedures

Data Subject Requests (Art. 17 GDPR)

Manual processing of deletion requests

Processing within 30 days after request

  • Email correspondence from ProtonMail mailbox
  • Contact form-related data
  • All data linked to the person

Written confirmation of performed deletion

Regular Retention Review

Quarterly review of stored data

Every 3 months

  • Identification of no longer needed data
  • Review of retention periods
  • Proactive deletion of outdated data
  • Documentation of deletion activities

Emergency Deletions

Immediate deletion for security incidents or legal requirements

Within 24 hours

Complete documentation with timestamp and justification

10.8 Legal Bases for Retention Periods

GDPR Principles

  • Art. 5 Para. 1 lit. c GDPR (data minimization)
  • Art. 5 Para. 1 lit. e GDPR (storage limitation)
  • Art. 17 GDPR (right to erasure)
  • Art. 32 GDPR (security of processing)

Technical Necessity

Art. 6 Para. 1 lit. f GDPR (legitimate interest)

Secure website operation, error analysis, IT security

Legal Retention Obligations

Art. 6 Para. 1 lit. c GDPR (legal obligation)

  • Commercial law retention (HGB): 6-10 years
  • Tax law retention (AO): 10 years
  • Documentation obligations for consent: Duration of processing + 3 years

11. Security (Technical & Organizational Measures – TOMs)

11.1 Organizational Measures

Access and Role Controls

  • Clear roles and responsibilities: Least privilege principle for all system access
  • Administrator access: Only for few authorized persons according to need-to-know principle
  • Regular rights review: Quarterly review and recertification of permissions
  • Immediate rights withdrawal: Upon role change or departure of persons

Data Processing and Minimization

  • Data minimization: Collection and storage of only necessary data
  • No sensitive data: Deliberate renunciation of collecting special categories
  • Separation of data types: Server logs separate from contact data
  • Classification: Clear categorization by sensitivity and protection requirement

Data Processing and Suppliers

  • Data processing agreements (DPA): With all external service providers according to Art. 28 GDPR
  • Careful vendor selection: Preference for EU-based providers with high data protection standards
  • Sub-processor control: Approval and monitoring of subcontractors
  • Regular compliance review: Verification of contract compliance

Policies and Training

  • Security policies: Documented procedures for data protection and IT security
  • Regular training: Awareness of phishing, password security, data protection
  • Change management: Code reviews and controlled deployment processes
  • Incident management: Documented procedures for security incidents and breach notifications

11.2 Transport Security (Transmission Protection)

TLS Encryption

  • HTTPS throughout: All connections to the website exclusively via TLS 1.3
  • HSTS (HTTP Strict Transport Security): Enforced HTTPS usage via browser policy
  • Secure cipher suites: Only modern, strong encryption algorithms
  • Perfect Forward Secrecy (PFS): Protection even if long-term keys are compromised

Certificate Management

  • Valid SSL certificates: Automatic renewal via Let's Encrypt or commercial CA
  • Certificate Transparency: Monitoring of issued certificates via CT logs
  • OCSP Stapling: Efficient certificate status checking
  • Secure configuration: Only supported TLS versions and methods

Network Security

  • Firewall protection: Web Application Firewall (WAF) against common attacks
  • Rate limiting: Protection against DDoS and brute force attacks
  • IP filtering: Geographic and known threat IP blocking
  • Intrusion detection: Automatic detection of anomalous network activities

11.3 Storage Security (At-Rest Protection)

Server-side Encryption

  • Disk encryption: AES-256 encryption for all storage media
  • Database encryption: Encryption of data at rest at DB level
  • Secure key management: Separate storage and rotation of encryption keys
  • Temporary files: Encryption also for cache and temporary processing files

Backup Security

  • Encrypted backups: End-to-end encryption of all backup data
  • Geographic redundancy: Backups at least at two physically separate locations
  • Secure transmission: Encrypted connections for backup transfer
  • Access control: Strictly limited and logged backup access

Password and Authentication Security

  • Strong hashing procedures: bcrypt or Argon2 for all stored passwords
  • Salt procedures: Individual salts for each password hash
  • No plaintext storage: Never passwords stored in plaintext
  • Secure session management: Cryptographically strong session tokens

11.4 Access Control and Authentication

Administrative Access

  • Multi-factor authentication (MFA): Mandatory for all admin accounts
  • Strong password policies: At least 12 characters, complexity requirements
  • IP restrictions: Admin access only from authorized IP ranges
  • Session timeouts: Automatic logout on inactivity

User Authentication

  • Secure session cookies: HttpOnly, Secure, SameSite attributes
  • CSRF protection: Token-based protection against Cross-Site Request Forgery
  • Brute force protection: Account lockout after multiple failed attempts
  • Login logging: Monitoring of suspicious login attempts

Rights Management

  • Principle of Least Privilege: Minimal required rights for each access
  • Role-based access control: Clearly defined roles and permissions
  • Regular access reviews: Quarterly review of all permissions
  • Immediate deactivation: Upon suspicion of compromise or role change

11.5 Monitoring and Operational Security

System Monitoring

  • 24/7 monitoring: Continuous monitoring of all critical systems
  • Performance monitoring: Monitoring of loading times and system utilization
  • Availability checks: Automatic detection of failures and disruptions
  • Capacity planning: Proactive planning for load peaks and growth

Security Monitoring

  • Intrusion Detection System (IDS): Automatic detection of attack attempts
  • Log analysis: Continuous evaluation of security logs
  • Anomaly detection: Automatic identification of unusual activities
  • Threat intelligence: Integration of current threat information

Maintenance and Updates

  • Regular security updates: Timely installation of critical patches
  • Vulnerability management: Systematic assessment and remediation of vulnerabilities
  • Change management: Controlled and documented system changes
  • Rollback procedures: Fast recovery for faulty updates

11.6 Incident Response and Notification Procedures

Detection and Assessment

  • Continuous monitoring: 24/7 monitoring of security-relevant events
  • Automatic alerting: Immediate notification for critical events
  • Incident classification: Assessment by severity and impact
  • Escalation procedures: Clear responsibilities and communication paths

Containment and Analysis

  • Immediate isolation: Separation of affected systems from network
  • Evidence preservation: Forensic securing of relevant logs and system states
  • Root cause analysis: Systematic cause investigation
  • Damage assessment: Estimation of impact on personal data

Notification Procedures (Art. 33/34 GDPR)

  • Supervisory authority (Art. 33): Notification within 72 hours of knowledge
  • Data subjects (Art. 34): Immediate information for high risk
  • Documentation: Complete recording in data protection breach register
  • Follow-up: Continuous updates on measures and progress

Recovery and Improvement

  • System recovery: Controlled recommissioning after cleanup
  • Lessons learned: Analysis and documentation of gained insights
  • TOM adaptation: Improvement of security measures based on incidents
  • Training adaptation: Update of trainings and processes

11.7 Compliance and Certifications

Legal Compliance

  • GDPR conformity: Full compliance with all GDPR requirements
  • BDSG compliance: Observance of national data protection provisions
  • TTDSG conformity: Compliance with the Telecommunications-Telemedia Data Protection Act
  • TMG compliance: Observance of telemedia law provisions

Technical Standards

  • ISO 27001: Orientation to international IT security standard
  • BSI IT-Grundschutz: Observance of German IT security recommendations
  • OWASP Top 10: Protection against the most common web application risks
  • Common Criteria: Consideration of security criteria in system design

Regular Assessments

  • Annual security audit: Comprehensive review of all security measures
  • Vulnerability assessments: Quarterly vulnerability scans
  • Penetration testing: Annual external security tests
  • Data protection impact assessment: For significant system changes

12. Data Subject Rights

12.1 Right to Confirmation (Art. 15 Para. 1 GDPR)

You have the right to request confirmation whether we process personal data concerning you ("whether processing").

Request by email or contact form with indication of your identity

We confirm whether and which categories of data we process about you

Includes all data: Server logs, contact form data, email correspondence

12.2 Right of Access (Art. 15 GDPR)

You have the right to comprehensive information about the processing of your personal data.

Processing purposes and legal bases

Categories of processed personal data

Recipients or categories of recipients (including third countries)

Retention period or criteria for its determination

Source of data, if not collected from you

Existence of automated decisions including profiling

Your data subject rights and complaint possibilities

You receive the first copy free of charge

Additional copies may be subject to a fee

Provision in structured, common format (e.g., PDF, CSV)

12.3 Right to Rectification (Art. 16 GDPR)

You have the right to have inaccurate personal data rectified without delay. Incomplete data must be completed.

Contact Data

Communication of correct data by email or contact form

Rectification immediately after verification

Email Correspondence

Correction or completion of existing email communication

Original emails may be kept for traceability

12.4 Right to Erasure ("Right to be Forgotten", Art. 17 GDPR)

You have the right to request the erasure of your personal data.

The purpose of data processing has ceased

You have withdrawn consent and there is no other legal basis

The data was processed unlawfully

Erasure is necessary to fulfill a legal obligation

You have successfully objected

Email Data

Deletion from ProtonMail mailbox and all local storage

Immediately after confirmation of authorization

Contact Form Data

Deletion of all stored form inputs and metadata

Backups are overwritten in the next rotation cycle

Server Logs

Deletion of IP address-related entries where technically possible

Alternative: Anonymization through IP shortening

Legal retention obligations (e.g., HGB, AO)

Assertion or defense of legal claims

Fulfillment of tasks in the public interest

12.5 Right to Restriction of Processing (Art. 18 GDPR)

You can request restriction of processing instead of complete deletion.

The accuracy of data is disputed (for the duration of verification)

Processing is unlawful, but you refuse deletion

We no longer need the data, but you do for legal claims

Objection has been lodged (for the duration of balancing)

Restricted data is marked accordingly

Processing only for permitted purposes (storage, legal claims)

Information before lifting the restriction

12.6 Right to Data Portability (Art. 20 GDPR)

You have the right to receive your data in a structured, commonly used and machine-readable format.

Only data that you have provided to us

Only for processing based on consent or contract performance

Only for automated processing

Available Formats

  • CSV for structured data
  • PDF for email correspondence
  • JSON for machine-readable formats

Direct Transmission

Where technically feasible and proportionate

Considering the rights of third parties

12.7 Right to Object (Art. 21 GDPR)

You can object at any time for reasons arising from your particular situation against processing based on legitimate interests.

Objection against processing according to Art. 6 Para. 1 lit. e or f GDPR

Reasons must arise from your particular situation

For direct marketing, objection is possible without justification

Server Logs

Processing based on legitimate interests (IT security)

Balancing between your rights and our security interest

Possible anonymization instead of complete cessation

No Direct Marketing

This website does not engage in direct marketing or marketing emails

Therefore this aspect of the right to object is not applicable

12.8 Right to Withdraw Consent (Art. 7 Para. 3 GDPR)

You can withdraw given consent at any time with future effect.

This website currently does not use consent-based processing

Should future optional services be offered, corresponding withdrawal option will be provided

Withdrawal via the same channels as original consent

Confirmation of withdrawal by email

No impact on lawfulness of processing before withdrawal

12.9 Right to Lodge a Complaint with a Supervisory Authority (Art. 77 GDPR)

You have the right to lodge a complaint with a data protection supervisory authority.

Saxon Data Protection and Transparency Commissioner

Maternistraße 17, 01067 Dresden, Germany

Phone: +49 351 85471-101

Fax: +49 351 85471-109

Email: post@sdtb.sachsen.de

Web: www.datenschutz.sachsen.de

You can also contact the supervisory authority of your habitual residence

Or the supervisory authority of your workplace

Or the supervisory authority of the place of alleged infringement

12.10 Procedures for Exercising Rights

  • 1. Submit request: By email, contact form or mail
  • 2. Identity verification: If necessary, additional verification
  • 3. Processing: Within 1 month; possible extension with justification
  • 4. Response: Provision of desired information or measure

Contact Form/Email Data

Complete access to stored correspondence

Rectification through new email with correct data

Deletion from mailbox and all backups

Server Logs

Information about IP-related entries (where assignable)

Deletion or anonymization of IP-related data

Technical limits for already anonymized logs

Electronic transmission preferred (email, secure download link)

Postal delivery on request

Secure transmission for sensitive data

First exercise of rights free of charge

Manifestly unfounded or excessive requests may be refused

Reasonable fee for repeated or costly requests

Additional copies beyond the first may be subject to a fee

13. Minors

13.1 Target Group: Adult Users

The website impressum.gobbltech.com is directed exclusively at adult users. Content, functions and communication are not aimed at children or young people.

  • No child- or youth-specific design or approach
  • No dedicated areas for minors
  • No profiling or behavioral advertising focused on minors
  • Business/professional orientation (imprint, contact information)

13.2 No Processing of Children's Data

We do not knowingly process personal data of children under 16 years (or the respective digital consent age under national law).

  • No special services for minors
  • No collection of data with knowledge of the age of minors
  • No targeted advertising to minors
  • No profiling for persons under the age of consent

13.3 Procedures Upon Knowledge of Minor Data

Upon knowledge of data processing of minors:

  • Immediate contact to clarify circumstances
  • Cessation of further data processing for this person
  • Review of deletion of stored data
  • Information to legal guardians (if contactable)

Deletion of minor data:

Immediate deletion of all stored data, unless legal retention obligations prevent it

Email correspondence, contact form data, server logs (where assignable)

13.4 Rights of Legal Guardians

Representation Authority

Legal guardians can exercise all data subject rights for their minor children.

We verify representation authority before providing information or taking measures.

Exercisable rights:

  • Access to processed data of the child
  • Rectification of incorrect data
  • Erasure of the child's data
  • Restriction of processing
  • Objection to processing

Contact procedure:

Requests by email to gobbltech@proton.me

Subject: "Minor - Data Protection Request"

Proof of guardianship and identification of the affected child

13.5 Preventive Measures

Website Design

  • Business/professional orientation of content
  • No playful or child-appealing elements
  • Clear identification as business website
  • Focus on business contact

Technical Measures

  • No tracking or profiling that could affect children
  • Minimal data collection generally
  • Secure data processing and storage
  • Regular review of data holdings

14. No Automated Individual Decision-Making/Profiling

14.1 No Automated Decisions (Art. 22 GDPR)

This website does not carry out automated individual decision-making that produces legal effects or similarly significantly affects you.

No algorithms are used that automatically decide about you as a person.

  • No credit or creditworthiness checks
  • No suitability or risk assessments
  • No algorithmic blocking or exclusion decisions
  • No automated application rejections
  • No AI-based personality assessments

14.2 Technical Security Measures (no Art. 22 decisions)

Technical access controls serve IT security and do not constitute decisions within the meaning of Art. 22 GDPR:

  • Rate limiting for protection against DDoS attacks
  • Firewall rules for defense against known threats
  • Spam protection for contact forms
  • Session validation for secure connections

Manual review is possible upon request for technical misclassifications.

14.3 No Profiling with Legal Effect

This website does not create personal user profiles for evaluating personal aspects.

  • No behavioral analysis of website visitors
  • No interest profile creation
  • No personalization based on usage patterns
  • No cross-device tracking or profiling
  • No marketing segmentation

The website deliberately refrains from analytics tools and tracking

Should optional analytics be introduced in the future, this will only be done with explicit consent and without personal profiling

14.4 Manual Decision Processes

Contact Requests

All requests via contact form or email are processed by humans

Individual review and response at discretion

Support Cases

Technical or data protection requests are processed manually and individually

No automated responses or decisions

14.5 Your Control and Rights

Complete transparency about all data processing processes

No hidden algorithmic decisions

Direct human contact person for all concerns

Right to review and explanation of all decisions

Contact us by email at gobbltech@proton.me

We gladly review each case individually and humanly

15. Application Procedures

15.1 Purposes and Legal Bases

  • Conducting the application procedure (review, selection, communication)
  • Documentation of proper procedure (equal treatment)
  • Preparation of possible employment

Art. 6 Para. 1 lit. b GDPR in conjunction with § 26 Para. 1 BDSG (initiation of employment relationship)

Art. 6 Para. 1 lit. f GDPR (legitimate interest in proper procedure execution)

Art. 6 Para. 1 lit. c GDPR (legal obligations, where applicable)

Art. 9 Para. 2 lit. a GDPR (explicit consent) for voluntary disclosure of special categories

15.2 Required and Voluntary Information

  • Master data: Name, address, email address
  • Application documents: Cover letter, CV
  • Qualification evidence: Relevant certificates or certifications
  • Additional qualifications or references
  • Portfolio or work samples
  • Phone number for follow-up questions

Do not transmit special categories of personal data (health, religion, etc.) unless they are expressly relevant for the position.

If such data is relevant, we only process it with your explicit consent.

15.3 Transmission and Security

Email Application

TLS encryption during transport between mail servers

For sensitive content we recommend PGP encryption or postal delivery

Contact Form

HTTPS/TLS encryption to the website

Forwarding as encrypted email to our mailbox

Postal Delivery

To the address in section 2.2

Secure physical storage

Access only for persons with HR responsibility

Confidential treatment of all application documents

No disclosure to external third parties without consent

15.4 Retention Period and Storage

Unsuccessful applications:

Deletion after 6 months from end of procedure

Answering follow-up questions and legal protection (AGG)

Legal retention obligations remain unaffected

Talent pool (only with consent):

Longer retention only with separate, voluntary consent

Retention for up to 12 months

Withdrawal possible at any time with immediate deletion

Successful applications:

Transfer to personnel file

Separate data protection information for employees

15.5 Your Rights in the Application Process

Access to stored application data

Rectification of incorrect information

Deletion of your application documents

Restriction of processing

Objection to processing

Data portability (structured copy)

Withdrawal of talent pool consent

Withdrawal for special categories of personal data

16. Changes and Updates

16.1 Legal Development and Adaptation

This privacy policy may be updated to reflect changes in our data processing, legal requirements, or business practices.

  • Changes in applicable data protection law
  • Introduction of new website functions or services
  • Changes in third-party services or processors
  • Technical modifications to data processing
  • Clarifications or improvements in information quality

16.2 Notification and Publication

Website Publication

Updated privacy policy will be published on the website

Always current version at: https://impressum.gobbltech.com/privacy

Clear indication of effective date and version number

Significant Changes

For material changes affecting your rights, we will inform you proactively

Via email (if we have your contact data) or prominent website notice

Reasonable advance notice before changes take effect

16.3 Version Control and Documentation

Version Numbers

Each version receives a clear version number and date

Summary of material changes in each version

Previous versions documented for transparency

Effective Dates

New version applies immediately to new website visitors

Reasonable transition period for existing data processing relationships

New consent required for material expansions of processing

16.4 Your Rights Regarding Changes

Right to Information

You have the right to be informed about all material changes

Clear explanation of what changes and why

Right to Object

For changes based on legitimate interests, you can object

Object to new processing purposes that affect your data

Withdrawal Rights

For new consent-based processing, you can refuse or withdraw

Request deletion of your data if you disagree with changes

16.5 Transitional Provisions

Immediate Effect

Security improvements and technical optimizations

Changes required by law or regulatory guidance

Editorial clarifications that do not change substance

Transition Periods

30 days notice for introduction of new optional services

14 days notice for changes in data processors

30 days notice for new processing purposes

Existing Rights

Existing data subject rights remain unaffected by changes

Lawful basis for existing processing continues until lawfully changed

17. Dispute Resolution and Jurisdiction

17.1 Amicable Dispute Resolution

Preferred Approach

We strive to resolve any data protection concerns through direct communication

Please contact us first at gobbltech@proton.me before involving external authorities

We commit to good faith efforts to address legitimate concerns

Internal Resolution Process

  • 1. Initial contact and concern description
  • 2. Internal review and investigation
  • 3. Response with proposed solution or explanation
  • 4. Follow-up to ensure satisfaction

We aim to respond within 5 business days and resolve issues within 30 days

17.2 Supervisory Authority Complaints

Lead Supervisory Authority

Saxon Data Protection and Transparency Commissioner

Maternistraße 17, 01067 Dresden, Germany

+49 351 85471-101

post@sdtb.sachsen.de

www.datenschutz.sachsen.de

Your Right to Complain

You can lodge a complaint at any time, regardless of our internal process

Complaints to supervisory authorities are free of charge

No requirement to contact us first, though we encourage it

Alternative Authorities

Data protection authority of your habitual residence

Data protection authority of your place of work

Authority where the alleged infringement occurred

17.3 Applicable Law and Jurisdiction

Applicable Law

This privacy policy and all data processing is governed by German law

Subject to the directly applicable provisions of the GDPR

In case of conflict: GDPR > German BDSG > other German law

Jurisdiction for Civil Disputes

For consumers: jurisdiction according to consumer protection rules

For business disputes: courts of Dresden, Germany

Special jurisdiction rules for data protection claims under GDPR

17.4 Limitation Periods

Data Subject Rights

Rights under Art. 15-22 GDPR generally have no limitation period

Rights exist as long as we process your personal data

Rights cease when data is lawfully erased

Civil Law Claims

Claims for compensation under Art. 82 GDPR: 3 years from knowledge

Limitation period calculated according to German civil law (BGB)

Limitation may be suspended during supervisory authority proceedings

17.5 Representation and Legal Costs

Your Rights

You have the right to legal representation in all proceedings

German cost rules apply: unsuccessful party generally pays costs

Check if your legal insurance covers data protection disputes

Our Approach

We prefer cost-effective resolution over lengthy legal proceedings

We consider proportionality in all dispute resolution

Open to reasonable settlement proposals

18. Contact for Data Protection Matters

18.1 Primary Contact Channels

gobbltech@proton.me

Response usually within 5 business days

Processing in German and English

PGP encryption available for sensitive requests

Contact form via https://impressum.gobbltech.com/contact.php

Secure transmission via TLS encryption

No storage in website database, direct email forwarding

Response by email to the provided address

18.2 Special GDPR Requests

Access Requests (Art. 15 GDPR)

Complete information about stored personal data

Processing within 30 days after identity verification

Provision in structured, machine-readable format

Rectification Requests (Art. 16 GDPR)

Correction of incorrect or incomplete data

Immediate rectification after verification

Confirmation of performed rectification

Deletion Requests (Art. 17 GDPR)

Complete deletion of personal data

Review of retention obligations and exceptions

Written confirmation of performed deletion

Meaningful subject line (e.g., "GDPR Access Request")

Provide sufficient information for identity verification

Concrete description of desired right

Indication of preferred response format

18.3 Identity Verification

Protection of your personal data from unauthorized access

Appropriate verification according to sensitivity of request

  • Email verification for requests from known email addresses
  • Additional information for unknown contacts
  • Postal delivery for particularly sensitive requests

Only minimal information required for identity verification

Requests by Third Parties

Power of attorney or proof of representation authority required

Special procedures for legal guardians of minor children

Increased verification requirements to protect data subjects

18.4 Processing Times and Procedures

Acknowledgment of receipt within 3 business days

Complete processing within 30 days (Art. 12 Para. 3 GDPR)

Extension by up to 60 days for complex requests

Timely information about deadline extensions with justification

1. Acknowledgment of receipt and completeness check

2. Identity verification (if required)

3. Compilation of relevant information

4. Legal review and approval

5. Transmission of response via secure communication channel

18.5 Postal Address for Written Requests

Danilo Endesfelder – Sole Proprietorship

c/o Nico Eberhardt

Pfotenhauerstraße 65

01307 Dresden

Germany

Please mark envelope with "Data Protection Request"

Confidential treatment of all postal requests

Response either by post or email at your choice

Longer processing time than electronic requests

18.6 Complaints and Escalation

For dissatisfaction with processing: escalation to gobbltech@proton.me

Internal review of the case by responsible person

Continuous improvement of processing procedures

Feedback for improvement of our data protection practices welcome

Right to complain to data protection supervisory authority (Art. 77 GDPR)

Saxon Data Protection and Transparency Commissioner (see section 2.5)

Complaint possible without prior contact with us

Complaint and direct request to us can occur in parallel

18.7 Communication Security

Email Encryption

End-to-end encryption through ProtonMail

PGP encryption available for additional security

Public PGP key available upon request

Website Security

TLS 1.3 encryption for all website communication

CSRF protection and secure form transmission

No permanent storage of sensitive data in web interface

Secure transmission of all communication

Encrypted storage of incoming requests

Access only for authorized persons

Logging of access for security purposes

Last updated: Oct 27, 2025