Privacy Policy

TL;DR

We take security, data protection, and your privacy very serious. And due to the fact, that we are a company that has to follow all the European and German legal requirements, this “Privacy Policy” is very detailed and therefore is has to be very long.


We are very delighted that you have shown interest in our company. Data protection is of a particularly high priority for the team of enabling Technology. The use of the Internet pages of enabling Technology is possible without any indication of personal data; however, if a data subject wants to use special enterprise services via our websites, processing of personal data could become necessary. If the processing of personal data is necessary and there is no statutory basis for such processing, we generally obtain consent from the data subject.

The processing of personal data, such as the name, address, e-mail address, or telephone number of a data subject shall always be in line with the General Data Protection Regulation (GDPR), and in accordance with the country-specific data protection regulations applicable to enabling Technology. By means of this data protection declaration, our enterprise would like to inform the general public of the nature, scope, and purpose of the personal data we collect, use and process. Furthermore, data subjects are informed, by means of this data protection declaration, of the rights to which they are entitled.

As the controller, enabling Technology has implemented numerous technical and organizational measures to ensure the most complete protection of personal data processed through this websites. However, Internet-based data transmissions may in principle have security gaps, so absolute protection may not be guaranteed. For this reason, every data subject is free to transfer personal data to us via alternative means, e.g., by telephone.


1. Definitions

The data protection declaration of enabling Technology is based on the terms used by the European legislator for the adoption of the General Data Protection Regulation (GDPR). Our data protection declaration should be legible and understandable for the general public, as well as our customers and business partners. To ensure this, we would like to first explain the terminology used.

In this data protection declaration, we use, inter alia, the following terms:

a) Personal data

Personal data means any information relating to an identified or identifiable natural person (“data subject”). An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.

b) Data subject

Data subject is any identified or identifiable natural person, whose personal data is processed by the controller responsible for the processing.

c) Processing

Processing is any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure, or destruction.

d) Restriction of processing

Restriction of processing is the marking of stored personal data with the aim of limiting their processing in the future.

e) Profiling

Profiling means any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyze or predict aspects concerning that natural person’s performance at work, economic situation, health, personal preferences, interests, reliability, behavior, location, or movements.

f) Pseudonymization

Pseudonymization is the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.

g) Controller or controller responsible for the processing

Controller or controller responsible for the processing is the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.

h) Processor

Processor is a natural or legal person, public authority, agency, or other body which processes personal data on behalf of the controller.

i) Recipient

Recipient is a natural or legal person, public authority, agency, or another body, to which the personal data are disclosed, whether a third party or not. However, public authorities which may receive personal data in the framework of a particular inquiry in accordance with Union or Member State law shall not be regarded as recipients; the processing of those data by those public authorities shall be in compliance with the applicable data protection rules according to the purposes of the processing.

j) Third party

Third party is a natural or legal person, public authority, agency, or body other than the data subject, controller, processor, and persons who, under the direct authority of the controller or processor, are authorized to process personal data.

Consent of the data subject is any freely given, specific, informed, and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.

2. Name and Address of the controller

Controller for the purposes of the General Data Protection Regulation (GDPR), other data protection laws applicable in Member states of the European Union (EU) and other provisions related to data protection is:

enabling Technology GmbH
Ahlbacher Weg 15
65594 Runkel
Germany

2.1 Responsible data protection authority

Hessen Datenschutzbehörde
Landesbeauftragter für Datenschutz: Prof. Dr. Alexander Roßnagel
Postfach 31 63
65021 Wiesbaden
Germany
☎ +49-611-14080
https://datenschutz.hessen.de/

3. Cookies

This Cookie Policy explains what cookies are and how we use them. You should read this policy to understand what cookies are, how we use them, the types of cookies we use i.e, the information we collect using cookies and how that information is used and how to control the cookie preferences.

3.1 What are cookies?

Cookies are small text files that are used to store small pieces of information. The cookies are stored on your device when the websites is loaded on your browser. These cookies help us make the websites function properly, make the websites more secure, provide better user experience, and understand how the websites performs and to analyze what works and where it needs improvement.

3.2 How do we use cookies?

As most of the online services, our websites uses cookies first party and third-party cookies for several purposes. The first-party cookies are mostly necessary for the websites to function the right way, and they do not collect any of your personally identifiable data.

The third-party cookies used on our websites are used for understanding how the websites performs, how you interact with our websites, keeping our services secure, providing advertisements that are relevant to you, and overall providing you with a better and improved user experience and help speed up your future interactions with our websites.

3.3 What types of cookies do we use?

I tried hard to get rid of all cookies!

The only cookie left is the __cfduid cookie of CloudFlare.

And the __cfduid cookie will be removed soon by CloudFlare.

3.4 When will cookies be used

If you are using some of our services (e.g., our Customer Service Desk and Support tool, our Microsoft 365 workloads, just to to name a few), cookies might be essential! But in this document all our services are listed and you will also find all the required information about the required cookies to access them.

Different browsers provide different methods to block and delete cookies used by websites. You can change the settings of your browser to block/delete the cookies.

To find out more out more on how to manage and delete cookies, visit wikipedia.org, or allaboutcookies.org.

3.6 Third party

Our cookie policy might not be applicable to 3rd party services. For instance: If you need an account from a 3rd party provider to access something. You can still avoid the usage (as mentioned above), but this might cause issues. Please see the information on the websites of the 3rd party provider. If we require to use a 3rd party, we will publish all the required information here in this policy.

4. Collection of general data and information

The websites of enabling Technology collects a series of general data and information when a data subject or automated system calls up the websites. This general data and information are stored in the server log files. Collected may be (1) the browser types and versions used, (2) the operating system used by the accessing system, (3) the websites from which an accessing system reaches our websites (so-called referrers), (4) the sub-websites, (5) the date and time of access to the Internet site, (6) an Internet protocol address (IP address), (7) the Internet service provider of the accessing system, and (8) any other similar data and information that may be used in the event of attacks on our information technology systems.

When using these general data and information, enabling Technology does not draw any conclusions about the data subject. Rather, this information is needed to (1) deliver the content of our websites correctly, (2) optimize the content of our websites as well as its advertisement, (3) ensure the long-term viability of our information technology systems and websites technology, and (4) provide law enforcement authorities with the information necessary for criminal prosecution in case of a cyber-attack. Therefore, enabling Technology analyses anonymously collected data and information statistically, with the aim of increasing the data protection and data security of our enterprise, and to ensure an optimal level of protection for the personal data we process. The anonymous data of the server log files are stored separately from all personal data provided by a data subject.

4.1 Third party

3rd party providers might collect other/more general data and/or information. If we require to use a 3rd party, we will publish all the required information here in this policy.

5. Contact possibility via the websites

The websites of enabling Technology contains information that enables a quick electronic contact us, as well as direct communication with us, which also includes a general address of the so-called electronic mail (e-mail address). If a data subject contacts the controller by e-mail or via a contact form, the personal data transmitted by the data subject are automatically stored. Such personal data transmitted on a voluntary basis by a data subject to the data controller are stored for the purpose of processing or contacting the data subject. There is no transfer of this personal data to third parties.

5.1 Contact form

If you send us enquiries via the contact form, your details contained in the form including the contact details you provide, will be stored by us for the purpose of processing the enquiry. We will not pass on this data without your consent.

5.2 Third party

All 3rd party providers are listed in this policy.

6 Newsletter data

If you would like to receive the newsletter offered through our website, a valid e-mail address must be provided along with information which allows us to verify that you are the owner of that address and agree to receive the newsletter. No further data will be collected. This data will be used exclusively for sending the requested information and will not be passed on to third parties.

Processing of the data entered in the newsletter registration form is performed exclusively with your consent (Art. 6 para. 1 lit. a DSGVO). At any time, consent can be revoked regarding the storage of the data, the e-mail address, and receiving the of the newsletter for example via the “unsubscribe” link in the newsletter.

7. Google reCAPTCHA

We use “Google reCAPTCHA” (hereinafter “reCAPTCHA”) on our websites. The provider is Google Inc, 1600 Amphitheatre Parkway, Mountain View, CA 94043, USA (“Google”). The purpose of reCAPTCHA is to check whether data entry on our websites (e.g. in a contact form) is made by a human or by an automated programs. For this purpose, reCAPTCHA analyses the behavior of the website visitor on the basis of various characteristics. This analysis begins automatically as soon as the website visitor enters the website. For the analysis, reCAPTCHA evaluates various information (e.g. IP address, time spent by the website visitor on the website or mouse movements made by the user). The data collected during the analysis is forwarded to Google.

The reCAPTCHA analysis runs mostly in the background. Website visitors may not be informed that an analysis is taking place.

Data processing is based on Art. 6 para. 1 lit. f DSGVO. The website operator has a legitimate interest in protecting its web offers from abusive automated spying and from SPAM.

For more information on Google reCAPTCHA and Google’s privacy policy, please see the following links:

https://www.google.com/intl/en/policies/privacy/ and https://www.google.com/recaptcha/intro/android.html

8. Routine erasure and blocking of personal data

The data controller shall process and store the personal data of the data subject only for the period necessary to achieve the purpose of storage, or as far as this is granted by the European legislator or other legislators in laws or regulations to which the controller is subject to.

If the storage purpose is not applicable, or if a storage period prescribed by the European legislator or another competent legislator expires, the personal data are routinely blocked or erased in accordance with legal requirements.

9. Rights of the data subject

a) Right of confirmation

Each data subject shall have the right granted by the European legislator to obtain from the controller the confirmation as to whether or not personal data concerning him or her are being processed. If a data subject wishes to avail himself of this right of confirmation, he or she may, at any time, contact any employee of the controller.

b) Right of access

Each data subject shall have the right granted by the European legislator to obtain from the controller free information about his or her personal data stored at any time and a copy of this information. Furthermore, the European directives and regulations grant the data subject access to the following information:

  • the purposes of the processing;
  • the categories of personal data concerned;
  • the recipients or categories of recipients to whom the personal data have been or will be disclosed, in particular recipients in third countries or international organizations;
  • where possible, the envisaged period for which the personal data will be stored, or, if not possible, the criteria used to determine that period;
  • the existence of the right to request from the controller rectification or erasure of personal data, or restriction of processing of personal data concerning the data subject, or to object to such processing;
  • the existence of the right to lodge a complaint with a supervisory authority;
  • where the personal data are not collected from the data subject, any available information as to their source;
  • the existence of automated decision-making, including profiling, referred to in Article 22(1) and (4) of the General Data Protection Regulation (GDPR) and, at least in those cases, meaningful information about the logic involved, as well as the significance and envisaged consequences of such processing for the data subject.
  • furthermore, the data subject shall have a right to obtain information as to whether personal data are transferred to a third country or to an international organization. Where this is the case, the data subject shall have the right to be informed of the appropriate safeguards relating to the transfer.

If a data subject wishes to avail himself of this right of access, he or she may, at any time, contact any employee of the controller.

c) Right to rectification

Each data subject shall have the right granted by the European legislator to obtain from the controller without undue delay the rectification of inaccurate personal data concerning him or her. Taking into account the purposes of the processing, the data subject shall have the right to have incomplete personal data completed, including by means of providing a supplementary statement.

If a data subject wishes to exercise this right to rectification, he or she may, at any time, contact any employee of the controller.

d) Right to erasure (Right to be forgotten)

Each data subject shall have the right granted by the European legislator to obtain from the controller the erasure of personal data concerning him or her without undue delay, and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies, as long as the processing is not necessary:

  • The personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed.
  • The data subject withdraws consent to which the processing is based according to point (a) of Article 6(1) of the General Data Protection Regulation (GDPR), or point (a) of Article 9(2) of the General Data Protection Regulation (GDPR), and where there is no other legal ground for the processing.
  • The data subject objects to the processing pursuant to Article 21(1) of the General Data Protection Regulation (GDPR) and there are no overriding legitimate grounds for the processing, or the data subject objects to the processing pursuant to Article 21(2) of the General Data Protection Regulation (GDPR).
  • The personal data have been unlawfully processed.
  • The personal data must be erased for compliance with a legal obligation in Union or Member State law to which the controller is subject.
  • The personal data have been collected in relation to the offer of information society services referred to in Article 8(1) of the General Data Protection Regulation (GDPR).

If one of the aforementioned reasons applies, and a data subject wishes to request the erasure of personal data stored by enabling Technology, he or she may, at any time, contact any employee of the controller. An employee of enabling Technology shall promptly ensure that the erasure request is complied with immediately.

Where the controller has made personal data public and is obliged pursuant to Article 17(1) to erase the personal data, the controller, taking account of available technology and the cost of implementation, shall take reasonable steps, including technical measures, to inform other controllers processing the personal data that the data subject has requested erasure by such controllers of any links to, or copy or replication of, those personal data, as far as processing is not required. An employee of enabling Technology will arrange the necessary measures in individual cases.

e) Right of restriction of processing

  • Each data subject shall have the right granted by the European legislator to obtain from the controller restriction of processing where one of the following applies:
  • The accuracy of the personal data is contested by the data subject, for a period enabling the controller to verify the accuracy of the personal data.
  • The processing is unlawful, and the data subject opposes the erasure of the personal data and requests instead the restriction of their use instead.
  • The controller no longer needs the personal data for the purposes of the processing, but they are required by the data subject for the establishment, exercise, or defense of legal claims.
  • The data subject has objected to processing pursuant to Article 21(1) of the General Data Protection Regulation (GDPR) pending the verification whether the legitimate grounds of the controller override those of the data subject.

If one of the aforementioned conditions is met, and a data subject wishes to request the restriction of the processing of personal data stored by enabling Technology, he or she may at any time contact any employee of the controller. The employee of enabling Technology will arrange the restriction of the processing.

f) Right to data portability

Each data subject shall have the right granted by the European legislator, to receive the personal data concerning him or her, which was provided to a controller, in a structured, commonly used, and machine-readable format. He or she shall have the right to transmit those data to another controller without hindrance from the controller to which the personal data have been provided, as long as the processing is based on consent pursuant to point (a) of Article 6(1) of the General Data Protection Regulation (GDPR) or point (a) of Article 9(2) of the General Data Protection Regulation (GDPR), or on a contract pursuant to point (b) of Article 6(1) of the General Data Protection Regulation (GDPR), and the processing is carried out by automated means, as long as the processing is not necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller.

Furthermore, in exercising his or her right to data portability pursuant to Article 20(1) of the General Data Protection Regulation (GDPR), the data subject shall have the right to have personal data transmitted directly from one controller to another, where technically feasible and when doing so does not adversely affect the rights and freedoms of others.

In order to assert the right to data portability, the data subject may at any time contact any employee of enabling Technology

g) Right to object

Each data subject shall have the right granted by the European legislator to object, on grounds relating to his or her particular situation, at any time, to processing of personal data concerning him or her, which is based on point (e) or (f) of Article 6(1) of the General Data Protection Regulation (GDPR). This also applies to profiling based on these provisions.

enabling Technology shall no longer process the personal data in the event of the objection, unless we can demonstrate compelling legitimate grounds for the processing which override the interests, rights, and freedoms of the data subject, or for the establishment, exercise, or defense of legal claims.

If enabling Technology processes personal data for direct marketing purposes, the data subject shall have the right to object at any time to processing of personal data concerning him or her for such marketing. This applies to profiling to the extent that it is related to such direct marketing. If the data subject objects to enabling Technology to the processing for direct marketing purposes, enabling Technology will no longer process the personal data for these purposes.

In addition, the data subject has the right, on grounds relating to his or her particular situation, to object to processing of personal data concerning him or her by enabling Technology for scientific or historical research purposes, or for statistical purposes pursuant to Article 89(1) of the General Data Protection Regulation (GDPR), unless the processing is necessary for the performance of a task carried out for reasons of public interest.

In order to exercise the right to object, the data subject may contact any employee of enabling Technology. In addition, the data subject is free in the context of the use of information society services, and notwithstanding Directive 2002/58/EC, to use his or her right to object by automated means using technical specifications.

h) Automated individual decision-making, including profiling

Each data subject shall have the right granted by the European legislator not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her, or similarly significantly affects him or her, as long as the decision (1) is not is necessary for entering into, or the performance of, a contract between the data subject and a data controller, or (2) is not authorized by Union or Member State law to which the controller is subject and which also lays down suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, or (3) is not based on the data subject’s explicit consent.

If the decision (1) is necessary for entering into, or the performance of, a contract between the data subject and a data controller, or (2) it is based on the data subject’s explicit consent, enabling Technology shall implement suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and contest the decision.

If the data subject wishes to exercise the rights concerning automated individual decision-making, he or she may, at any time, contact any employee of enabling Technology.

Each data subject shall have the right granted by the European legislator to withdraw his or her consent to processing of his or her personal data at any time.

If the data subject wishes to exercise the right to withdraw the consent, he or she may, at any time, contact any employee of enabling Technology.

10. CloudFlare

To increase the performance and protect our Sites and pages, We use the CDN (Content Delivery Network) of CloudFlare Inc. for some of them. CloudFlare cache content and collect access data. They use distributed infrastructure, and the next/fastest servers might be outside of the European Union (EU). Based on the information CloudFlare published, they keep the collected raw data for four hours (max for three days) before they delete them. There is some information available about how and what CloudFlare collects and stores. And here is a link to the CloudFlareSecurity Policy.

11. Data protection provisions about the application and use of LinkedIn

The controller has integrated components of the LinkedIn Corporation on this websites. LinkedIn is a web-based social network that enables users with existing business contacts to connect and to make new business contacts. Over four hundred million registered people in more than two hundred countries use LinkedIn. Thus, LinkedIn is currently the largest platform for business contacts and one of the most visited websites in the world.

The operating company of LinkedIn is LinkedIn Corporation, 2029 Stierlin Court Mountain View, CA 94043, UNITED STATES. For privacy matters outside of the UNITED STATES LinkedIn Ireland, Privacy Policy Issues, Wilton Plaza, Wilton Place, Dublin 2, Ireland, is responsible.

With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a LinkedIn component (LinkedIn plug-in) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to the download of a display of the corresponding LinkedIn component of LinkedIn. Further information about the LinkedIn plug-in may be accessed under https://developer.linkedin.com/plugins. During the course of this technical procedure, LinkedIn gains knowledge of what specific sub-page of our websites was visited by the data subject.

If the data subject is logged in at the same time on LinkedIn, LinkedIn detects with every call-up to our websites by the data subject - and for the entire duration of their stay on our Internet site - which specific sub-page of our Internet page was visited by the data subject. This information is collected through the LinkedIn component and associated with the respective LinkedIn account of the data subject. If the data subject clicks on one of the LinkedIn buttons integrated on our websites, then LinkedIn assigns this information to the personal LinkedIn user account of the data subject and stores the personal data.

LinkedIn receives information via the LinkedIn component that the data subject has visited our websites, provided that the data subject is logged in at LinkedIn at the time of the call-up to our websites. This occurs regardless of whether the person clicks on the LinkedIn button or not. If such a transmission of information to LinkedIn is not desirable for the data subject, then he or she may prevent this by logging off from their LinkedIn account before a call-up to our websites is made.

LinkedIn provides under https://www.linkedin.com/psettings/guest-controls the possibility to unsubscribe from e-mail messages, SMS messages and targeted ads, as well as the ability to manage ad settings. LinkedIn also uses affiliates such as Eire, Google Analytics, BlueKai, DoubleClick, Nielsen, Comscore, Eloqua, and Lotame. The setting of such cookies may be denied under https://www.linkedin.com/legal/cookie-policy. The applicable privacy policy for LinkedIn is available under https://www.linkedin.com/legal/privacy-policy. The LinkedIn Cookie Policy is available under https://www.linkedin.com/legal/cookie-policy.

12. Data protection provisions about the application and use of Twitter

On this websites, the controller has integrated components of Twitter. Twitter is a multilingual, publicly accessible microblogging service on which users may publish and spread so-called ‘tweets,’ e.g., short messages, which are limited to 280 characters. These short messages are available for everyone, including those who are not logged on to Twitter. The tweets are also displayed to so-called followers of the respective user. Followers are other Twitter users who follow a user’s tweets. Furthermore, Twitter allows you to address a wide audience via hashtags, links, or retweets.

The operating company of Twitter is Twitter, Inc., 1355 Market Street, Suite 900, San Francisco, CA 94103, UNITED STATES.

With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a Twitter component (Twitter button) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to download a display of the corresponding Twitter component of Twitter. Further information about the Twitter buttons is available under https://about.twitter.com/de/resources/buttons. During the course of this technical procedure, Twitter gains knowledge of what specific sub-page of our websites was visited by the data subject. The purpose of the integration of the Twitter component is a retransmission of the contents of this websites to allow our users to introduce this web page to the digital world and increase our visitor numbers.

If the data subject is logged in at the same time on Twitter, Twitter detects with every call-up to our websites by the data subject and for the entire duration of their stay on our Internet site which specific sub-page of our Internet page was visited by the data subject. This information is collected through the Twitter component and associated with the respective Twitter account of the data subject. If the data subject clicks on one of the Twitter buttons integrated on our websites, then Twitter assigns this information to the personal Twitter user account of the data subject and stores the personal data.

Twitter receives information via the Twitter component that the data subject has visited our websites, provided that the data subject is logged in on Twitter at the time of the call-up to our websites. This occurs regardless of whether the person clicks on the Twitter component or not. If such a transmission of information to Twitter is not desirable for the data subject, then he or she may prevent this by logging off from their Twitter account before a call-up to our websites is made.

The applicable data protection provisions of Twitter may be accessed under https://twitter.com/privacy?lang=en.

13. Data protection provisions about the application and use of YouTube

On this websites, the controller has integrated components of YouTube. YouTube is an Internet video portal that enables video publishers to set video clips and other users free of charge, which also provides free viewing, review and commenting on them. YouTube allows you to publish all kinds of videos, so you can access both full movies and TV broadcasts, as well as music videos, trailers, and videos made by users via the Internet portal.

The operating company of YouTube is YouTube, LLC, 901 Cherry Ave., San Bruno, CA 94066, UNITED STATES. The YouTube, LLC is a subsidiary of Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, UNITED STATES.

With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a YouTube component (YouTube video) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to download a display of the corresponding YouTube component. Further information about YouTube may be obtained under https://www.youtube.com/yt/about/en/. During the course of this technical procedure, YouTube and Google gain knowledge of what specific sub-page of our websites was visited by the data subject.

If the data subject is logged in on YouTube, YouTube recognizes with each call-up to a sub-page that contains a YouTube video, which specific sub-page of our Internet site was visited by the data subject. This information is collected by YouTube and Google and assigned to the respective YouTube account of the data subject.

YouTube and Google will receive information through the YouTube component that the data subject has visited our websites, if the data subject at the time of the call to our websites is logged in on YouTube; this occurs regardless of whether the person clicks on a YouTube video or not. If such a transmission of this information to YouTube and Google is not desirable for the data subject, the delivery may be prevented if the data subject logs off from their own YouTube account before a call-up to our websites is made.

YouTube’s data protection provisions, available at https://www.google.com/intl/en/policies/privacy/, provide information about the collection, processing and use of personal data by YouTube and Google.

Art. 6(1) lit. a General Data Protection Regulation (GDPR) serves as the legal basis for processing operations for which we obtain consent for a specific processing purpose. If the processing of personal data is necessary for the performance of a contract to which the data subject is party, as is the case, for example, when processing operations are necessary for the supply of goods or to provide any other service, the processing is based on Article 6(1) lit. b General Data Protection Regulation (GDPR). The same applies to such processing operations which are necessary for carrying out pre-contractual measures, for example in the case of inquiries concerning our products or services. Is our company subject to a legal obligation by which processing of personal data is required, such as for the fulfillment of tax obligations, the processing is based on Art. 6(1) lit. c General Data Protection Regulation (GDPR). In rare cases, the processing of personal data may be necessary to protect the vital interests of the data subject or of another natural person. This would be the case, for example, if a visitor were injured in our company and his name, age, health insurance data or other vital information would have to be passed on to a doctor, hospital or other third party. Then the processing would be based on Art. 6(1) lit. d General Data Protection Regulation (GDPR). Finally, processing operations could be based on Article 6(1) lit. f General Data Protection Regulation (GDPR). This legal basis is used for processing operations which are not covered by any of the above-mentioned legal grounds, if processing is necessary for the purposes of the legitimate interests pursued by our company or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data. Such processing operations are particularly permissible because they have been specifically mentioned by the European legislator. He considered that a legitimate interest could be assumed if the data subject is a client of the controller (Recital 47 Sentence 2 General Data Protection Regulation (GDPR)).

15. The legitimate interests pursued by the controller or by a third party

Where the processing of personal data is based on Article 6(1) lit. f General Data Protection Regulation (GDPR) our legitimate interest is to carry out our business in favor of the well-being of all our employees and the shareholders.

16. Period for which the personal data will be stored

The criteria used to determine the period of storage of personal data is the respective statutory retention period. After expiration of that period, the corresponding data is routinely deleted, as long as it is no longer necessary for the fulfillment of the contract or the initiation of a contract.

17. Provision of personal data as statutory or contractual requirement; Requirement necessary to enter a contract; Obligation of the data subject to provide the personal data; consequences of failure to provide such data

We clarify that the provision of personal data is partly required by law (e.g., tax regulations) or can also result from contractual provisions (e.g., information on the contractual partner). Sometimes it may be necessary to conclude a contract that the data subject provides us with personal data, which must subsequently be processed by us. The data subject is, for example, obliged to provide us with personal data when our company signs a contract with him or her. The non-provision of the personal data would have the consequence that the contract with the data subject could not be concluded. Before personal data is provided by the data subject, the data subject must contact any employee. The employee clarifies to the data subject whether the provision of the personal data is required by law or contract or is necessary for the conclusion of the contract, whether there is an obligation to provide the personal data and the consequences of non-provision of the personal data.

18. Existence of automated decision-making

As a responsible company, we do not use automatic decision-making or profiling.

19. Domains covered

If not noticed otherwise, our impress and privacy statement apply to all our sub- and sibling sites. In minimum to the following domains (including all sub-domains):

  • enabling-technology.de
  • enabling-technology.org
  • enatec.ai
  • enatec.consulting
  • enatec.group
  • enatec.io
  • enatec.it
  • enatec.net
  • enatec.solutions
  • enatec.support
  • enatec.systems

Domains for enabling Technology cloud and webservices:

  • enatec.cloud
  • enatec.network
  • enatec.services

If not noticed otherwise, our impress and privacy statement applies to all of our cloud infrastructure, our cloudservices, and the webservices we provide. We also use 3rd party serices, and a lot of external cloud services. We will publish all related informations about these services and cloud infrastructure services here.

19.1 (Sub-) Domains excluded

Our impress and privacy statement does nopt directly apply to the following (Sub-) Domains:

  • autodiscover.enabling-technology.de
  • autodiscover.enabling-technology.org
  • autodiscover.enatec.ai
  • autodiscover.enatec.consulting
  • autodiscover.enatec.group
  • autodiscover.enatec.io
  • autodiscover.enatec.it
  • autodiscover.enatec.net
  • autodiscover.enatec.solutions
  • autodiscover.enatec.support
  • autodiscover.enatec.systems

There are technical reasons for that. It might be a third party service that we use via a DNS cname record or other.

20. External Services

We use several services provided by 3rd parties. Here you will find a list of services that we use regularly and that are potentially relevant. They does not have to be relevant, but at least we think that there is a possibility that they are or could be. Therefore, we decided to list them here as complete as possible.

20.1 Atlassian Cloud

For our internal project management and software issue management, we use the cloud offerings from Atlassian (Atlassian Inc. (San Francisco, Harrison Street Location), 1098 Harrison Street, San Francisco, California 94103, USA), as well as some 3rd party extensions for the Atlassian cloud offerings. The Atlassian cloud offerings use Amazon Webservices (AWS) offerings to store data in the USA, the EU and other AWS zones. Whenever possible, the data is stored within the EU zone of Amazon Webservices (AWS).

Further data protection information from Atlassian can be found here:

In addition to the the regular cloud offerings from Atlassian, we use the following 3rd party extensions:

Until a customer or partner asked not to use the cloud offerings from Atlassian, we use them to streamline our internal software development processes. If the usage of the cloud offerings from Atlassian is not permuted, we use only local (on-premises) systems, but this has to be agreed.

The URI of the enabling Technology instance is: https://enatec.atlassian.net/

20.2 JetBrains

For our software development, we use products by JetBrains (JetBrains s.r.o. (Praha 4, Na Hřebenech II 1718/8, PSČ 140 00, Czech Republic, and the associated companies of JetBrains)).

Further data protection information from Atlassian can be found here:

In addition to the downloadable software products of JetBrains, we use the JetBrains YouTrack Cloud offering to handle our customer service desk and support portal. The JetBrains YouTrack cloud offerings use Amazon Webservices (AWS) to store data, the enabling Technology instance is hosted in Ireland (eu-west-1).

You can find the data protection information about the JetBrains YouTrack Cloud offering here:

The URI of the enabling Technology instance is: https://enatec.youtrack.cloud/

In an effort to support the right to erasure or “right to be forgotten” as outlined in the General Data Protection Regulation (GDPR) for data subjects who reside in the European Union, YouTrack gives us the ability to anonymize your personal data. If requested we anonymize your user account, your personal data is sanitized in such a way that is no longer identifiable. The full name, email addresses, usernames, login details, profile change history, and IP addresses are replaced with random values.

I you disagree to use the enabling Technology YouTrack Cloud instance, please contact enabling Technology. We will then avoid the usage of the YouTrack Cloud, please note that this might cause longer response times and our standard SLA policy will not be applied.

20.3 TeamViewer

We use the web meeting and remote access (remote support) software TeamViewer. The provider is TeamViewer Germany GmbH, Jahnstraße 30, 73037 Gõppingen, Germany (TeamViewer). You can find more details about data processing in the TeamViewer privacy policy at https://www.teamviewer.com/en/privacy-policy/.

In order to guarantee processing in compliance with data protection regulations, we have concluded an data processing agreement with TeamViewer. We also implement to the full extent the strict rules required by EU/German data protection agencies for the privacy-compliant use of TeamViewer.

The streamlined enabling Technology TeamViewer clients will show the data protection and privacy information during the installation, or on every start when you are using the simple support client, and you have to agree.

The streamlined enabling Technology TeamViewer clients here:

Our security and privacy policy covers the streamlined enabling Technology TeamViewer clients mentioned above only! But you can use the regular TeamViewer clients, if you prefer to do that instead.

20.4 Google Fonts

Our sites uses so-called web fonts provided by Google for the uniform display of fonts. When you call up a page, your browser loads the required web fonts into your browser cache in order to display texts and fonts correctly.

For this purpose, the browser you are using must connect to Google’s servers. This gives Google knowledge that this website has been accessed via your IP address. The use of Google WebFonts is based on Art. 6 para. 1 lit. f GDPR. The website operator has a legitimate interest in the uniform presentation of the typeface on its website. If a corresponding consent has been requested, the processing is carried out exclusively on the basis of Art. 6 para. 1 lit. a GDPR and § 25 para. 1 TTDSG, insofar as the consent includes the storage of cookies or access to information in the user’s end device (e.g. device fingerprinting) within the meaning of the TTDSG. Consent can be revoked at any time.

If your browser does not support web fonts, a standard font will be used by your computer.

Further information on Google Web Fonts can be found at https://developers.google.com/fonts/faq and in Google’s privacy policy: https://policies.google.com/privacy.

We have installed all Google Fonts on the servers, whenever it was possible, of our online service. This allows you to use the fonts in our online service without having to connect to Google’s servers.

20.5 Font Awesome

Our sites might also use Font Awesome for the uniform display of fonts. Font Awesome is installed locally, whenever it was possible. Therefore, a connection to servers of Fonticons, Inc. does not take place.

Further information about Font Awesome can be found in the Font Awesome privacy policy at: https://fontawesome.com/privacy.

20.6 Webgo

Most of our websites are hosted by our processor Webgo (webgo GmbH, Wandsbeker Zollstr. 95, 22041 Hamburg, Deutschland).

We use Webgo on the basis of Art. 6(1)(f) GDPR. We have a legitimate interest in the most reliable depiction of our website possible. If appropriate consent has been obtained, the processing is carried out exclusively on the basis of Art. 6(1)(a) GDPR and § 25 (1) TTDSG, insofar the consent includes the storage of cookies or the access to information in the user’s end device (e.g., device fingerprinting) within the meaning of the TTDSG. This consent can be revoked at any time.

All Webgo servers used by enabling Technology are located in Germany and order to guarantee processing in compliance with data protection regulations, we have concluded an data processing agreement with Webgo.

You can find the Webgo data protection and privy policy here: https://www.webgo.de/datenschutz/

20.7 Hetzner

We host some websites or services with Hetzner (Hetzner Online GmbH, Industriestr. 25, 91710 Gunzenhausen, Germany).

We use Hetzner on the basis of Art. 6(1)(f) GDPR. We have a legitimate interest in the most reliable depiction of our website possible. If appropriate consent has been obtained, the processing is carried out exclusively on the basis of Art. 6(1)(a) GDPR and § 25 (1) TTDSG, insofar the consent includes the storage of cookies or the access to information in the user’s end device (e.g., device fingerprinting) within the meaning of the TTDSG. This consent can be revoked at any time.

All Hetzner servers used by enabling Technology are located in Germany and order to guarantee processing in compliance with data protection regulations, we have concluded an data processing agreement with Hetzner.

For details, please view the data privacy policy of Hetzner: https://www.hetzner.com/de/rechtliches/datenschutz.

20.8 Microsoft 365 (M365)

We are processing personal data in the context of the implemented Microsoft 365 modules from Microsoft Corporation (Microsoft Corporation, One Microsoft Way, Redmond, WA 98052-6399, USA), Microsoft Ireland (Microsoft Ireland Operations Limited, One Microsoft Place, South County Business Park, Leopardstown, Dublin 18 D18 P521), and Microsoft Germany (Microsoft Deutschland GmbH, Walter-Gropius-Str. 5, 80807 Munich, Germany).

The most commonly used Microsoft 365 modules by enabling Technology are:

  • Microsoft Teams: Through the meeting features offered by Microsoft Teams, we can offer you participation via video/audio in our online events. There is no recording of events without the consent of the participants. Through the offered chat and telephony function of Microsoft Teams, you can contact us in writing, via audio, or via audio/video. Furthermore, Microsoft Teams is used as a collaboration and exchange platform for project work for communication and cooperation.
  • Microsoft Forms and Microsoft Polls: For example, voluntary surveys and votes can be carried out via Microsoft Forms and/or Microsoft Polls.
  • Microsoft SharePoint Online: Using Microsoft SharePoint Online, you can share and collaborate on files with us as part of project work, provided a contractual relationship exists.
  • Microsoft Exchange Online in connection with MicrosoftOutlook: Microsoft Exchange Online in combination with Outlook covers the mail communication of enabling Technology.
  • Microsoft Office Online, Microsoft Office 365 and Microsoft Office Suite: We use the Microsoft Office Online suite, the Microsoft Office 365 Suite, and the Microsoft Office Suite to create and change content, share and collaborate on files as part of our regular work.
  • Microsoft Windows 365: Employees and business partners of enabling Technology use managed virtual desktops, based on Microsoft Windows 365.
  • Microsoft Intune: We use Intune as our management platform.
  • Microsoft Defender: We use several Microsoft Defender offerings to protect our clients, servers and services.

We carry out the data processing based on a legitimate interest pursuant to Art. 6 (1) f) DS-GVO. Our legitimate interest for data processing is the communication and collaboration of our employees, business partners and interested third parties.

Data processing with Microsoft 365 takes place on servers in data centers in the European Union. Most of the enabling Technology workloads are hosted in Germany. Some might workloads or services might also be hosted in Ireland, the Netherlands, or other countries in the European union. For this purpose, we have concluded a data processing under commission agreement with Microsoft within the meaning of Art. 28 GDPR. Accordingly, we have agreed on extensive technical and organizational measures with Microsoft for Office 365 that comply with the currently applicable state of the art of IT security, e.g. with regard to access authorization and end-to-end encryption concepts for transmission paths, databases and servers.

Microsoft reserves the right to process Customer Data for its own legitimate business purposes. We cannot influence these data processing operations by Microsoft. To the extent that Microsoft Teams processes personal data in connection with its legitimate business purposes, Microsoft acts as an independent data controller for this data processing and, as such, is obliged to comply with the applicable data protection regulations. To the extent technically possible and contractually permissible, our IT administration selects the most privacy-friendly default settings for the Microsoft 365 modules we use and reduces the transfer of customer and metadata to Microsoft to an absolute minimum.

For more information about privacy in connection with Microsoft 365 modules, products and cloud offerings, please see:

20.8.1 Information disclosure

Data transfer to other data controllers: Principally, your personal data is forwarded to other controllers only if required for the fulfillment of a contractual obligation, or if we ourselves, or a third party, have a legitimate interest in the data transfer, or if you have given your consent. Additionally, data may be transferred to other controllers when we are obliged to do so due to statutory regulations or enforceable administrative or judicial orders.

Data transfer to processors: The transfer is made to Microsoft Deutschland GmbH as a processor and to the sub-processors lawfully used by Microsoft. If the sub-processors are located outside the European Union in so-called third countries, Microsoft will make sure that the recipient either has got an adequate level of data protection or has got your consent to the transfer.

20.8.2 Duration of storage and retention periods

Principally, we store your data for as long as this is necessary to enable communication and collaboration via the Microsoft 365 modules used by us for this purpose and the associated services, or for as long as we have a legitimate interest in continuing to store it. In case of Microsoft Teams, we will automatically delete chat histories (chat participants; content and files) on our site that are older than two years. In all other cases, we delete your personal data with the exception of data we are obliged to store for the fulfillment of legal obligations, for example: Due to retention periods under the tax and commercial codes we are obliged to have documents such as contracts and invoices available for a certain period of time.

Login data and IP addresses are deleted by Microsoft after 180 days at the latest.

20.8.3 Further information

You can find more information on the Microsoft website: https://docs.microsoft.com/de-de/compliance/assurance/assurance-data-retention-deletion-and-destruction-overview.

20.9 GitHub

GitHub is a development platform to host and review code, manage projects, and build software. It is provided by GitHub B.V. (GitHub B.V., Prins Bernhardplein 200, Amsterdam 1097JB, The Netherlands) and GitHub Inc. (GitHub Inc., 88 Colin P Kelly Jr St, San Francisco, CA 4107, United States).

We as enabling Technology use GitHub to host our code repositories. If this concerns you, please get in touch with us, we will then use local (on-premises) repositories only and will then not even do backups it towards GitHub, or any other cloud provider. But please note, that this might have impact on availability and it could also have a negative impact on our standard Service level agreement (SLA) for software development services.

By default all customer related repositories are private and can not be accessed without a valid account membership. The membership is handled by us (enabling Technology) and not by GitHub. To gain access to a personal (non public) repository, you will a GitHub account! we, enabling Technology, is not responsible for this account, this is something between you, as the accounts user, and GitHub.

20.9.1 Collected data

As far as we know, the following data needs to be collected and process by GitHub to provide the service for us:

  • Account Data: GitHub collects certain information when you open an account such as your GitHub handle, name, email address, password, and potently some more. The data collated depends on your account, and “your mileage may vary”.
  • User Content and Files: When you use the GitHub Services, GitHub collects Personal Data included as part of the information you provide such as code, inputs, text, documents, images, or your feedback.

20.9.2 Data that enabling Technology can access

We can only access the information you provide such as code, inputs, text, documents, images, or your feedback. And only as long as you give us the permission on your GitHub content, or if the content mentioned above is public. We also get full access to information (as mentioned above) that you provide in within the enabling Technology namespace or repositories.

The enabling Technology namespace on GitHub is: https://github.com/enatec

20.9.3 Further information

For more information on what data GitHub collects for what purpose and how the protection of the data is ensured, please visit GitHub Privacy Policy page: https://help.github.com/en/articles/github-privacy-statement. GitHub also provides list of sub-processors envolved: https://docs.github.com/en/site-policy/privacy-policies/github-subprocessors.

21. WeTransfer

For the data exchange, we partly use the service WeTransfer (WeTransfer B.V., Willem Fenengastraat 19, 1096 BL Amsterdam, The Netherlands).

We use WeTransfer to exchange data with customers, partners, and prospective clients if this is required and has been agreed in advance. The data (e.g., the data provided by enabling Technology, email address of the recipient) is usually transferred and stored in encrypted form on the European Union servers. In some cases, however, WeTransfer also uses servers outside the European Union. In these cases, appropriate protective measures are taken to protect the data to a comparable extent as within the European Union.

The uploaded data is stored on WeTransfer’s servers for a set period of time and is available for to download. Afterwards, they are automatically deleted. The expiry date will be provided in the confirmation email. After the aforementioned expiry period, the data will be deleted by WeTransfer.

The legal basis is Art. 6 para. 1 (f) GDPR. Our legitimate interest is to be able to transfer larger amounts of data.

The data protection information from WeTransfer is available here: https://wetransfer.com/legal/privacy.

22. Trademarks

Many (or nearly all) names of products and companies mentioned are registered trademarks ® or trademarks ™ of others.

Here are a (very) few examples of trademarks we use frequently:
Microsoft, Microsoft Word, Microsoft Excel, Windows, Internet Explorer are registered trademarks of Microsoft Corporation;
Apple, iPhone, iPad, iPod, Mac, Mac OS 9, Mac OS X, MacOS, Apple Watch, AppStore are registered trademarks of Apple Computer Inc.;
Adobe and Adobe Reader are registered trademarks of Adobe Systems Inc.;
Linux is a registered trademark of Linus Torvalds.

All other products, product names, fonts, company names or logos might be trademarks or registered trademarks. Even if they are not in the list above, or if we don’t mark them explicit.

We, enabling Technology, have no influence on the collection, processing and use of personal data when clicking on the links (such as the IP address or the URL of the page on which the link is located) and cannot accept any responsibility for this.


This page needs some further rework! We know that, but as it is today, all the legal requirements should be covered. And reorganize content on the page is does not have the highest priority sometimes.