{"id":3241,"date":"2023-05-09T16:37:05","date_gmt":"2023-05-09T14:37:05","guid":{"rendered":"https:\/\/edi-service.partners\/privacy-policy\/"},"modified":"2026-01-21T15:00:04","modified_gmt":"2026-01-21T13:00:04","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/edi-service.partners\/en\/privacy-policy\/","title":{"rendered":"Privacy policy"},"content":{"rendered":"\n<p><strong><a href=\"#1-datenschutz-dsgvo\">1. Data Protection (GDPR)<\/a><\/strong><\/p>\n\n<ol style=\"list-style-type:upper-alpha\" class=\"wp-block-list\">\n<li><strong><strong>General information<\/strong><\/strong><\/li>\n\n\n\n<li><strong>Definitions of terms<\/strong><\/li>\n\n\n\n<li><strong>Person responsible<\/strong><\/li>\n\n\n\n<li><strong>Data collection<\/strong><\/li>\n\n\n\n<li><strong>Cookies<\/strong>\n<ol class=\"wp-block-list\">\n<li><strong>About Cookies<\/strong><\/li>\n\n\n\n<li><strong>Required<\/strong><\/li>\n\n\n\n<li><strong>Statistics<\/strong><\/li>\n\n\n\n<li><strong>Marketing<\/strong><\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong>Sending of publications<\/strong><\/li>\n\n\n\n<li><strong>Photo and video recordings at events<\/strong><\/li>\n\n\n\n<li><strong>Contact option via the website<\/strong><\/li>\n\n\n\n<li><strong>Routine deletion and blocking of personal data<\/strong><\/li>\n\n\n\n<li><strong>Rights of data subjects<\/strong><\/li>\n\n\n\n<li><strong>Data protection in applications and the application process<\/strong><\/li>\n\n\n\n<li><strong>Further processing within the scope of the website<\/strong>\n<ol class=\"wp-block-list\">\n<li><strong>Google Analytics<\/strong><\/li>\n\n\n\n<li><strong>Google Ads &amp; Doubleclick.net<\/strong><\/li>\n\n\n\n<li><strong>LinkedIn<\/strong><\/li>\n\n\n\n<li><strong>Facebook &amp; Instagram<\/strong><\/li>\n\n\n\n<li><strong>Calendly<\/strong><\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong>Data forwarding<\/strong><\/li>\n\n\n\n<li><strong>Legal basis for processing<\/strong><\/li>\n<\/ol>\n\n<p><strong><a href=\"#2-technisch-organisatorische-massnahmen-toms\">2. Technical and Organizational Measures (TOMs)<\/a><\/strong><\/p>\n\n<ol style=\"list-style-type:upper-alpha\" class=\"wp-block-list\">\n<li><strong><strong>Confidentiality<\/strong><\/strong><\/li>\n\n\n\n<li><strong>Data integrity<\/strong><\/li>\n\n\n\n<li><strong>Availability and resilience<\/strong><\/li>\n\n\n\n<li><strong>Procedures for regular review, assessment, and evaluation<\/strong><\/li>\n<\/ol>\n\n<p><strong><a href=\"#3-informationssicherheit-iso-iec-27001-2022\">3. Information Security &amp; ISO\/IEC 27001:2022<\/a><\/strong><\/p>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"1-datenschutz-dsgvo\"><strong>1. Data Protection (GDPR)<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">A. General information<\/h3>\n\n<p>Thank you for your interest in our company. Data protection is of a very high priority for the management of Avenum. The use of Avenum&#8217;s website is essentially possible without providing any personal data. If a data subject wishes to make an appointment or make use of special services of our company via our website, it may be necessary to process personal data. Should this be necessary, we will obtain separate consent from the data subject.    <\/p>\n\n<p>The processing of personal data is always carried out in compliance with the General Data Protection Regulation (GDPR) and in accordance with national data protection regulations. With this privacy policy, our company aims to inform visitors about the content and purpose of the personal data we collect and process. Furthermore, this privacy policy provides information to data subjects about the rights they are entitled to.  <\/p>\n\n<p>Avenum, as the operator of the website, has implemented extensive technical and organizational measures to ensure reliable protection of the data processed through this website. However, data transfers between your device and our server may still have vulnerabilities, especially if you are communicating with our server using a device that is under external access. If you have concerns about security, you can also obtain information through other means, such as by phone or at one of our branches.  <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">B. Definitions of terms<\/h3>\n\n<p>Avenum&#8217;s privacy policy is based on the provisions and definitions of the General Data Protection Regulation (GDPR). Our privacy policy is designed to be easily readable and understandable for both visitors and customers as well as business partners. <\/p>\n\n<p>To ensure this, we would like to explain the terms used in advance:<\/p>\n\n<p>1) Personal data<br\/>Personal data refers to any information that relates to an identified or identifiable natural person.<\/p>\n\n<p>2) Data subject<br\/>A data subject is any identifiable natural person whose personal data is processed by a controller.<\/p>\n\n<p>3) Controller<br\/>The controller is the company that collects the data of data subjects and decides on the purposes and means of processing.<\/p>\n\n<p>4) Processor<br\/>The processor is a natural person or a company that is involved in processing by the controller and is subject to the controller&#8217;s right to issue instructions.<\/p>\n\n<p>5) Recipient<br\/>The recipient is a natural or legal person or public body to whom personal data is disclosed.<\/p>\n\n<p>6) Third party<br\/>A third party is a natural or legal person or public authority which processes personal data on behalf of the controller or processor without being subject to instructions from the controller or processor.<\/p>\n\n<p>7) Processing<br\/>Processing is any operation carried out in connection with personal data. This ranges from the collection and storage to the restriction or deletion of data. <\/p>\n\n<p>8) Restriction of processing<br\/>Restriction of processing means a reduction in the use of personal data.<\/p>\n\n<p>9) Consent<br\/>Consent is any declaration made by a person stating that they agree to the processing of their personal data.<\/p>\n\n<p>10) Revocation<br\/>By revoking consent, a person withdraws the right of the controller to process data on the basis of consent.<\/p>\n\n<p>11) Pseudonymization<br\/>Pseudonymization separates the data from the identifiable person. This connection can only be re-established with the help of further, specially secured information. The process of pseudonymization corresponds to so-called data minimization.  <\/p>\n\n<p>12) Profiling<br\/>Profiling is any type of automated evaluation of personal data.<\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">C. Person responsible<\/h3>\n\n<p>Verantwortlicher im Sinne der DSGVO ist:<br\/><br\/><strong>AVENUM Technologie GmbH (\u201eAvenum\u201c)<br\/><\/strong>Leonard-Bernstein-Stra\u00dfe 10<br\/>1220 Wien<br\/>\u00d6STERREICH<br\/>Telefon +43 1 92101-0<br\/><a href=\"mailto:office@avenum.com\">office@avenum.com<\/a><\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">D. Data collection<\/h3>\n\n<p>Each time the controller&#8217;s website is accessed, a range of data and information is stored in server log files. In this way, among other things <\/p>\n\n<p>1) browser types and versions,<br\/>2) your computer&#8217;s operating system,<br\/>3) the website from which you were redirected to us,<br\/>4) the pages accessed on our web server,<br\/>5) the date and time of your visit,<br\/>6) your IP address,<br\/>7) your internet service provider<\/p>\n\n<p>recorded.<\/p>\n\n<p>When using this collected information, Avenum does not attempt to draw any conclusions about the data subject. However, this data is required to deliver the content of our website correctly and to display it optimally for you, and to provide authorities with the necessary information in the event of a hacker attack. This data is therefore processed by Avenum both statistically and as a technical measure to ensure the data protection and information security of this processing and your data.  <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">E. Cookies<\/h3>\n\n<p>Avenum&#8217;s Internet pages use cookies &#8211; text files that are stored in the file system of a computer via an Internet browser.<\/p>\n\n<p>Cookies contain a cookie ID, which is a unique identifier. They enable Avenum to distinguish the data subject&#8217;s browser from other Internet browsers and to display content individually in order to respond to the data subject&#8217;s wishes and results.<br\/>One example is the consent management cookies used to store your preferences.<br\/>You can use our cookie settings to conveniently set which cookies you want to allow at any time. <\/p>\n\n<p>Cookies already on your computer can be deleted at any time via the Internet browser or directly in the file system. Please note that deactivating cookies may limit the functionality of the website. <\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">1. About Cookies<\/h4>\n\n<p>Cookies are small text files that are stored on your computer, tablet computer or smartphone with the help of your browser when you visit a website. These files do not cause any damage and are only used to recognize the website visitor. The next time you visit the website with the same end device, the information stored in cookies can subsequently be sent back either to the website (&#8220;first party cookie&#8221;) or to another website to which the cookie belongs (&#8220;third party cookie&#8221;). You can set your browser so that the storage of cookies is generally prevented or you are asked each time whether you agree to the setting of cookies. Once cookies have been set, you can delete them at any time. You can find out how to do this in the help function of your browser.     <\/p>\n\n<p>A detailed list of the cookies used on this website can be found at <a href=\"https:\/\/edi-service.partners\/en\/cookie-policy\/\">https:\/\/edi-service.partners\/cookie-richtlinie\/<\/a><\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">2. Technically Required<\/h4>\n\n<p>These cookies are absolutely necessary for the website to function and cannot be deactivated in your systems. As a rule, these cookies are only set in response to actions you take, such as setting your privacy preferences, logging in or filling out forms. Our consent management also prevents cookies from being set by third parties if no consent has been given. You can set your browser so that these cookies are blocked or you are notified about these cookies.   <\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">3. Statistics<\/h4>\n\n<p>These cookies allow us to count visits and traffic sources so that we can measure and improve the performance of our website. They collect information about how the website is used, such as which pages are visited most frequently and how visitors move around the website. They are intended to help us improve the user-friendliness of the website and thus the user experience. If you are logged into your Google account during your visit, Google can associate your visit to our website with your account.    <\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">4. Marketing<\/h4>\n\n<p>Marketing cookies (also known as targeting or advertising cookies) are used to display personalized advertisements on third-party websites that are more relevant to the user and their interests. They are also used to limit the frequency with which an advertisement appears based on these interests and to measure and control the effectiveness of advertising campaigns. YouTube technologies are used when users visit websites that play embedded YouTube videos. Youtube.com is a platform operated by Google for hosting and sharing videos.<br\/>If you are logged into your Google or Facebook account at the same time, both platforms can link your visit to our websites to your account.    <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">F. Sending of publications<\/h3>\n\n<p>Our mailings focus on offers, national and international EDI projects and the sharing of knowledge and experience from all sectors.<br\/>The mailings provide readers with a holistic view of the complex challenges and innovative solutions along the value chain of their industry.<br\/>To send the current publication, we need to process the name, address and, in the case of electronic delivery, the e-mail address of the recipient.<\/p>\n\n<p>The legal basis lies either in your consent or in our legitimate interest in informing recipients about current topics in the construction industry. If you do not wish to receive our publications in future, please inform us briefly at office@avenum.com or by post to the address given under (C.). In this case, we will delete your contact data from this processing and discontinue any further mailing.  <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">G. Photo and video recordings at events<\/h3>\n\n<p>As part of our events, photos and videos are taken which are subsequently used for publication on websites, in social media channels and in our publications and other print media. Our aim is to promote our products and events, as well as the company itself, and to raise awareness in the construction industry. <\/p>\n\n<p>The legal basis for this is our legitimate interest within the meaning of Article 6(1)(f) GDPR in public relations work and presenting the activities of the controller.<br\/>If you do not consent to photographs or videos being taken at our events, please contact a representative of our company during the event.<br\/>We have carefully weighed the interests of data subjects and our company in this processing and are convinced that no rights of data subjects are infringed. Nevertheless, you have the right to object to the processing of the photographs and video recordings made. To do so, simply send an email with a brief description of your objection to office@avenum.com.   <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">H. Contact option via the website<\/h3>\n\n<p>Due to legal regulations, our website contains information for easy contact with Avenum. If you contact us by e-mail, the data you provide will be stored automatically and used exclusively for the purpose of responding to your contact. <\/p>\n\n<p>If you use a contact form on our website, we collect the following data from you: <\/p>\n\n<p>&#8211; Name<br\/>&#8211; E-Mail<br\/>&#8211; Phone number<br\/>&#8211; Company name<br\/>&#8211; Your personal message. <\/p>\n\n<p>By entering your data, you also consent to its use for the purpose of responding to your request in accordance with Art. 6 para. 1 lit. a GDPR.<br\/>Unless other purposes arise from the response, about which we will inform you separately, the data entered will be deleted after the response or processing of your request.<\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">I. Routine deletion and blocking of personal data<\/h3>\n\n<p>Avenum processes and stores personal data of the data subject only for the period necessary to achieve the purpose of storage or as provided for by law.<br\/>If the purpose or legal basis for processing no longer applies, your personal data will be blocked or deleted in accordance with the law on the basis of our processes.<\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">J. Rights of the data subjects<\/h3>\n\n<p>Extensive rights of data subjects apply to the processing of personal data in accordance with the GDPR. The following is a rough list of these rights for your information: <\/p>\n\n<p>1) Right to information<br\/>Every data subject has the right to receive information from the controller at any time about the personal data stored about them and a copy of this data.<\/p>\n\n<p>2) Right to rectification<br\/>Each data subject shall have the right to obtain from the controller without undue delay the rectification or completion of inaccurate personal data concerning him or her.<\/p>\n\n<p>3) Right to erasure<br\/>Each data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her, where<br\/>&#8211; the purposes of the processing have ceased to exist<br\/>&#8211; the legal basis for the processing no longer exists (end of contract, withdrawal of consent).<br\/>You may request the erasure of your personal data stored by us at any time by contacting an employee, in particular electronically at office@avenum.com.<\/p>\n\n<p>4) Right to restriction<br\/>Any person affected by the processing of personal data has the right to request the controller to restrict the processing if:<br\/>&#8211; the purposes for the processing no longer apply<br\/>&#8211; the legal basis for the processing no longer exists (end of contract, withdrawal of consent).<br\/>You can contact an employee at any time &#8211; in particular electronically at office@avenum.com &#8211; to request the restriction of your data stored by us.<\/p>\n\n<p>5) Right to data portability<br\/>Each data subject shall have the right to receive the personal data concerning him or her, which he or she has provided to us, in a structured, commonly used and machine-readable format and have the right to transmit those data to another controller without hindrance from the controller to which the personal data have been provided, where the processing is based on consent or on a contract and carried out by electronic means.<br\/>You can contact an employee &#8211; in particular electronically at office@avenum.com &#8211; at any time for the transfer of your data stored by us.<\/p>\n\n<p>6) Right to object<br\/>Any person affected by the processing of personal data has the right to object to the processing of personal data relating to them on the grounds of legitimate interest. Avenum shall no longer process the personal data in the event of the objection, unless we can demonstrate compelling legitimate grounds for the processing which override the interests, rights and freedoms of the data subject or for the establishment, exercise or defense of legal claims.<br\/>To exercise the right to object, you can contact an employee at any time, in particular electronically at office@avenum.com. <\/p>\n\n<p>7) Automated decisions in individual cases including profiling<br\/>As a responsible company, we do not use automated decision-making or profiling.<\/p>\n\n<p>8) Right to withdraw consent<br\/>Every data subject has the right to withdraw consent to the processing of personal data at any time.<br\/>You can contact an employee &#8211; in particular electronically at office@avenum.com &#8211; at any time to exercise your right to withdraw consent.<\/p>\n\n<p>9) Right to lodge a complaint with a supervisory authority<br\/>You have the right to lodge a complaint with a competent supervisory authority pursuant to Art. 77 GDPR if you consider that the processing of personal data relating to you infringes the provisions of the GDPR.<br\/>You can contact the Austrian Data Protection Authority at Barichgasse 40-42, 1030 Vienna.<\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">K. Data protection in applications and the application process<\/h3>\n\n<p>Avenum collects and processes the personal data of applicants for the purpose of processing the application. Processing may also be carried out electronically. This is particularly the case if an applicant submits the relevant application documents to us electronically, for example by e-mail. If Avenum concludes an employment contract with an applicant, the transmitted data will be stored for the implementation of the employment relationship. If Avenum does not conclude an employment contract with the applicant, the applicant&#8217;s documents will be automatically deleted no later than thirteen months after receipt of the application, unless deletion conflicts with any other legitimate interests of Avenum or the applicant&#8217;s consent to further processing.<br\/>If an applicant asserts his or her right to deletion, the data may be deleted as early as six months after rejection of the application.    <\/p>\n\n<p>What data is collected?<\/p>\n\n<p>The following data is collected and processed for the automated processing of your application:<br\/>1) First name, surname, e-mail and, if applicable, address\/location, date of birth, title, telephone number, citizenship<br\/>2) Additional questions depending on the respective job advertisement (e.g. driving license) 3) Curriculum vitae 4) Professional experience and training 5) Competencies (e.g. Photoshop, MS Office) 6) Application photo (optional) e.g. driving license)<br\/>3) CV<br\/>4) Professional experience and training<br\/>5) Skills (e.g. Photoshop, MS Office)<br\/>6) Application photo (optional)<br\/>7) Qualifications, awards and language skills<br\/>8) Letter of motivation<br\/>9) Files and documents that you may submit<\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">L. Further processing within the scope of the website<\/h3>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">1. Google Analytics<\/h4>\n\n<p>Our website uses &#8220;Google Analytics&#8221;, a web analytics service provided by Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Ireland (&#8220;Google&#8221;). Google Analytics uses cookies, which are stored on your computer and enable your use of the website to be analyzed. The information generated by the cookie about your use of this website, such as browser type\/version, operating system used, referrer URL (the previously visited page), IP address, time of the server request are usually transmitted to a Google server in the USA and stored there.  <br\/><br\/>The information is used to carry out analyses of Internet and website usage, such as anonymized evaluations and graphs of page views and visits. The data is processed exclusively for market research, to optimize the website and to provide other services associated with Internet use. This information may also be transferred to third parties if this is required by law or if third parties process the data on our behalf. Under no circumstances will your IP address be merged with other Google data. The IP addresses are anonymized after transmission, so that an assignment is not possible (IP masking).    <br\/><br\/>Further information on data protection in connection with Google Analytics can be found in the Google Analytics Help: https:\/\/support.google.com\/analytics\/answer\/6004245?hl=de.<br\/><br\/>Google uses service providers in the United States whose level of data protection has been recognized as adequate under the EU\u2013US Data Privacy Framework and the European Commission\u2019s adequacy decision of July 10, 2023. Personal data may be transferred to these companies in accordance with Article 45 of the GDPR.<br\/><br\/>Data processing is based on your consent (Art. 6 para. 1 lit. a GDPR).<\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">2. Google Ads &amp; Doubleclick.net<\/h4>\n\n<p>We use the online advertising program Google Ads from Google and, as part of this, the conversion tracking offered by Google.<br\/><br\/>Using Google&#8217;s remarketing technology, users who have already visited our website and shown an interest are addressed again through targeted advertising on the pages of the Google Partner Network. Advertising is displayed through the use of cookies. With the help of text files, user behavior when visiting the website can be analyzed and then used for advertising according to your interests. If you carry out search queries, visit other websites or use other mobile apps, the use of Google Remarketing enables us to offer you targeted advertising based on your interests and needs. As a user, you benefit from personalized advertising on other websites. This is the only way we can constantly optimize our offer to you. Further information on Google Remarketing and Google&#8217;s privacy policy can be found at: https:\/\/www.google.com\/privacy\/ads\/.      <\/p>\n\n<p>A cookie for conversion tracking is stored on your computer when you click on an ad placed by us on the Google search or advertising network. These cookies lose their validity after 30 days and are not used for personal identification. If you visit certain pages of our website while the cookie is valid, both we and Google can recognize that you have clicked on an ad and have been redirected to this page.  <br\/><br\/>Each Google Ads customer receives a different cookie. The information collected using the conversion cookie is used to generate conversion statistics for us as an Ads customer. We learn the total number of users who clicked on our ad and were redirected to a page with a conversion tracking tag. However, we do not receive any information with which you can be personally identified as a user.   <br\/><br\/>If you do not wish to participate in the tracking process, you can also reject the setting of a cookie required for this &#8211; for example, by using a browser setting that generally deactivates the automatic setting of cookies. You can also deactivate cookies for conversion tracking by setting your browser to block cookies from the domain &#8220;www.googleadservices.com&#8221;. You can find Google&#8217;s privacy policy on conversion tracking here <a href=\"https:\/\/policies.google.com\/privacy?gl=de\">https:\/\/policies.google.com\/privacy?gl=de<\/a>  <br\/><br\/><strong>DoubleClick<\/strong> by Google uses cookies to present you with relevant advertisements. A pseudonymous identification number (ID) is assigned to your browser in order to check which ads have been displayed in your browser and which ads have been viewed. <\/p>\n\n<p>The cookies do not contain any personal information. The use of DoubleClick cookies only enables Google and its partner websites to place ads based on previous visits to our or other websites on the Internet. The information generated by the cookies is transmitted by Google to a server in the USA for analysis and stored there. Google will only transfer the data to third parties on the basis of statutory provisions or as part of order data processing. Google will not combine your data with other data collected by Google.    <br\/><br\/>Google uses suppliers in the USA whose level of data protection has been found to be adequate under the EU-US Data Privacy Framework and the European Commission&#8217;s adequacy decision of July 10, 2023. Personal data may be transferred to these companies in accordance with Art. 45 GDPR. Data processing is based on your consent (Art 6 para 1 lit a GDPR).  <\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">3. LinkedIn<\/h4>\n\n<p>You will find plugins from the social network LinkedIn or LinkedIn Ireland Unlimited Company, Wilton Place, Dublin 2, Ireland (hereinafter referred to as &#8220;LinkedIn&#8221;) on our website. You can recognize the LinkedIn plugins by the corresponding logo or the &#8220;Recommend&#8221; button. Please note that when you use the button, a connection is established between your internet browser and the LinkedIn server. LinkedIn is thus informed that our website has been visited with your IP address. If you click on the LinkedIn &#8220;Recommend&#8221; button while you are logged into your LinkedIn account, you have the option of linking content from our website to your LinkedIn profile page.<br\/>This allows LinkedIn to associate your visit to our website with you or your user account. Please note that we have no knowledge of the content of the transmitted data and its use by LinkedIn.     <\/p>\n\n<p>Further details on the collection of data and your legal options as well as setting options can be found on LinkedIn. These are available at <a href=\"https:\/\/de.linkedin.com\/legal\/privacy-policy\"><strong>https:\/\/de.linkedin.com\/legal\/privacy-policy<\/strong><\/a> are made available to you. <\/p>\n\n<p>LinkedIn Insight Tag:<br\/>The LinkedIn Insight Tag is a JavaScript code that has been integrated into our websites. It is a tracking tool that records and analyzes LinkedIn members on our website. This gives us insights into our target group, the attractiveness of our offers and the performance of advertising campaigns on LinkedIn.  <\/p>\n\n<p>The LinkedIn tag sets a cookie in the browser of the website visitor via which the following data is collected:<br\/>&#8211; URL<br\/>&#8211; Referrer URL<br\/>&#8211; Specification of your device<br\/>&#8211; Properties of your web browser<br\/>&#8211; Your IP address<\/p>\n\n<p>LinkedIn links this information to your LinkedIn account if you are logged in there, but anonymizes the data collected via the cookie after 7 days and deletes it completely after 90 days.<br\/>We do not receive any personal data of our visitors as a result and purpose of this data processing, but a report on the demographic distribution of our visitors and the performance of our ads on LinkedIn. <\/p>\n\n<p>LinkedIn uses suppliers in the USA whose level of data protection has been found to be adequate under the EU-US Data Privacy Framework and the European Commission&#8217;s adequacy decision of July 10, 2023. Personal data may be transferred to these companies in accordance with Art. 45 GDPR. Data processing is based on your consent (Art 6 para 1 lit a GDPR).  <\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">4. Facebook &amp; Instagram<\/h4>\n\n<p>Avenum operates a fan page integrated on the platform of the provider Meta Platforms Ireland Limited, 4 Grand Canal Square, Grand Canal Harbour, Dublin 2, Ireland (&#8220;Facebook&#8221;). Facebook operates social networks such as Instagram and Facebook, which provide Avenum with so-called &#8220;Page Insights&#8221; in joint processing in accordance with GDPR Art 26. <br\/>&#8220;Page Insights&#8221; are page statistics on &#8220;likes&#8221;, post reach and other topics that we primarily use on an anonymized basis. You can find more information on this under the following link: https:\/\/www.facebook.com\/business\/a\/page\/page-insights. <br\/><br\/>Details of the joint processing between Avenum and Facebook can be found at: https:\/\/www.facebook.com\/legal\/terms\/page_controller_addendum. This agreement states that Facebook has primary responsibility for the processing. If you have any concerns about security on our social media pages, you can also contact us at any time at our data protection contact address and we will forward your request to Facebook. We have no influence on the technical and organizational aspects of joint processing and can only influence the content relating to products and events.  <br\/><br\/>Facebook also uses sub-suppliers in the USA whose level of data protection has been found to be adequate under the EU-US Data Privacy Framework and the European Commission&#8217;s adequacy decision of July 10, 2023. Personal data may be transferred to these companies in accordance with Art. 45 GDPR. Data processing is based on your consent (Art 6 para 1 lit a GDPR).  <\/p>\n\n<h4 class=\"wp-block-heading has-small-plus-font-size\">5. Calendly<\/h4>\n\n<p>We use the appointment scheduling service &#8220;Calendly&#8221; from Calendly LLC (address: 3423 Piedmont Road NE, Atlanta, GA 30305, USA) on our website. Calendly makes it easy to manage appointments by allowing visitors to book available time slots online. This allows us to organize our service efficiently and offer you a user-friendly appointment booking.<br\/>When you access Calendly, you leave our website and a new browser window opens for the page of the independently responsible company Calendly. <br\/>When booking an appointment via Calendly, the following data is generally collected and processed:  <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Contact details<\/strong> (e.g. name, e-mail address, telephone number if applicable)<\/li>\n\n\n\n<li><strong>Further information provided voluntarily<\/strong> (e.g. in free text fields)<\/li>\n\n\n\n<li><strong>Appointment-related metadata<\/strong> (e.g. time of booking, booked time slot, IP address at the time of registration)<\/li>\n<\/ul>\n\n<p>The forwarding to this external website is based on your consent as part of your conclusive action to click on the external link. By submitting your data, you conclusively consent to the processing of your data for the administration of appointment bookings and optimized customer and communication support in accordance with Art. 6 para. 1 lit. a GDPR vis-\u00e0-vis Calendly.<br\/>The data will only be stored for as long as is necessary to fulfill the purpose of the data collection or as long as we are obliged to store it by law (e.g. tax and commercial obligations). B. tax and commercial law obligations).<br\/>Information about completed appointments (e.g. in the history or history of Calendly) will be deleted or anonymized as soon as it is no longer required for the purposes mentioned.   <br\/><strong>Data processing in third countries<\/strong>: Calendly is a company based in the USA. The level of data protection was found to be adequate under the EU-US Data Privacy Framework and the European Commission&#8217;s adequacy decision of 10.07.2023. Personal data may be transferred to these companies in accordance with Art. 45 GDPR.  <\/p>\n\n<p>All details on data processing at Calendly can be found at: <a href=\"https:\/\/calendly.com\/legal\/privacy-notice\">https:\/\/calendly.com\/legal\/privacy-notice<\/a><\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">M. Data forwarding<\/h3>\n\n<p>Avenum may arrange for your contact details to be passed on to one or more processors, such as an IT service provider, who will also use the personal data exclusively for internal purposes attributable to Avenum as the controller.<\/p>\n\n<p>We have contracts with all relevant processors that ensure that the provisions of the GDPR are also complied with by these service providers.<br\/>Data subject rights received by us are also forwarded to recipients of data for implementation in accordance with Art. 19 GDPR so that your rights can also be implemented there. <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">N. Legal basis for processing<\/h3>\n\n<p>The legal basis for the processing of personal data on our website is either our legitimate interest in providing you with information about our products and services or in acquiring you as a customer in the future, e.g. as a pre-contractual measure or to fulfill a contract with you as the data subject if an order has been placed that requires the delivery of goods. As a result, legal obligations for storage or presentation to authorities may themselves become the legal basis.<br\/>For all other processing, such as making appointments, we obtain your consent, which can be revoked at any time. <\/p>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"2-technisch-organisatorische-massnahmen-toms\"><strong>2. Technical and Organizational Measures (TOMs)<\/strong><\/h2>\n\n<p>We implement comprehensive measures to ensure the security of personal data processing. We are happy to provide you with an overview of our Technical and Organizational Measures (TOMs). <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>A. Confidentiality<\/strong><\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>Access control (physical access):<\/strong> Protection against unauthorized access to data processing facilities through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Keys<\/td><td>\u2612 Magnetic stripe or chip cards<\/td><\/tr><tr><td>\u2612 Electronic door openers<\/td><td>\u2612 Porter<\/td><\/tr><tr><td>\u2612 Security personnel<\/td><td>\u2612 Alarm systems<\/td><\/tr><tr><td>\u2612 Video surveillance system<\/td><td>\u2612 Burglary-resistant windows and\/or security doors<\/td><\/tr><tr><td>\u2612 Visitor registration with identity check<\/td><td>\u2612 Escorting visitors within company premises<\/td><\/tr><tr><td>\u2612 Zoning concept with graded security zones<\/td><td>\u2612 Controlled process and in case of loss of access authorizations<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Logical access control:<\/strong> Protection against unauthorized system use through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Personalized user accounts<\/td><td>\u2612 Checklists and standard processes for on-, off- and reboarding<\/td><\/tr><tr><td>\u2612 Central user management<\/td><td>\u2612 Minimum password requirements (including a corresponding policy)<\/td><\/tr><tr><td>\u2612 Defined procedure for password resets by IT<\/td><td>\u2612 Active Directory Single Sign-On (AD SSO) bei internen Anwendungen<\/td><\/tr><tr><td>\u2612 Two-factor authentication for applications that do not support SSO<\/td><td>\u2612 Encryption of storage media<\/td><\/tr><tr><td>\u2612 Locking mechanisms<\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Authorization control:<\/strong> Preventing unauthorized reading, copying, modification or removal within the system through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Standard permission profiles on a \u201eneed-to-know\u201d basis and role-based assignment of permissions<\/td><td>\u2612 On-, off- and re-boarding checklists for access rights adjustments<\/td><\/tr><tr><td>\u2612 Logging of access and regular log evaluations<\/td><td>\u2612 Clear desk \/ clear screen policy<\/td><\/tr><tr><td>\u2612 Trennung von produktiven Konten f\u00fcr Routinet\u00e4tigkeiten und Administrationskonten<\/td><td>\u2612 Periodic and event-driven review of assigned permissions, especially for administrative user accounts<\/td><\/tr><tr><td>\u2612 Asset handover protocols<\/td><td>\u2612 Central management of mobile devices<\/td><\/tr><tr><td>\u2612 Secure storage of storage media<\/td><td>\u2612 Data protection-compliant (re)use and disposal of storage media<\/td><\/tr><tr><td>\u2612 PIN-secured printing<\/td><td>\u2612 Use of only hardware, software and web services approved by IT<\/td><\/tr><tr><td>\u2612 Mobile device and remote working policies (BYOD prohibition, travel requirements)<\/td><td>\u2612 Use of shredders with security level 4<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Data classification scheme:<\/strong> Consistent classification and handling of information according to its confidentiality level through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Classification scheme with the levels public \/ internal \/ confidential \/ strictly confidential<\/td><td>\u2612 Classification-dependent rules for storage, transmission, deletion, disposal and use of cloud services<\/td><\/tr><tr><td>\u2612 Prohibition of removable media and public share areas for (strictly) confidential data<\/td><td>\u2612 Mandatory labeling of the confidentiality level on media<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>B. Data integrity<\/strong><\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>Transfer control:<\/strong> Preventing unauthorised reading, copying, modification or removal during electronic transmission or transport through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Encryption of storage media<\/td><td>\u2612 Encryption of files<\/td><\/tr><tr><td>\u2612 Virtual Private Networks (VPN)<\/td><td>\u2612 Electronic signature<\/td><\/tr><tr><td>\u2612 Rules for controlled sending of confidential information by email<\/td><td>\u2612 Data Loss Prevention (DLP) for cloud and email services<\/td><\/tr><tr><td>\u2612 Transport encryption (TLS, HTTPS)<\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Input control:<\/strong> Determining whether and by whom personal data have been entered, modified or deleted in data processing systems through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Logging of creation, modification, versioning and deletion processes<\/td><td>\u2612 Document management with a controlled life cycle<\/td><\/tr><tr><td>\u2612 User-specific accounts<\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>System and configuration integrity: <\/strong>Ensuring correctness and protection against manipulation of systems and configurations through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Central administration and monitoring of clients and servers<\/td><td>\u2612 Regular system audits<\/td><\/tr><tr><td>\u2612 At least daily automatic updates of endpoint protection<\/td><td>\u2612 At least weekly full scans on all protected systems<\/td><\/tr><tr><td>\u2612 Use of a central patch and compliance management system<\/td><td>\u2612 Separation of test and production environments<\/td><\/tr><tr><td>\u2612 Secure software development lifecycle (Git, OWASP, code reviews)<\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>C. Availability and Resilience<\/strong><\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>Availability control: <\/strong>Protection against accidental or malicious destruction or loss through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Redundant backup strategy (online\/offline; on-site\/off-site)<\/td><td>\u2612 Uninterruptible power supply<\/td><\/tr><tr><td>\u2612 Endpoint security (anti-malware, antivirus, email scans)<\/td><td>\u2612 Redundant firewalls \/ switches<\/td><\/tr><tr><td>\u2612 Reporting channels and emergency plans<\/td><td>\u2612 Network segmentation (VLAN)<\/td><\/tr><tr><td>\u2612 Multi-level backup concept with encrypted offsite storage of backups in a disaster recovery data center<\/td><td>\u2612 Security checks at infrastructure and application level<\/td><\/tr><tr><td>\u2612 Established threat intelligence process<\/td><td>\u2612 Capacity and resource monitoring<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>D. Procedures for Regular Review, Assessment and Evaluation<\/strong><\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>Personnel and stakeholders:<\/strong> Ensuring adequate awareness, behaviour and involvement of all relevant persons in the ISMS through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Workflows, processes and employee suitability are reviewed annually<\/td><td>\u2612 Training plan on information security and data protection with defined frequencies and effectiveness measurements<\/td><\/tr><tr><td>\u2612 Disciplinary rules for personnel in case of security violations<\/td><td>\u2612 Risk-based personnel screening<\/td><\/tr><tr><td>\u2612 Regular review and update of interested parties and their requirements<\/td><td>\u2612 Regular management review of the ISMS<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Incident response management<a>:<\/a> <\/strong>Enabling rapid detection, structured handling and evaluation of security incidents and emergencies through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Scenario-based emergency and recovery measures<\/td><td>\u2612 Restorability and restore tests<\/td><\/tr><tr><td>\u2612 Defined communication and reporting channels to authorities, customers and CERTs<\/td><td>\u2612 Documentation of all incidents including evaluation, lessons learned and risk analysis<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Processing control:<\/strong> No processing on behalf of a controller within the meaning of Art. 28 GDPR without corresponding instructions from the controller, ensured through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Clear contractual agreements<\/td><td>\u2612 Formalized contract management<\/td><\/tr><tr><td>\u2612 Strict selection of processors (ISO certification, ISMS)<\/td><td>\u2612 Prior verification obligation<\/td><\/tr><tr><td>\u2612 Use exclusively of approved infrastructure and cloud providers<\/td><td>\u2612 Planned evaluations, audits and technical assessments<\/td><\/tr><tr><td>\u2612 Documented exit strategies when terminating contracts<\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Supplier management:<\/strong> Risk-based selection, assessment and ongoing monitoring of security-relevant suppliers through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Risk-based selection, classification and documentation of suppliers<\/td><td>\u2612 Supplier self-assessment questionnaire on information security<\/td><\/tr><tr><td>\u2612 Supplier audits and risk assessment<\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<ul class=\"wp-block-list\">\n<li><strong>Privacy-friendly default settings: <\/strong>Implementing privacy-friendly default configurations according to the \u201cprivacy by default\u201d principle through:<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2612 Pre-defined retention periods for logs and documents<\/td><td>\u2612 Procedures based on laws recorded in the legal register<\/td><\/tr><tr><td>\u2612 Storage of GDPR-relevant data within the EU\/EEA including backups <\/td><td>\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"3-informationssicherheit-iso-iec-27001-2022\"><strong>3. Information Security &amp; ISO\/IEC 27001:2022<\/strong><\/h2>\n\n<p>Avenum EDI Service Partners is certified in accordance with ISO\/IEC 27001:2022. You can access the certificate at <a href=\"https:\/\/www.certipedia.com\/certificates\/01+153+2500532?locale=de\">https:\/\/www.certipedia.com\/certificates\/01+153+2500532?locale=de.<\/a> The certification was carried out by T\u00dcV Rheinland AG. Scope: EDI Service Provider for the implementation, provisioning, and operation of conversion and communication services.<\/p>\n\n<p>ISO\/IEC 27001 is the internationally recognized standard for Information Security Management Systems (ISMS). The certification confirms that an effective ISMS has been implemented at Avenum and is actively practiced. It demonstrates a systematic approach to risk management as well as the secure handling of sensitive information, taking confidentiality, integrity, and availability into account.  <\/p>\n\n<p>You are welcome to state that you handle your electronic data interchange via Avenum EDI Service Partners and to mention our ISO\/IEC 27001 certification.<\/p>\n\n<p><strong>Contact:<\/strong><\/p>\n\n<div class=\"wp-block-media-text is-stacked-on-mobile is-vertically-aligned-center round-image\" style=\"grid-template-columns:28% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"855\" height=\"944\" src=\"https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS.jpg\" alt=\"Avenum ISMS\" class=\"wp-image-6613 size-full\" srcset=\"https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS.jpg 855w, https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS-272x300.jpg 272w, https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS-768x848.jpg 768w\" sizes=\"auto, (max-width: 855px) 100vw, 855px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-small-plus-font-size\" style=\"border-style:none;border-width:0px;border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">Herbert Ferstl<br\/>CISO<br\/>E-Mail: <a href=\"mailto:ciso@avenum.com\">ciso@avenum.com<\/a><br\/>Tel: +43 1 92101-0<br\/><a href=\"mailto:ciso@avenum.com\"><\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>1. Data Protection (GDPR) 2. Technical and Organizational Measures (TOMs) 3. Information Security &amp; ISO\/IEC 27001:2022 1. Data Protection (GDPR) A. General information Thank you for your interest in our company. Data protection is of a very high priority for the management of Avenum. The use of Avenum&#8217;s website is essentially possible without providing any [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"slim_seo":{"title":"Privacy policy","description":"Data protection is important to us \u279c Here you will find all information about data protection and how we handle your data."},"footnotes":""},"folder":[9],"class_list":["post-3241","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy policy - EDI Service Partners<\/title>\n<meta name=\"description\" content=\"Data protection is important to us \u279c Here you will find all information about data protection and how we handle your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/edi-service.partners\/en\/privacy-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy policy - EDI Service Partners\" \/>\n<meta property=\"og:description\" content=\"Data protection is important to us \u279c Here you will find all information about data protection and how we handle your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/edi-service.partners\/en\/privacy-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"EDI Service Partners\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ediservicepartners\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-21T13:00:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"855\" \/>\n\t<meta property=\"og:image:height\" content=\"944\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"28 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/\",\"url\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/\",\"name\":\"Privacy policy - EDI Service Partners\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/edi-service.partners\\\/wp-content\\\/uploads\\\/Avenum-ISMS.jpg\",\"datePublished\":\"2023-05-09T14:37:05+00:00\",\"dateModified\":\"2026-01-21T13:00:04+00:00\",\"description\":\"Data protection is important to us \u279c Here you will find all information about data protection and how we handle your data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/edi-service.partners\\\/wp-content\\\/uploads\\\/Avenum-ISMS.jpg\",\"contentUrl\":\"https:\\\/\\\/edi-service.partners\\\/wp-content\\\/uploads\\\/Avenum-ISMS.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/privacy-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/\",\"name\":\"EDI Service Partners\",\"description\":\"Your partners for EDI solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/#organization\",\"name\":\"Avenum Technologie GmbH and Avedium Technologie GmbH\",\"url\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/edi-service.partners\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/edi-service.png\",\"contentUrl\":\"https:\\\/\\\/edi-service.partners\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/edi-service.png\",\"width\":1580,\"height\":250,\"caption\":\"Avenum Technologie GmbH and Avedium Technologie GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/edi-service.partners\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ediservicepartners\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ediservice\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy policy - EDI Service Partners","description":"Data protection is important to us \u279c Here you will find all information about data protection and how we handle your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/edi-service.partners\/en\/privacy-policy\/","og_locale":"en_US","og_type":"article","og_title":"Privacy policy - EDI Service Partners","og_description":"Data protection is important to us \u279c Here you will find all information about data protection and how we handle your data.","og_url":"https:\/\/edi-service.partners\/en\/privacy-policy\/","og_site_name":"EDI Service Partners","article_publisher":"https:\/\/www.facebook.com\/ediservicepartners","article_modified_time":"2026-01-21T13:00:04+00:00","og_image":[{"width":855,"height":944,"url":"https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"28 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/edi-service.partners\/en\/privacy-policy\/","url":"https:\/\/edi-service.partners\/en\/privacy-policy\/","name":"Privacy policy - EDI Service Partners","isPartOf":{"@id":"https:\/\/edi-service.partners\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/edi-service.partners\/en\/privacy-policy\/#primaryimage"},"image":{"@id":"https:\/\/edi-service.partners\/en\/privacy-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS.jpg","datePublished":"2023-05-09T14:37:05+00:00","dateModified":"2026-01-21T13:00:04+00:00","description":"Data protection is important to us \u279c Here you will find all information about data protection and how we handle your data.","breadcrumb":{"@id":"https:\/\/edi-service.partners\/en\/privacy-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/edi-service.partners\/en\/privacy-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edi-service.partners\/en\/privacy-policy\/#primaryimage","url":"https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS.jpg","contentUrl":"https:\/\/edi-service.partners\/wp-content\/uploads\/Avenum-ISMS.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/edi-service.partners\/en\/privacy-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/edi-service.partners\/en\/"},{"@type":"ListItem","position":2,"name":"Privacy policy"}]},{"@type":"WebSite","@id":"https:\/\/edi-service.partners\/en\/#website","url":"https:\/\/edi-service.partners\/en\/","name":"EDI Service Partners","description":"Your partners for EDI solutions","publisher":{"@id":"https:\/\/edi-service.partners\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/edi-service.partners\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/edi-service.partners\/en\/#organization","name":"Avenum Technologie GmbH and Avedium Technologie GmbH","url":"https:\/\/edi-service.partners\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edi-service.partners\/en\/#\/schema\/logo\/image\/","url":"https:\/\/edi-service.partners\/wp-content\/uploads\/2023\/05\/edi-service.png","contentUrl":"https:\/\/edi-service.partners\/wp-content\/uploads\/2023\/05\/edi-service.png","width":1580,"height":250,"caption":"Avenum Technologie GmbH and Avedium Technologie GmbH"},"image":{"@id":"https:\/\/edi-service.partners\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ediservicepartners","https:\/\/www.linkedin.com\/company\/ediservice"]}]}},"_links":{"self":[{"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/pages\/3241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/comments?post=3241"}],"version-history":[{"count":9,"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/pages\/3241\/revisions"}],"predecessor-version":[{"id":6640,"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/pages\/3241\/revisions\/6640"}],"wp:attachment":[{"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/media?parent=3241"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/edi-service.partners\/en\/wp-json\/wp\/v2\/folder?post=3241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}