Privacy Policy
The protection of Users’ privacy is of particular importance to us. Therefore, Users of the website [Insert name of the website to which this document applies] are guaranteed the highest standards of privacy protection. INMAGO Limited Liability Company, as the controller of personal data, ensures the security of the personal data provided by Users.
Taking the above into consideration, and in light of the requirements introduced by Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation – GDPR), this Privacy Policy has been adopted by INMAGO Limited Liability Company to ensure the security of personal data.
This Privacy Policy defines the rules for processing and protecting personal data provided by Users in connection with their use of the website and other related sites, communications, and services.
A User is any individual whose data is processed and who uses the website or related services (hereinafter referred to as the “User”).
The controller of personal data on the website is INMAGO Limited Liability Company, registered at ks. Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, Poland, NIP: 7831760467, REGON: 367568897 (hereinafter referred to as the “Controller”).
To the extent necessary for the performance of a contract concluded between the User and the Controller, or to take action upon the User’s request, or to comply with legal obligations imposed on the Controller – the processing of the User’s personal data is based on legal provisions, specifically Article 6(1)(b) and (c) of the GDPR, and does not require the User’s consent. In all other cases, providing personal data is voluntary. However, where consent is granted solely for marketing purposes, failure to provide such consent, or its withdrawal, will prevent the Controller from informing the User about new offers.
I. USER CONSENT
By using the website, the User accepts that the Controller collects, uses, and discloses both personal and non-personal data in accordance with this Privacy Policy. The User retains control over the use and disclosure of their data, as described in Section V “User Rights”.
Where the processing is based on the User’s consent, the User has the right to withdraw their consent at any time. Withdrawal of consent does not affect the lawfulness of the processing carried out prior to the withdrawal. The Controller shall inform the User about this right before consent is given.
If changes are made to this Privacy Policy and the User continues to use the website, such continued use shall be deemed acceptance of the updated Privacy Policy.
II. PERSONAL DATA PROCESSED BY THE CONTROLLER
1. Methods of Obtaining Personal Data
a. Data provided directly by the User
The Controller obtains personal data directly from the User through:
- messages sent via the contact form on the website,
- account creation on the website,
- use of services and products offered by the Controller,
- communications initiated by the User for technical support.
b. Data obtained from other sources
The Controller may also collect personal data from sources other than the User, such as:
- cookies and similar technologies recording User activity,
- data brokers providing demographic data,
- service providers offering IP-based geolocation data,
- business partners engaged in joint marketing or service offerings,
- publicly accessible sources such as registers or domain directories.
2. Types of Data Processed
The scope of collected data depends on the purpose of processing and may include:
- login name,
- full name / business name / name of sole trader(s),
- correspondence address,
- website URL,
- telephone number,
- email address,
- tax identification number (NIP),
- business ID (REGON),
- IP address,
- payment details if purchases are made.
The Controller may also collect content of files and messages, including:
- subject and body of emails,
- instant messages,
- audio or video recordings,
- voicemail transcripts,
- dictated messages,
- reviews, feedback, technical support content.
III. PURPOSES OF PROCESSING PERSONAL DATA
The way the Controller processes data depends on the User’s engagement with its products and services. Specific purposes may include:
- Service Delivery (Contract Performance)
To authenticate, authorize, and deliver services. In the case of paid services, data is used to conclude and perform the service agreement. - Communication (Contract Performance / Legitimate Interest)
For personalized messages (email, website notifications, push notifications) about service availability, usage, security, and promotional offers. Also includes customer service support. - Marketing (Consent / Legitimate Interest)
To deliver tailored advertisements, based on:
- User-provided data,
- usage data,
- third-party insights,
- cookies, beacons, tags, mobile identifiers.
Data is not shared with third-party advertisers unless the User consents. Clicking on ads may inform advertisers.
- Service Improvement (Legitimate Interest)
For analytics, feature development, audience growth, user engagement, market research, and economic analysis. - Security (Legitimate Interest)
To detect, prevent, and address fraud, abuse, or security risks. In cases of suspected criminal activity, personal data may be used for investigation. - Claims and Disputes (Legitimate Interest)
To pursue claims or review compliance with service terms. - Accounting Obligations (Legal Requirement)
To meet legal accounting and tax obligations for paid services.
IV. SHARING OF PERSONAL DATA
User data may be disclosed to:
a. advertising or marketing service providers, for direct marketing of the Controller’s services,
b. legal and advisory firms or debt collection companies,
c. subcontractors processing data on behalf of the Controller,
d. public authorities entitled to request such data under applicable law.
V. USER RIGHTS
Users have control over their personal data. However, restricting access to data may limit the ability to use some services.
Requests can be made by contacting the Controller via email or post.
1. Right of Access – to confirm whether and how personal data is processed and to receive a copy.
2. Right to Rectification – to correct inaccurate or incomplete personal data.
3. Right to Erasure (Right to be Forgotten) – under certain conditions (e.g., data no longer necessary, consent withdrawn, illegal processing).
4. Right to Restriction of Processing – e.g., when data accuracy is contested, processing is unlawful, or objections are raised.
5. Right to Data Portability – to receive and transfer personal data in a structured format.
6. Right to Object – to processing based on public interest, legitimate interest, or direct marketing.
7. Right to Lodge a Complaint – with a supervisory authority (e.g., Personal Data Protection Office in Poland).
8. Right Not to Be Subject to Automated Decision-Making (Including Profiling) – unless necessary for a contract, authorized by law, or based on explicit consent.
VI. COOKIES AND OTHER TECHNOLOGIES
The Controller uses cookies and similar technologies to:
- enhance site efficiency,
- personalize services,
- display targeted ads.
Cookies are text files linked to HTTP requests sent to the Controller’s server. They do not modify User devices or software configurations.
Data from cookies is considered personal only when linked to identifiable information.
Users can manage cookies through browser settings or opt-out tools.
Details are available in the Cookie Policy at [insert link].
VII. OTHER IMPORTANT INFORMATION
1. Data Security
Technical and organizational safeguards are implemented, including access restrictions, monitoring, and secure infrastructure.
2. Data Retention
Duration depends on the purpose, including:
- analytics/statistics: as needed for site development,
- service delivery: contract term + claims limitation period,
- accounting: as per legal obligations,
- marketing: during business relationship, unless objected.
After expiry, data may be stored for legal protection purposes.
3. Privacy Policy Updates
Updates may be made to reflect legal or operational changes. Users will be notified of significant changes via the website or direct communication.
4. Contact Information
For privacy inquiries, Users may contact:
- via email: biuro@inmago.pl
- by post: INMAGO Sp. z o.o. Sp. k., ks. Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, Poland.
REGULATIONS ON PERSONAL DATA PROTECTION
applicable at
INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP
PREAMBLE
INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP, in the course of its business operations, makes every effort to meet the highest standards ensuring the proper provision of services in accordance with the applicable laws and universally binding regulations.
With this in mind and in light of the requirements introduced by Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation – GDPR), this Personal Data Protection Policy has been adopted by INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP to ensure the correct handling of personal data in all operations involving their processing.
This document has been developed following an internal GDPR audit in which INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP was classified as the Data Controller processing information considered personal data within the meaning of the aforementioned EU Regulation.
This document is addressed by INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP to all cooperating entities, contractors, and current or potential clients to present the scope of protection and the scale of undertaken actions concerning any processes directly or indirectly related to personal data processing.
CHAPTER I – DEFINITIONS
For the purposes of these Regulations:
- The Data Controller is INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP, address: Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, NIP: 7831760467, REGON: 367568897, which alone or jointly with others determines the purposes and means of the processing of personal data (hereinafter referred to as the “Controller”);
- The Data Protection Officer (DPO) is a person appointed by the Controller, responsible for monitoring compliance with the GDPR, other Union or Member State data protection laws, and the Controller’s internal policies in the area of personal data protection (hereinafter referred to as “DPO”);
- A Processor is a natural or legal person, public authority, agency or other body which processes personal data on behalf of the Controller;
- Personal data means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, identification number, location data, online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that person;
- A Data set is a structured set of personal data accessible according to specific criteria, regardless of whether the set is centralized, decentralized, or functionally or geographically dispersed;
- Processing means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction;
- Data disclosure means the act of making personal data available by the Controller to a third party, without specifying the purpose or manner of processing;
- Data outsourcing means the act of entrusting personal data by the Controller to a third party for processing on behalf of the Controller for the purpose and in the manner specified by the Controller;
- Voluntary action by the Controller means any action based on a decision made by the Controller without a legal obligation and at the Controller’s discretion;
- The Act refers to the Personal Data Protection Act of 10 May 2018 (Journal of Laws 2018, item 1000, as amended);
- The GDPR is Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (Journal of Laws EU L 2016.119.1 of 4 May 2016), also referred to herein as the GDPR Regulation.
Świetnie! Poniżej kontynuuję pełne tłumaczenie dokumentu, zaczynając od Chapter II – General Provisions. Ponieważ dokument jest obszerny, tłumaczenie będzie podzielone na kolejne części, każda oznaczona odpowiednim nagłówkiem:
CHAPTER II – GENERAL PROVISIONS
- These Personal Data Protection Regulations constitute a set of rules and procedures governing the processing of personal data and the handling of such data within the Controller’s enterprise, regardless of whether the data is in electronic or paper form, and regardless of the method or medium of recording or storage.
- The provisions contained herein define the Controller’s direction of action and support to ensure the security of personal data, specifically:
- establishing the rules for the management, protection, and processing of personal data;
- defining standards to ensure the proper and secure operation of all systems used for processing personal data and information flow within the Controller’s enterprise.
- The legal basis for the development and implementation of these Personal Data Protection Regulations consists of legal acts applicable on the date of adoption of this document, including in particular:
- The Personal Data Protection Act of 10 May 2018 (Journal of Laws 2018, item 1000);
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation – GDPR) (OJ EU L 2016.119.1 of 4 May 2016).
- The full documentation constituting the personal data protection system within the Controller’s enterprise includes:
- Personal Data Protection Regulations;
- Personal Data Security Policy with annexes;
- IT System Management Instruction for the processing of personal data with annexes.
- If additional, detailed regulation concerning personal data security within the Controller’s enterprise is required, supplementary documentation may be introduced to cover the necessary scope.
Dziękuję! Kontynuuję tłumaczenie od Chapter III – Data Controller:
CHAPTER III – DATA CONTROLLER
- Taking into account the nature, scope, context, and purposes of the processing as well as the risk of infringement on the rights or freedoms of natural persons—with varying probability and severity—the Controller, in accordance with paragraph 3 of this section, ensures the implementation and use of appropriate technical and organizational measures so that the processing of data is carried out in accordance with applicable laws.
- The technical and organizational measures referred to in paragraph 1 include the implementation by the Controller of proper documentation required by applicable regulations, in particular the personal data security policy, as well as exercising due diligence to ensure that individual contracts are concluded and applied with external entities to whom the Controller has, even partially, outsourced data. These measures also include recording activities involving the disclosure of data.
- When implementing and applying the appropriate technical and organizational measures, the Controller takes into account the state of technical knowledge, implementation costs, and the nature, scope, context, and purposes of the processing, as well as the risks to the rights or freedoms of natural persons with varying probability and severity resulting from the processing.
- The Controller will make every effort, within the scope of applied solutions, to ensure effective protection of personal data and necessary safeguards for their processing.
- In cases where a joint purpose and method of processing data are agreed upon with another data controller, the Controller ensures that the necessary arrangements are made, clearly defining the scope of its responsibility and the relationship between it and the other controller, as well as with the data subjects. The Controller also undertakes necessary actions and measures in this regard.
Świetnie! Oto tłumaczenie kolejnego fragmentu:
CHAPTER IV – DATA PROCESSOR
- The Controller may outsource data for processing on its behalf. The Controller verifies the Data Processor to ensure that the entity provides sufficient guarantees to implement appropriate technical and organizational measures so that the processing assigned by the Controller complies with applicable laws and protects the rights of data subjects.
- The Controller outsources data to a Data Processor based on a contract or another legal instrument that is binding for both the Processor and the Controller. This agreement or instrument must include, in particular:
- The subject matter and duration of the processing,
- The nature and purpose of the processing,
- The type of personal data to be processed,
- The categories of data subjects,
- The obligations and rights of the Controller.
Super! Poniżej znajdziesz tłumaczenie Chapter V – Record of Processing Activities:
CHAPTER V – RECORD OF PROCESSING ACTIVITIES
- The Controller, on its own initiative and whenever required by applicable law, ensures the maintenance of a record of personal data processing activities. This record may be kept in written or electronic form, and the Controller may use dedicated software to manage it.
- The Controller ensures that the following information is included in the record of processing activities:
- The name and contact details of the Controller, any joint controllers, and the DPO (if appointed);
- The purposes of processing;
- A description of the categories of data subjects and of the categories of personal data;
- The categories of recipients to whom personal data have been or will be disclosed, including recipients in third countries or international organizations;
- Where applicable, transfers of personal data to a third country or an international organization, including the name of the third country or international organization;
- If possible, the envisaged time limits for erasure of the different categories of data;
- If possible, a general description of the technical and organizational security measures.
- The Controller also ensures that the Data Processor is obliged to keep a record of all categories of processing activities carried out on behalf of the Controller.
Świetnie! Oto tłumaczenie Rozdziału VI – Upoważnienie do przetwarzania danych osobowych na język angielski:
CHAPTER VI – AUTHORIZATION TO PROCESS PERSONAL DATA
- The Controller ensures that, within its enterprise, personal data are processed exclusively by persons who have been granted authorization to process such data, issued by the Controller in accordance with internal regulations specifying detailed procedures for access to personal data.
- The Controller ensures that persons authorized to process personal data possess the necessary knowledge and skills in this regard, and that the duration and scope of data processing performed by these persons is consistent with the content of the authorization granted by the Controller.
- In accordance with internal regulations applicable within the Controller’s enterprise, the Controller issues, records, and stores personalized authorizations for the processing of personal data, as well as revoked authorizations.
- The Controller ensures that all persons processing personal data are aware of their obligation to maintain the confidentiality of any data they access and that this obligation is confirmed in writing by such persons.
- The Controller ensures that authorized personnel perform all data processing activities in compliance with the organizational and technical measures in place within the Controller’s enterprise that are dedicated to the security and protection of personal data from unauthorized access, modification, or destruction.
Świetnie! Oto tłumaczenie Rozdziału VII – Inspektor ochrony danych na język angielski:
CHAPTER VII – DATA PROTECTION OFFICER (DPO)
- Within the Controller’s enterprise, there are no grounds requiring the appointment of a Data Protection Officer (DPO), because:
- The Controller’s main activity does not consist of processing operations which, by virtue of their nature, scope, or purposes, require regular and systematic monitoring of data subjects on a large scale;
- The Controller’s main activity does not involve large-scale processing of special categories of personal data or data relating to criminal convictions and offenses.
- In view of point 1 above, and in the absence of a legal obligation to appoint a DPO, the Controller ensures the possibility of direct contact with the Controller on all matters concerning the protection of personal data by providing relevant contact details, including an email address or phone number.
- The Controller may, on its own initiative, appoint a DPO. In such a case, the Controller ensures the publication of the DPO’s contact details and notifies the competent data protection supervisory authority of the appointment, in accordance with the applicable legal regulations at the time of the appointment.
- If the Controller appoints a DPO in accordance with point 3 above, the Controller ensures that the DPO performs their tasks with due consideration of the risks associated with processing operations, taking into account the nature, scope, context, and purposes of the processing.
Świetnie! Oto tłumaczenie Rozdziału VIII – Podstawy przetwarzania danych osobowych na język angielski:
CHAPTER VIII – LEGAL BASES FOR PERSONAL DATA PROCESSING
The Controller ensures that within the scope of its enterprise, all operations involving the processing of personal data are carried out in accordance with the following principles:
- Personal data is processed lawfully, fairly, and in a transparent manner in relation to the data subject;
- Personal data is collected for specified, explicit, and legitimate purposes and not further processed in a manner that is incompatible with those purposes;
- Personal data is adequate, relevant, and limited to what is necessary in relation to the purposes for which it is processed;
- Personal data is accurate and, where necessary, kept up to date; the Controller takes all reasonable steps to ensure that inaccurate personal data, having regard to the purposes for which they are processed, is erased or rectified without delay;
- Personal data is kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data is processed; personal data may be stored for longer periods if it is processed solely for archiving purposes in the public interest, scientific or historical research purposes, or statistical purposes, subject to appropriate technical and organizational measures required by law to safeguard the rights and freedoms of data subjects;
- Personal data is processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction, or damage, using appropriate technical or organizational measures.
- The Controller ensures that personal data is processed for specific purposes and within a specific scope if:
- The data subject has given consent to the processing of their personal data for one or more specific purposes;
- Processing is necessary for the performance of a contract to which the data subject is a party, or in order to take steps at the request of the data subject prior to entering into a contract;
- Processing is necessary for compliance with a legal obligation to which the Controller is subject;
- Processing is necessary in order to protect the vital interests of the data subject or of another natural person;
- Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the Controller;
- Processing is necessary for the purposes of the legitimate interests pursued by the Controller or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data, in particular where the data subject is a child.
- The Controller ensures that, unless explicitly authorized by law, its enterprise does not process personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, as well as genetic data, biometric data for the purpose of uniquely identifying a natural person, or data concerning the data subject’s health, sex life, or sexual orientation.
- The Controller ensures that all personal data processed by it is obtained in compliance with the applicable laws, whether directly from the data subject or by other lawful means.
Super! Oto tłumaczenie:
CHAPTER IX – RIGHTS OF DATA SUBJECTS
- The Controller ensures that the collection of personal data is carried out in accordance with the applicable legal provisions and, in particular, that the data subject is provided with all the information required by law.
- The Controller ensures that each data subject has the right, under the GDPR, to exercise control over their personal data.
- A data subject, at every stage of the processing of their personal data, is granted a number of rights allowing them to:
- access their personal data,
- verify the correctness of data processing,
- correct their data,
- object to the processing,
- request restriction of processing,
- request the transfer of their personal data.
Świetnie! Oto tłumaczenie Rozdziału X – Techniczne oraz organizacyjne środki ochrony danych osobowych:
CHAPTER X – TECHNICAL AND ORGANIZATIONAL MEASURES FOR PERSONAL DATA PROTECTION
- The Controller ensures that appropriate technical and organizational data protection measures are implemented, in particular that documents containing personal data, whether in electronic or paper form, are stored in properly secured buildings and premises.
- If, in fulfilling the obligation outlined above, the Controller decides to store documentation containing personal data in rooms locked with a key, the Controller shall ensure, in particular, that:
- appropriate control and verification measures are implemented regarding access to buildings and rooms where personal data is processed;
- keys to such rooms are issued directly by the Controller or another responsible person only to individuals authorized to access those areas;
- internal regulations applicable within the Controller’s enterprise, in cases where the Controller owns the building, require that key holders issue keys only to individuals authorized to access those rooms;
- internal regulations ensure that any person responsible for issuing keys, regardless of ownership, provides access only to authorized individuals;
- for leased or used buildings and premises, internal rules ensure that keys to rooms with personal data are given only to authorized individuals;
- procedures are in place requiring any person who has lost access keys to promptly report this to the Controller or their designated representative.
- The Controller ensures that detailed access control rules for all areas where personal data is processed are defined in the internal procedures applicable within the enterprise.
- The Controller ensures that appropriate internal procedures are implemented, instructing proper behavior when handling documents containing personal data, specifically that:
- if multifunction devices are used to copy or scan documents containing personal data, such documents and their copies are removed from the device immediately after use;
- when sending documents containing personal data electronically, special caution is exercised, including encryption if appropriate;
- authorized persons, after processing documents, store them and any digital media in dedicated secure locations;
- paper documents containing personal data that are no longer needed are destroyed safely, e.g., with a shredder.
- The Controller ensures that internal procedures cover the secure destruction of documents containing personal data. The Controller may use a professional document destruction service (based on a proper agreement in accordance with Chapter IV of these Regulations).
- The Controller ensures that each person authorized to process personal data within the enterprise is aware of applicable data protection regulations.
- Where necessary, the Controller provides training to authorized individuals on the safe use of devices and software related to personal data processing, as well as on how to secure locations where documents are stored.
- Detailed physical, technical, and organizational data protection measures are included in internal documents, in particular in the Data Security Policy and IT System Management Instructions.
Super! Przechodzimy więc do tłumaczenia Rozdziału XI – Procedura postępowania w przypadku naruszenia bezpieczeństwa danych osobowych:
CHAPTER XI – PROCEDURE IN CASE OF PERSONAL DATA SECURITY BREACH
- The Controller ensures the development and implementation of a procedure for handling personal data security breaches within the enterprise. This procedure regulates, in particular:
- the reduction of similar incidents occurring in the future;
COOKIES POLICY
applicable to the website operated by
INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP
We use cookies to improve efficiency and offer the User increasingly refined functionalities of our website, as well as content more tailored to the User. To ensure transparency of actions, this Cookie Policy is adopted to define the detailed rules of using cookies by the website.
Data collected via cookies is processed by INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP, address: Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, NIP: 7831760467, REGON: 367568897.
A User is any individual whose data is processed, using our website and other associated sites, communication, and services (hereinafter referred to as the “User”).
I. COOKIES
Cookies are small fragments of code—text files corresponding to HTTP requests sent to our server. These files are saved by every browser used by the User to visit our site. The information contained in cookies allows us to understand how Users use our site.
We use cookies to ensure optimal service for Users during their visit and to enable faster and easier access to information. The storage or retrieval of information does not alter the configuration of the User’s device or installed software.
The information in cookies is considered personal data only when combined with other personal data available about a given User. We collect only anonymous data through cookies, used to improve the portal experience and reduce advertising intrusiveness. We do not collect any data that could identify the User.
II. TYPES OF COOKIES
Our website uses two types of cookies:
- Session cookies – Temporary files that remain on the User’s device until they leave the site or close their browser. These cookies are automatically deleted.
- Persistent cookies – These remain on the User’s device for a specified time period as set in the cookies’ parameters or until manually deleted.
III. PURPOSES OF USING COOKIES
We use cookies to recognize the User during their visits, remember their preferences, and display relevant, personalized content. Cookies make interactions with our services faster and more efficient. They also allow us to present content without the need for surveys.
Cookies on our site are used for the following purposes:
- Authentication – To recognize the User on our website. These cookies allow navigation without the need to log in on every page and show relevant information based on preferences.
- Analytics and statistics – For continuous improvement of our products and services, offering better solutions, and adding new features.
- Preferences and settings – To remember the site settings and configurations, including layout and preferred language.
- Advertising – To provide both general and personalized ads to the User.
IV. DISABLING COOKIES
Web browsers allow cookies by default. If the User does not wish to receive cookies, they can change their browser settings. Continued use of the website without changing settings implies consent to receive all cookies from our site.
Most browsers allow the User to view and delete cookies, including those on our site. However, disabling cookies may affect full and proper use of our services.
If the User accesses our website from multiple devices (e.g., computer, smartphone, tablet), each browser must be individually configured for cookie preferences.
Below are instructions for disabling cookies in popular browsers:
- Google Chrome
Go to Settings → Advanced → Privacy and security → Content settings → Cookies
You can choose: Block all cookies, Block third-party cookies.
More: Google Chrome Help - Mozilla Firefox
Go to Menu → Options → Privacy → Use custom settings for history → Adjust cookie settings.
More: Firefox Help - Safari
Go to Safari Menu → Preferences → Privacy
Choose from: Always block, Allow from current website only, Allow from websites I visit, Always allow.
More: Safari Help - Opera
Go to Settings → Preferences → Advanced → Cookies
Options: Accept all cookies, Accept only from the site I visit, Never accept cookies.
More: Opera Help - Internet Explorer
Go to Tools → Internet Options → Privacy tab → Adjust slider for cookie handling.
More: Internet Explorer Help
V. CONTACT INFORMATION
If you have any concerns or require information regarding this Cookie Policy, you may contact the Controller via the official company email address for data protection matters or another general contact email, as well as by post at the Controller’s registered address.
The protection of Users’ privacy is of particular importance to us. Therefore, Users of the website [Insert name of the website to which this document applies] are guaranteed the highest standards of privacy protection. INMAGO Limited Liability Company, as the controller of personal data, ensures the security of the personal data provided by Users.
Taking the above into consideration, and in light of the requirements introduced by Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation – GDPR), this Privacy Policy has been adopted by INMAGO Limited Liability Company to ensure the security of personal data.
This Privacy Policy defines the rules for processing and protecting personal data provided by Users in connection with their use of the website and other related sites, communications, and services.
A User is any individual whose data is processed and who uses the website or related services (hereinafter referred to as the “User”).
The controller of personal data on the website is INMAGO Limited Liability Company, registered at ks. Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, Poland, NIP: 7831760467, REGON: 367568897 (hereinafter referred to as the “Controller”).
To the extent necessary for the performance of a contract concluded between the User and the Controller, or to take action upon the User’s request, or to comply with legal obligations imposed on the Controller – the processing of the User’s personal data is based on legal provisions, specifically Article 6(1)(b) and (c) of the GDPR, and does not require the User’s consent. In all other cases, providing personal data is voluntary. However, where consent is granted solely for marketing purposes, failure to provide such consent, or its withdrawal, will prevent the Controller from informing the User about new offers.
I. USER CONSENT
By using the website, the User accepts that the Controller collects, uses, and discloses both personal and non-personal data in accordance with this Privacy Policy. The User retains control over the use and disclosure of their data, as described in Section V “User Rights”.
Where the processing is based on the User’s consent, the User has the right to withdraw their consent at any time. Withdrawal of consent does not affect the lawfulness of the processing carried out prior to the withdrawal. The Controller shall inform the User about this right before consent is given.
If changes are made to this Privacy Policy and the User continues to use the website, such continued use shall be deemed acceptance of the updated Privacy Policy.
II. PERSONAL DATA PROCESSED BY THE CONTROLLER
1. Methods of Obtaining Personal Data
a. Data provided directly by the User
The Controller obtains personal data directly from the User through:
- messages sent via the contact form on the website,
- account creation on the website,
- use of services and products offered by the Controller,
- communications initiated by the User for technical support.
b. Data obtained from other sources
The Controller may also collect personal data from sources other than the User, such as:
- cookies and similar technologies recording User activity,
- data brokers providing demographic data,
- service providers offering IP-based geolocation data,
- business partners engaged in joint marketing or service offerings,
- publicly accessible sources such as registers or domain directories.
2. Types of Data Processed
The scope of collected data depends on the purpose of processing and may include:
- login name,
- full name / business name / name of sole trader(s),
- correspondence address,
- website URL,
- telephone number,
- email address,
- tax identification number (NIP),
- business ID (REGON),
- IP address,
- payment details if purchases are made.
The Controller may also collect content of files and messages, including:
- subject and body of emails,
- instant messages,
- audio or video recordings,
- voicemail transcripts,
- dictated messages,
- reviews, feedback, technical support content.
III. PURPOSES OF PROCESSING PERSONAL DATA
The way the Controller processes data depends on the User’s engagement with its products and services. Specific purposes may include:
- Service Delivery (Contract Performance)
To authenticate, authorize, and deliver services. In the case of paid services, data is used to conclude and perform the service agreement. - Communication (Contract Performance / Legitimate Interest)
For personalized messages (email, website notifications, push notifications) about service availability, usage, security, and promotional offers. Also includes customer service support. - Marketing (Consent / Legitimate Interest)
To deliver tailored advertisements, based on:
- User-provided data,
- usage data,
- third-party insights,
- cookies, beacons, tags, mobile identifiers.
Data is not shared with third-party advertisers unless the User consents. Clicking on ads may inform advertisers.
- Service Improvement (Legitimate Interest)
For analytics, feature development, audience growth, user engagement, market research, and economic analysis. - Security (Legitimate Interest)
To detect, prevent, and address fraud, abuse, or security risks. In cases of suspected criminal activity, personal data may be used for investigation. - Claims and Disputes (Legitimate Interest)
To pursue claims or review compliance with service terms. - Accounting Obligations (Legal Requirement)
To meet legal accounting and tax obligations for paid services.
IV. SHARING OF PERSONAL DATA
User data may be disclosed to:
a. advertising or marketing service providers, for direct marketing of the Controller’s services,
b. legal and advisory firms or debt collection companies,
c. subcontractors processing data on behalf of the Controller,
d. public authorities entitled to request such data under applicable law.
V. USER RIGHTS
Users have control over their personal data. However, restricting access to data may limit the ability to use some services.
Requests can be made by contacting the Controller via email or post.
1. Right of Access – to confirm whether and how personal data is processed and to receive a copy.
2. Right to Rectification – to correct inaccurate or incomplete personal data.
3. Right to Erasure (Right to be Forgotten) – under certain conditions (e.g., data no longer necessary, consent withdrawn, illegal processing).
4. Right to Restriction of Processing – e.g., when data accuracy is contested, processing is unlawful, or objections are raised.
5. Right to Data Portability – to receive and transfer personal data in a structured format.
6. Right to Object – to processing based on public interest, legitimate interest, or direct marketing.
7. Right to Lodge a Complaint – with a supervisory authority (e.g., Personal Data Protection Office in Poland).
8. Right Not to Be Subject to Automated Decision-Making (Including Profiling) – unless necessary for a contract, authorized by law, or based on explicit consent.
VI. COOKIES AND OTHER TECHNOLOGIES
The Controller uses cookies and similar technologies to:
- enhance site efficiency,
- personalize services,
- display targeted ads.
Cookies are text files linked to HTTP requests sent to the Controller’s server. They do not modify User devices or software configurations.
Data from cookies is considered personal only when linked to identifiable information.
Users can manage cookies through browser settings or opt-out tools.
Details are available in the Cookie Policy at [insert link].
VII. OTHER IMPORTANT INFORMATION
1. Data Security
Technical and organizational safeguards are implemented, including access restrictions, monitoring, and secure infrastructure.
2. Data Retention
Duration depends on the purpose, including:
- analytics/statistics: as needed for site development,
- service delivery: contract term + claims limitation period,
- accounting: as per legal obligations,
- marketing: during business relationship, unless objected.
After expiry, data may be stored for legal protection purposes.
3. Privacy Policy Updates
Updates may be made to reflect legal or operational changes. Users will be notified of significant changes via the website or direct communication.
4. Contact Information
For privacy inquiries, Users may contact:
- via email: biuro@inmago.pl
- by post: INMAGO Sp. z o.o. Sp. k., ks. Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, Poland.
REGULATIONS ON PERSONAL DATA PROTECTION
applicable at
INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP
PREAMBLE
INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP, in the course of its business operations, makes every effort to meet the highest standards ensuring the proper provision of services in accordance with the applicable laws and universally binding regulations.
With this in mind and in light of the requirements introduced by Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation – GDPR), this Personal Data Protection Policy has been adopted by INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP to ensure the correct handling of personal data in all operations involving their processing.
This document has been developed following an internal GDPR audit in which INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP was classified as the Data Controller processing information considered personal data within the meaning of the aforementioned EU Regulation.
This document is addressed by INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP to all cooperating entities, contractors, and current or potential clients to present the scope of protection and the scale of undertaken actions concerning any processes directly or indirectly related to personal data processing.
CHAPTER I – DEFINITIONS
For the purposes of these Regulations:
- The Data Controller is INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP, address: Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, NIP: 7831760467, REGON: 367568897, which alone or jointly with others determines the purposes and means of the processing of personal data (hereinafter referred to as the “Controller”);
- The Data Protection Officer (DPO) is a person appointed by the Controller, responsible for monitoring compliance with the GDPR, other Union or Member State data protection laws, and the Controller’s internal policies in the area of personal data protection (hereinafter referred to as “DPO”);
- A Processor is a natural or legal person, public authority, agency or other body which processes personal data on behalf of the Controller;
- Personal data means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, identification number, location data, online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that person;
- A Data set is a structured set of personal data accessible according to specific criteria, regardless of whether the set is centralized, decentralized, or functionally or geographically dispersed;
- Processing means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction;
- Data disclosure means the act of making personal data available by the Controller to a third party, without specifying the purpose or manner of processing;
- Data outsourcing means the act of entrusting personal data by the Controller to a third party for processing on behalf of the Controller for the purpose and in the manner specified by the Controller;
- Voluntary action by the Controller means any action based on a decision made by the Controller without a legal obligation and at the Controller’s discretion;
- The Act refers to the Personal Data Protection Act of 10 May 2018 (Journal of Laws 2018, item 1000, as amended);
- The GDPR is Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (Journal of Laws EU L 2016.119.1 of 4 May 2016), also referred to herein as the GDPR Regulation.
Świetnie! Poniżej kontynuuję pełne tłumaczenie dokumentu, zaczynając od Chapter II – General Provisions. Ponieważ dokument jest obszerny, tłumaczenie będzie podzielone na kolejne części, każda oznaczona odpowiednim nagłówkiem:
CHAPTER II – GENERAL PROVISIONS
- These Personal Data Protection Regulations constitute a set of rules and procedures governing the processing of personal data and the handling of such data within the Controller’s enterprise, regardless of whether the data is in electronic or paper form, and regardless of the method or medium of recording or storage.
- The provisions contained herein define the Controller’s direction of action and support to ensure the security of personal data, specifically:
- establishing the rules for the management, protection, and processing of personal data;
- defining standards to ensure the proper and secure operation of all systems used for processing personal data and information flow within the Controller’s enterprise.
- The legal basis for the development and implementation of these Personal Data Protection Regulations consists of legal acts applicable on the date of adoption of this document, including in particular:
- The Personal Data Protection Act of 10 May 2018 (Journal of Laws 2018, item 1000);
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation – GDPR) (OJ EU L 2016.119.1 of 4 May 2016).
- The full documentation constituting the personal data protection system within the Controller’s enterprise includes:
- Personal Data Protection Regulations;
- Personal Data Security Policy with annexes;
- IT System Management Instruction for the processing of personal data with annexes.
- If additional, detailed regulation concerning personal data security within the Controller’s enterprise is required, supplementary documentation may be introduced to cover the necessary scope.
Dziękuję! Kontynuuję tłumaczenie od Chapter III – Data Controller:
CHAPTER III – DATA CONTROLLER
- Taking into account the nature, scope, context, and purposes of the processing as well as the risk of infringement on the rights or freedoms of natural persons—with varying probability and severity—the Controller, in accordance with paragraph 3 of this section, ensures the implementation and use of appropriate technical and organizational measures so that the processing of data is carried out in accordance with applicable laws.
- The technical and organizational measures referred to in paragraph 1 include the implementation by the Controller of proper documentation required by applicable regulations, in particular the personal data security policy, as well as exercising due diligence to ensure that individual contracts are concluded and applied with external entities to whom the Controller has, even partially, outsourced data. These measures also include recording activities involving the disclosure of data.
- When implementing and applying the appropriate technical and organizational measures, the Controller takes into account the state of technical knowledge, implementation costs, and the nature, scope, context, and purposes of the processing, as well as the risks to the rights or freedoms of natural persons with varying probability and severity resulting from the processing.
- The Controller will make every effort, within the scope of applied solutions, to ensure effective protection of personal data and necessary safeguards for their processing.
- In cases where a joint purpose and method of processing data are agreed upon with another data controller, the Controller ensures that the necessary arrangements are made, clearly defining the scope of its responsibility and the relationship between it and the other controller, as well as with the data subjects. The Controller also undertakes necessary actions and measures in this regard.
Świetnie! Oto tłumaczenie kolejnego fragmentu:
CHAPTER IV – DATA PROCESSOR
- The Controller may outsource data for processing on its behalf. The Controller verifies the Data Processor to ensure that the entity provides sufficient guarantees to implement appropriate technical and organizational measures so that the processing assigned by the Controller complies with applicable laws and protects the rights of data subjects.
- The Controller outsources data to a Data Processor based on a contract or another legal instrument that is binding for both the Processor and the Controller. This agreement or instrument must include, in particular:
- The subject matter and duration of the processing,
- The nature and purpose of the processing,
- The type of personal data to be processed,
- The categories of data subjects,
- The obligations and rights of the Controller.
Super! Poniżej znajdziesz tłumaczenie Chapter V – Record of Processing Activities:
CHAPTER V – RECORD OF PROCESSING ACTIVITIES
- The Controller, on its own initiative and whenever required by applicable law, ensures the maintenance of a record of personal data processing activities. This record may be kept in written or electronic form, and the Controller may use dedicated software to manage it.
- The Controller ensures that the following information is included in the record of processing activities:
- The name and contact details of the Controller, any joint controllers, and the DPO (if appointed);
- The purposes of processing;
- A description of the categories of data subjects and of the categories of personal data;
- The categories of recipients to whom personal data have been or will be disclosed, including recipients in third countries or international organizations;
- Where applicable, transfers of personal data to a third country or an international organization, including the name of the third country or international organization;
- If possible, the envisaged time limits for erasure of the different categories of data;
- If possible, a general description of the technical and organizational security measures.
- The Controller also ensures that the Data Processor is obliged to keep a record of all categories of processing activities carried out on behalf of the Controller.
Świetnie! Oto tłumaczenie Rozdziału VI – Upoważnienie do przetwarzania danych osobowych na język angielski:
CHAPTER VI – AUTHORIZATION TO PROCESS PERSONAL DATA
- The Controller ensures that, within its enterprise, personal data are processed exclusively by persons who have been granted authorization to process such data, issued by the Controller in accordance with internal regulations specifying detailed procedures for access to personal data.
- The Controller ensures that persons authorized to process personal data possess the necessary knowledge and skills in this regard, and that the duration and scope of data processing performed by these persons is consistent with the content of the authorization granted by the Controller.
- In accordance with internal regulations applicable within the Controller’s enterprise, the Controller issues, records, and stores personalized authorizations for the processing of personal data, as well as revoked authorizations.
- The Controller ensures that all persons processing personal data are aware of their obligation to maintain the confidentiality of any data they access and that this obligation is confirmed in writing by such persons.
- The Controller ensures that authorized personnel perform all data processing activities in compliance with the organizational and technical measures in place within the Controller’s enterprise that are dedicated to the security and protection of personal data from unauthorized access, modification, or destruction.
Świetnie! Oto tłumaczenie Rozdziału VII – Inspektor ochrony danych na język angielski:
CHAPTER VII – DATA PROTECTION OFFICER (DPO)
- Within the Controller’s enterprise, there are no grounds requiring the appointment of a Data Protection Officer (DPO), because:
- The Controller’s main activity does not consist of processing operations which, by virtue of their nature, scope, or purposes, require regular and systematic monitoring of data subjects on a large scale;
- The Controller’s main activity does not involve large-scale processing of special categories of personal data or data relating to criminal convictions and offenses.
- In view of point 1 above, and in the absence of a legal obligation to appoint a DPO, the Controller ensures the possibility of direct contact with the Controller on all matters concerning the protection of personal data by providing relevant contact details, including an email address or phone number.
- The Controller may, on its own initiative, appoint a DPO. In such a case, the Controller ensures the publication of the DPO’s contact details and notifies the competent data protection supervisory authority of the appointment, in accordance with the applicable legal regulations at the time of the appointment.
- If the Controller appoints a DPO in accordance with point 3 above, the Controller ensures that the DPO performs their tasks with due consideration of the risks associated with processing operations, taking into account the nature, scope, context, and purposes of the processing.
Świetnie! Oto tłumaczenie Rozdziału VIII – Podstawy przetwarzania danych osobowych na język angielski:
CHAPTER VIII – LEGAL BASES FOR PERSONAL DATA PROCESSING
The Controller ensures that within the scope of its enterprise, all operations involving the processing of personal data are carried out in accordance with the following principles:
- Personal data is processed lawfully, fairly, and in a transparent manner in relation to the data subject;
- Personal data is collected for specified, explicit, and legitimate purposes and not further processed in a manner that is incompatible with those purposes;
- Personal data is adequate, relevant, and limited to what is necessary in relation to the purposes for which it is processed;
- Personal data is accurate and, where necessary, kept up to date; the Controller takes all reasonable steps to ensure that inaccurate personal data, having regard to the purposes for which they are processed, is erased or rectified without delay;
- Personal data is kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data is processed; personal data may be stored for longer periods if it is processed solely for archiving purposes in the public interest, scientific or historical research purposes, or statistical purposes, subject to appropriate technical and organizational measures required by law to safeguard the rights and freedoms of data subjects;
- Personal data is processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction, or damage, using appropriate technical or organizational measures.
- The Controller ensures that personal data is processed for specific purposes and within a specific scope if:
- The data subject has given consent to the processing of their personal data for one or more specific purposes;
- Processing is necessary for the performance of a contract to which the data subject is a party, or in order to take steps at the request of the data subject prior to entering into a contract;
- Processing is necessary for compliance with a legal obligation to which the Controller is subject;
- Processing is necessary in order to protect the vital interests of the data subject or of another natural person;
- Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the Controller;
- Processing is necessary for the purposes of the legitimate interests pursued by the Controller or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data, in particular where the data subject is a child.
- The Controller ensures that, unless explicitly authorized by law, its enterprise does not process personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, as well as genetic data, biometric data for the purpose of uniquely identifying a natural person, or data concerning the data subject’s health, sex life, or sexual orientation.
- The Controller ensures that all personal data processed by it is obtained in compliance with the applicable laws, whether directly from the data subject or by other lawful means.
Super! Oto tłumaczenie:
CHAPTER IX – RIGHTS OF DATA SUBJECTS
- The Controller ensures that the collection of personal data is carried out in accordance with the applicable legal provisions and, in particular, that the data subject is provided with all the information required by law.
- The Controller ensures that each data subject has the right, under the GDPR, to exercise control over their personal data.
- A data subject, at every stage of the processing of their personal data, is granted a number of rights allowing them to:
- access their personal data,
- verify the correctness of data processing,
- correct their data,
- object to the processing,
- request restriction of processing,
- request the transfer of their personal data.
Świetnie! Oto tłumaczenie Rozdziału X – Techniczne oraz organizacyjne środki ochrony danych osobowych:
CHAPTER X – TECHNICAL AND ORGANIZATIONAL MEASURES FOR PERSONAL DATA PROTECTION
- The Controller ensures that appropriate technical and organizational data protection measures are implemented, in particular that documents containing personal data, whether in electronic or paper form, are stored in properly secured buildings and premises.
- If, in fulfilling the obligation outlined above, the Controller decides to store documentation containing personal data in rooms locked with a key, the Controller shall ensure, in particular, that:
- appropriate control and verification measures are implemented regarding access to buildings and rooms where personal data is processed;
- keys to such rooms are issued directly by the Controller or another responsible person only to individuals authorized to access those areas;
- internal regulations applicable within the Controller’s enterprise, in cases where the Controller owns the building, require that key holders issue keys only to individuals authorized to access those rooms;
- internal regulations ensure that any person responsible for issuing keys, regardless of ownership, provides access only to authorized individuals;
- for leased or used buildings and premises, internal rules ensure that keys to rooms with personal data are given only to authorized individuals;
- procedures are in place requiring any person who has lost access keys to promptly report this to the Controller or their designated representative.
- The Controller ensures that detailed access control rules for all areas where personal data is processed are defined in the internal procedures applicable within the enterprise.
- The Controller ensures that appropriate internal procedures are implemented, instructing proper behavior when handling documents containing personal data, specifically that:
- if multifunction devices are used to copy or scan documents containing personal data, such documents and their copies are removed from the device immediately after use;
- when sending documents containing personal data electronically, special caution is exercised, including encryption if appropriate;
- authorized persons, after processing documents, store them and any digital media in dedicated secure locations;
- paper documents containing personal data that are no longer needed are destroyed safely, e.g., with a shredder.
- The Controller ensures that internal procedures cover the secure destruction of documents containing personal data. The Controller may use a professional document destruction service (based on a proper agreement in accordance with Chapter IV of these Regulations).
- The Controller ensures that each person authorized to process personal data within the enterprise is aware of applicable data protection regulations.
- Where necessary, the Controller provides training to authorized individuals on the safe use of devices and software related to personal data processing, as well as on how to secure locations where documents are stored.
- Detailed physical, technical, and organizational data protection measures are included in internal documents, in particular in the Data Security Policy and IT System Management Instructions.
Super! Przechodzimy więc do tłumaczenia Rozdziału XI – Procedura postępowania w przypadku naruszenia bezpieczeństwa danych osobowych:
CHAPTER XI – PROCEDURE IN CASE OF PERSONAL DATA SECURITY BREACH
- The Controller ensures the development and implementation of a procedure for handling personal data security breaches within the enterprise. This procedure regulates, in particular:
- the reduction of similar incidents occurring in the future;
COOKIES POLICY
applicable to the website operated by
INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP
We use cookies to improve efficiency and offer the User increasingly refined functionalities of our website, as well as content more tailored to the User. To ensure transparency of actions, this Cookie Policy is adopted to define the detailed rules of using cookies by the website.
Data collected via cookies is processed by INMAGO LIMITED LIABILITY COMPANY LIMITED PARTNERSHIP, address: Ewalda Kasperczyka 58, 44-300 Wodzisław Śląski, NIP: 7831760467, REGON: 367568897.
A User is any individual whose data is processed, using our website and other associated sites, communication, and services (hereinafter referred to as the “User”).
I. COOKIES
Cookies are small fragments of code—text files corresponding to HTTP requests sent to our server. These files are saved by every browser used by the User to visit our site. The information contained in cookies allows us to understand how Users use our site.
We use cookies to ensure optimal service for Users during their visit and to enable faster and easier access to information. The storage or retrieval of information does not alter the configuration of the User’s device or installed software.
The information in cookies is considered personal data only when combined with other personal data available about a given User. We collect only anonymous data through cookies, used to improve the portal experience and reduce advertising intrusiveness. We do not collect any data that could identify the User.
II. TYPES OF COOKIES
Our website uses two types of cookies:
- Session cookies – Temporary files that remain on the User’s device until they leave the site or close their browser. These cookies are automatically deleted.
- Persistent cookies – These remain on the User’s device for a specified time period as set in the cookies’ parameters or until manually deleted.
III. PURPOSES OF USING COOKIES
We use cookies to recognize the User during their visits, remember their preferences, and display relevant, personalized content. Cookies make interactions with our services faster and more efficient. They also allow us to present content without the need for surveys.
Cookies on our site are used for the following purposes:
- Authentication – To recognize the User on our website. These cookies allow navigation without the need to log in on every page and show relevant information based on preferences.
- Analytics and statistics – For continuous improvement of our products and services, offering better solutions, and adding new features.
- Preferences and settings – To remember the site settings and configurations, including layout and preferred language.
- Advertising – To provide both general and personalized ads to the User.
IV. DISABLING COOKIES
Web browsers allow cookies by default. If the User does not wish to receive cookies, they can change their browser settings. Continued use of the website without changing settings implies consent to receive all cookies from our site.
Most browsers allow the User to view and delete cookies, including those on our site. However, disabling cookies may affect full and proper use of our services.
If the User accesses our website from multiple devices (e.g., computer, smartphone, tablet), each browser must be individually configured for cookie preferences.
Below are instructions for disabling cookies in popular browsers:
- Google Chrome
Go to Settings → Advanced → Privacy and security → Content settings → Cookies
You can choose: Block all cookies, Block third-party cookies.
More: Google Chrome Help - Mozilla Firefox
Go to Menu → Options → Privacy → Use custom settings for history → Adjust cookie settings.
More: Firefox Help - Safari
Go to Safari Menu → Preferences → Privacy
Choose from: Always block, Allow from current website only, Allow from websites I visit, Always allow.
More: Safari Help - Opera
Go to Settings → Preferences → Advanced → Cookies
Options: Accept all cookies, Accept only from the site I visit, Never accept cookies.
More: Opera Help - Internet Explorer
Go to Tools → Internet Options → Privacy tab → Adjust slider for cookie handling.
More: Internet Explorer Help
V. CONTACT INFORMATION
If you have any concerns or require information regarding this Cookie Policy, you may contact the Controller via the official company email address for data protection matters or another general contact email, as well as by post at the Controller’s registered address.