Data Protection

Privacy Policy

1. Introduction

This data protection declaration informs you about the type, scope and purpose of the collection and use of personal data on the website “https://www.wieland-capital.com” (hereinafter “website”) by Wieland Capital GmbH & Co. KG (hereinafter “we” or “us”). We are the controller of all personal data collected on the Website, unless otherwise stated in this Privacy Policy.

Personal data is information that can be used to identify an individual, i.e. information that can be traced back to an individual. This typically includes the name, e-mail address or telephone number. In addition, purely technical data that can be assigned to a person is also considered personal data.

2. Contact details of the responsible person

Wieland Capital GmbH & Co. KG
Schumannstrasse 4
81679 Munich
Telephone: +49 89 4161 933 0
E-mail: info@wieland-capital.com

Personally liable partner: Wieland Capital Management GmbH
Managing director with power of representation: Robert Wieland, Franck Godet

3. Your rights

You have the right to obtain information about the personal data stored about you free of charge upon request. In addition, you have the right to request the correction of incorrect data, the right to request the restriction of processing of data that has been processed too extensively and the right to request the deletion of personal data that has been processed unlawfully or stored for too long (insofar as this does not conflict with any legal obligation to retain data and no other reasons pursuant to Art. 17 (3) DSGVO). In addition, you have the right to transfer all data you have provided to us in a common file format (right to data portability).
Insofar as you also have a right to object to individual procedures, we will point this out in the description of the individual procedures.
To exercise your rights, simply send an e-mail to info@wieland-capital.com.

In addition, you also have the right to lodge a complaint with a data protection supervisory authority.

4. Voluntary provision of data

The provision of your personal data on this website is generally neither legally nor contractually required. You are not obliged to provide personal data on this website. Nevertheless, the provision of the functions of this website requires the processing of your personal data.

5. Contacting us

When contacting us (for example by e-mail or after using the contact form), the information you provide will be stored for the purpose of processing the request and in case follow-up questions arise.

6. Legal basis

The information provided when contacting us is processed on the basis of Art. 6 Para. 1 lit. a and lit. f DSGVO. This authorisation permits the processing of personal data within the scope of the “legitimate interest” of the responsible party, insofar as your fundamental rights, freedoms or interests do not prevail. Our legitimate interest is to process the contact. You can object to this data processing at any time if there are reasons which exist in your particular situation and which speak against the data processing. An e-mail to the data protection officer is sufficient for this purpose.

7. Duration of data storage

The personal data stored in the context of contacting us will be deleted when the matter connected with the contact has been fully clarified and it is also not to be expected that the specific contact will be relevant again in the future.

8. Server log files

We automatically collect a number of technical data, which are personal data, each time the website is accessed.

These are:

– IP address of the user
– Name of the accessed website or file
– date and time of access
– Amount of data transferred
– Message about successful retrieval
– Browser type and version
– Operating system of the user
– User’s device used, including MAC address
– Referrer URL (the previously visited page)

This data is not merged with other personal data that you actively provide as part of the website. We collect server log files for the purpose of administering the website and being able to detect and prevent unauthorised access.

9. Legal basis

The personal data in log files are processed on the basis of Art. 6 (1) lit. f DSGVO. This authorisation allows the processing of personal data within the scope of the “legitimate interest” of the controller, insofar as your fundamental rights, freedoms or interests do not prevail. Our legitimate interest is to facilitate administration and the ability to detect and prosecute hacking. You can object to this data processing at any time if there are reasons which exist in your particular situation and which speak against the data processing. An e-mail to the data protection officer is sufficient for this purpose.

10. What are IP addresses?

IP addresses are assigned to every device (e.g. smartphone, tablet, PC) that is connected to the internet. Which IP address this is depends on which internet access your end device is currently connected to the internet via. It can be the IP address assigned to you by your Internet provider, for example if you are connected to the Internet at home via your W-LAN. It can also be an IP address assigned to you by your mobile phone provider or the IP address of a provider of a public or private W-LAN or other Internet access. In its most common form (IPv4), the IP address consists of four blocks of digits. In most cases, you as a private user will not use a constant IP address, as this is only temporarily assigned to you by your provider (so-called “dynamic IP address”). With a permanently assigned IP address (so-called “static IP address”), a clear assignment of user data is in principle easier. Except for the purpose of tracking unauthorised access to our website, we do not use this data in a personalised manner, but only evaluate on an anonymous basis which of our websites are favoured, how many accesses are made daily and the like.

11. Duration of data storage

The server log files with the above-mentioned data are automatically deleted after 30 days. We reserve the right to store the server log files for longer if facts exist that suggest the assumption of unauthorised access (such as an attempt at hacking or a so-called DDOS attack).