KARL MAYER PREOWNED MACHINERY appreciates your visit to our website and your interest in our company and our products and services. The protection of personal data processed during the entire business process is an important concern for us. We want you to feel secure when visiting our website.
Below, we explain what information we collect at KARL MAYER PREOWNED MACHINERY during your visit to our website and how it is used.
When you visit our website, our web server default for the purpose of system security, the connection data, which is the IP address of your access, the website from which you visit us, the date and time of your visit, the identification data of browser and operating system type. In addition, personal information such as your name, address, telephone number or e-mail address is not collected, unless this information is provided voluntarily, eg as part of a registration, a survey, to execute a contract or an information request.
The stored data is used solely for statistical purposes and will not be disclosed to third parties. In addition, personal data, and therefore personal details about personal or material circumstances of an identified or identifiable person is saved only if you notify us of this as part of our services offered on the Internet by itself.
When you do provide us with personal data, we use only for purposes of technical administration of the websites, customer administration and settlement of contracts. Only in individual cases, if you have given us your consent or if you have -soweit legislation vorsehen- this no opposition is filed, we also use this data for product-related surveys. Your personal data shall not be communicated without your consent other companies or organizations. We reserve the right to create for purposes of advertising, market research or the design of our services anonymous user profiles, unless you disagree with this creation.
KARL MAYER textile machines take all necessary technical and organizational security measures to protect your personal data against tampering and unauthorized access by third parties. So your data in a secure operating environment is stored, which is not accessible to the public.