1. Technical implementation
The web servers of the University of Cologne are operated by Cologne's Regional Computing Center (RRZK).
50931 Cologne, Germany
By accessing this website, your browser sends data to our web server. The following data are temporarily recorded in a log file during an active connection between your browser and our web server:
- IP address of the client computer
- Access time and date
- Name, URL and transferred data volume of the retrieved file
- Access status (file transfer requested, not found, etc.)
- Data identifying the browser software and operating system (as provided by the client browser)
- Website (if transmitted by the requesting web browser) of the carried out access
The processing of the data in this log is as follows:
- The log entries are automatically evaluated at all times in order to detect attacks on the Web server and react accordingly.
- In some cases, that is, in reported incidents, errors and security incidents, a manual can be carried out.
- Log entries that are older than seven days are anonymized by shortening the IP address.
- The anonymized logs are used to create and access statistics. The software used for this purpose is locally operated by the RRZK..
The IP addresses contained in the log entries are not merged with any other data from the RRZK, so that the RRZK can make no inference about individual persons.
3. Booking data
When you set up a user account, we store the following data for documentation and billing purposes and to enable your participation in the event: contact data such as your name, address, institution and e-mail address, plus your user name and password.
As an option, you can add other information to your user account, such as telephone number, fax number or title.
4. Forwarding data to third parties
We point out that with application to a conference typically your name, institution and country for all other registered participants for each conference in their respective user account (password protected area) are visible - in the sense of a conference-related list of participants.
5. E-mail security
When you send us an e-mail, your e-mail address will be used only for the purposes of corresponding with you. Please note that security gaps can occur when transmitting data over the Internet. 100 percent protection against access to data by third parties is not possible.
To expand the functional scope our Internet offering and to make it easy to use, we rely to some extent on so-called cookies, which can be used to store data on your computer when you call up our website. You can deactivate cookies or configure your browser so that cookies are stored only for the duration of the online session. This can restrict the functional scope of our Internet offering however.
To protect your data from unauthorized access, we use encryption on several of web pages. In this case, data is transmitted between your computer and our server (in both directions) via the Internet with 256-bit SSL encryption (secure socket layer). You can check if the current connection is secure by looking at the URL in the address bar, which always begins with https://.
8. Changes to the data privacy policies
We reserve the right to adapt our data privacy policies in order to conform to current legal requirements or to implement changes to our data privacy declaration. We encourage you to review these data privacy policies regularly to ensure that you remain up-to-date with respect to how we protect your personal data. By continuing to use the service, you agree to accept the changes to the data privacy policies.
If you still have questions related to data privacy, you can find additional information on our data privacy administrator's website.