Apidemia, located at Åbogade 15, 8200 - Aarhus N, Denmark ("Apidemia," "we," or "our"), working with the subcontractor, Apidemia SRL, located at Oradea, Vladeasa 40, 410222, Romania and affiliate company, Apidemia Inc. located at 501 Silverside Rd Ste 105, Wilmington, DE 19809, USA, recognizes the importance of your personal privacy. Therefore, we have chosen to not record any personal data without your knowledge. You may browse the site without having to worry about cookies or any other type of tracking. The only exception is the contact us form where you must leave your name, email address, company name, role in the company and phone number so we can contact you for a meet.
The ‘Contact us’ form at https://www.apidemia.dk/contact/ records the data shown in the form, the visitor’s IP address and browser user agent string to help spam detection.
Your data is securely kept in our databases and not shared with any third party.
As a convenience to you, we may provide links to third-party Services from within our Service. We are not responsible for the privacy practices or content of these third-party sites. When you link away from our Service, you do so at your own risk.
Your personal data are retained for as long as we need it to maintain a channel of communication.
You can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Your personal data is recorded exclusively in the Apidemia databases and will only be shared with third parties after your explicit consent.
How we protect your data:
The security of your personally identifiable information is very important to us. When we collect your personally identifiable information online, we use reasonable efforts to protect it from unauthorized access. However, due to the inherent open nature of the Internet, we cannot guarantee that your personally identifiable information will be completely free from unauthorized access by third parties such as hackers and your use of our Service demonstrates your assumption of this risk. We have put in place reasonable physical, electronic, and managerial procedures to safeguard the information we collect. Only those employees who need access to your information in order to perform their duties are authorized to have access to your personally identifiable information. For more information on protecting your privacy, please visit www.ftc.gov/privacy.
What data breach procedures we have in place:
In line with best practice, the following five steps should be followed in responding to a data security breach:
Step 1: Identification and initial assessment
The CS Officer will establish if a personal data security breach has taken place and if so, what personal data is involved in the breach, the cause and the extent of the breach, the harms the breach can cause to individuals and how the breach can be contained. According to Article 33 of the GDPR: ‘In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55 of the GDPR, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.’
Step 2: Containment and Recovery
Establish who needs to be made aware of the breach, whether there is anything that can be done to recover any losses and limit the damage the breach can cause and if it is appropriate to notify affected individuals immediately.
Step 3: Risk Assessment for individuals and for Apidemia.
Step 4: Notification of the supervisory authority and of the affected individuals if deemed necessary by the CS Officer.
Step 5: Evaluation and Response to reduce the risk of future breaches and minimize their impact.
No Rights of Third Parties: