Privacy Policy
1. Data Controller
APEIROO LABS, S.L.
Calle Rioja 23, 41429 La Campana, Seville, Spain
[email protected]
2. Data We Collect
We may process the following categories of data:
-
-
- Identification data (name, company, position)
- Contact details (email, phone number)
- Professional Data
- Technical data (IP address, logs, browser information)
- Information provided through forms
- Data derived from commercial interactions
-
3. Purposes of Processing
The data is processed for:
-
-
- Data is processed for the following purposes:
- To provide professional services.
- Maintain contractual relationships.
- Sending commercial communications (subject to prior consent).
- Complying with legal obligations.
- Ensuring website security.
- Conducting aggregated statistical analysis.
-
4. Legal Basis
Processing is based on:
-
-
- Art. 6(1)(a) GDPR – Consent
- Art. 6(1)(b) GDPR – Contract performance
- Art. 6(1)(c) GDPR – Legal obligation
- Art. 6(1)(f) GDPR – Legitimate interest (security, fraud prevention)
-
5. Data Retention
The data will be retained:
-
-
- While a contractual relationship exists.
- Until consent is withdrawn.
- For legally required retention periods.
-
6. Recipients
Data may be accessed by:
-
-
- Technology providers (data processors).
- Public authorities where legally required.
- International partners where necessary for service delivery.
-
7. International Transfers
In the event of transfers outside the EEA, the following safeguards will apply:
-
-
- Standard Contractual Clauses (SCC).
- Adequacy decisions.
- Additional safeguards in accordance with GDPR.
-
8. User Rights
You may exercise the following rights:
-
-
- Access
- Rectification
- Erasure
- Objection
- Restriction of processing
- Data portability
- Withdrawal of consent
- Right not to be subject to automated decision-making
-
Requests may be sent to: [email protected]
You can also file a complaint with the AEPD: www.aepd.es
9. Security Measures
APEIROO applies appropriate technical and organizational measures based on the level of risk, including access controls, encryption, monitoring, and protection of critical infrastructure.
