PRIVACY POLICY in Warsaw
This Privacy Policy defines the principles of data retention and access on User Devices using the Website for the purpose of providing electronic services by the Administrator, as well as the principles of collecting and processing personal data of Users, which they voluntarily provide through tools available on the Website.
The following Privacy Policy is an integral part of the Website's Terms and Conditions, which set the rules, rights, and obligations for users of the website.
- 1 Definitions
- Service - the site "www.lazerhouse.pl/en/krakow", available at https://www.lazerhouse.pl/en/krakow
- External Website - websites of partners, service providers, or service recipients cooperating with the Administrator
- Website/Data Administrator - The Website and Data Administrator (hereinafter referred to as the Administrator) – Laserhouse Spółka z ograniczoną odpowiedzialnością, located at: Warsaw, Rodziny Hiszpańskiego 8/ID 1.04 02-685, NIP: 5214070070, REGON: 528644579,
1) Postal address - Laserhouse Sp. z o.o., Warsaw, Rodziny Hiszpańskiego 8/ID 1.04 02-685
2) Email address - info@lazerhouse.pl
3) Phone number - +48 732 100 224
4) Contact form - available at: https://www.lazerhouse.pl/contacts
providing electronic services via the Website - User - an individual to whom the Administrator provides electronic services through the Website.
- Device - an electronic device with software that the User uses to access the Website.
- Cookies - data collected in the form of files placed on the User's device.
- GDPR - Regulation (EU) 2016/679 of the European Parliament and Council of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
- Personal Data - information relating to an identified or identifiable natural person ("data subject"); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, identification number, location data, online identifier, or one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that individual.
- Processing - an operation or set of operations performed on personal data or sets of personal data, whether by automated means or not, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure, or destruction;
- Restriction of Processing means marking stored personal data with the aim of limiting their processing in the future.
- Profiling - means any form of automated processing of personal data involving the use of personal data to evaluate certain personal aspects of a natural person, in particular to analyze or predict aspects concerning that natural person’s performance at work, economic situation, health, personal preferences, interests, reliability, behavior, location, or movements.
- Consent means any freely given, specific, informed, and unambiguous indication of the data subject's wishes, by which the data subject, by a statement or clear affirmative action, signifies agreement to the processing of personal data relating to him or her.
- Personal Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data transmitted, stored, or otherwise processed.
- Pseudonymization - means the processing of personal data in such a way that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the data cannot be attributed to an identified or identifiable natural person.
- Anonymization - Anonymization of data is an irreversible process of operations on data that destroys/replaces "personal data," excluding the possibility of identifying or linking the recorded data to a specific user or natural person.
- 2 Data Protection Specialist
According to Article 37 of the GDPR, the Administrator has not appointed a data protection officer.
For questions regarding data processing, including personal data, please contact the Administrator directly.
- 3 Types of Cookies
- Internal Cookies – files that are placed and read from the user's device by the website's IT system.
- External Cookies – files that are placed and read from the user's device by the IT systems of external websites. Scripts from external websites that may place cookies on the user's device have been deliberately placed on the website using scripts and services available and installed on the website.
- Session Cookies – files placed and read from the user's device during one session on a specific device. Once the session ends, the files are deleted from the user's device.
- Persistent Cookies – files that the website places and reads from the user's device until they are manually deleted. These files are not automatically deleted after the session ends unless the user's device is configured to delete cookies after the session ends.
- 4 Data Storage Security
- Mechanisms for Storing and Reading Cookies - Mechanisms for storing, reading, and exchanging data between cookies stored on the user's device and the website are implemented using built-in browser mechanisms and do not allow other data from your device or other websites you've visited, including personal or confidential information, to be loaded. It is also virtually impossible to transfer viruses, trojans, and other worms to the user's device.
- Internal Cookies - The cookies used by the Administrator are secure for users' devices and do not contain scripts, content, or information that could pose a security risk to personal data or the device used by the user.
- External Cookies - The Administrator takes all possible measures to verify and select website partners concerning user security. For cooperation, the Administrator selects reputable, large partners with global social trust. However, the Administrator has no full control over the content of cookies from external partners. The Administrator is not responsible for the security of cookies, their content, or compliance with the license for the use of scripts installed on the website from external websites, within the limits permitted by law. A list of partners is provided later in the Privacy Policy.
- Cookie Control
- The user can change the settings for storing, deleting, and accessing data stored in cookies on each website at any time.
- Information on how to disable cookies in the most popular computer browsers can be found at: how to disable cookies or from one of the specified providers:
- Managing cookies in the Chrome web browser
- Managing cookies in the Opera web browser
- Managing cookies in the FireFox web browser
- Managing cookies in the Edge web browser
- Managing cookies in the Safari web browser
- Managing cookies in the Internet Explorer 11 web browser
- The user can delete all cookies saved up to that point using the user's device tools.
- User-related Threats - The Administrator uses all possible technical measures to ensure the security of data stored in cookies. However, it should be noted that the security of this data depends on both parties, including user actions. The Administrator is not responsible for the interception of this data, session hijacking, or their deletion due to conscious or unconscious user actions, viruses, trojans, and other spyware that may have infected the user's device. To protect themselves from these threats, users should follow recommendations for safe internet use.
- Storage of Personal Data - The Administrator ensures that all reasonable efforts are made to ensure that the personal data processed and voluntarily entered by users is secure, access is restricted, and is used only for its intended purpose. The Administrator also guarantees that all efforts are made to protect this data from loss using appropriate physical and organizational security measures.
- Password Storage - The Administrator states that passwords are stored in an encrypted form using the latest standards and recommendations on this matter. Decrypting passwords for accounts provided on the website is practically impossible.
- 5 Purposes of Using Cookies
- Improvement and facilitation of website access
- Personalization of the website for users
- Enabling login to the website
- Marketing, remarketing on external websites
- Advertising services
- Affiliate services
- Statistics tracking (users, number of visits, device types, links, etc.)
- Providing multimedia services
- Providing public services
- 6 Purposes of Processing Personal Data
Personal data voluntarily provided by users is processed for one of the following purposes:
- Implementation of electronic services:
- User account registration and maintenance services on the website and related functions
- Newsletter services (including sending promotional content by agreement)
- Commenting/liking posts on the website without registration
- Services for sharing content posted on the website to social media sites or other websites.
- Communication between the Administrator and users on issues related to the website and data protection
- Ensuring the Administrator's legally justified interest
User data, collected anonymously and automatically, is processed for one of the following purposes:
- Statistics tracking
- Remarketing
- Serving ads according to the user's preferences
- Managing the affiliate program
- Ensuring the Administrator's legally justified interest
- 7 External Website Cookies
The website administrator uses JavaScript scripts and web components from partners that may place their own cookies on the user's device. Remember, you can select the allowed cookies that individual websites may use in your browser settings. Below is a list of partners or their services implemented on the website that may place cookies:
- Multimedia Services:
- Social/Connected Services:
(Registration, login, content sharing, communication, etc.) - Advertising and Affiliate Networks:
- Statistics Tracking:
Third-party services are outside the control of the Administrator. These organizations may change their terms of service, privacy policies, data processing purposes, and methods of using cookies at any time.
- 8 Types of Collected Data
The website collects data about users. Some of the data is collected automatically and anonymously, while other data is personal information that users voluntarily provide when registering for specific services offered on the website.
Anonymous data is collected automatically:
- IP address
- Web browser type
- Screen resolution
- Approximate location
- Opened subpages of the website
- Time spent on the relevant subpage of the website
- Operating system type
- Previous subpage address
- Referrer address
- Web browser language
- Internet connection speed
- Internet service provider
Data collected during registration:
- First name/Last name/Nickname
- Username
- Email address
- IP address (collected automatically)
Data collected when subscribing to a newsletter:
- First name/Last name/Nickname
- Email address
- IP address (collected automatically)
Data collected when adding a comment:
- First and last name / Pseudonym
- Email address
- Website URL
- IP address (collected automatically)
Some data (without identification information) may be stored in cookies. Some data (without identification information) may be transferred to a statistics service provider.
- 9 Third-party Access to Personal Data
As a rule, the only recipient of personal data provided by users is the Administrator. The data collected as part of the services provided is not transferred or sold to third parties.
Access to the data (usually based on a Data Processing Agreement) may be granted to individuals responsible for supporting the infrastructure and services necessary for the operation of the website, namely:
- Hosting companies providing hosting or related services to the Administrator
- Companies providing email distribution services
Entrusting Personal Data Processing - Hosting, VPS, or Dedicated Server Services
To operate the website, the Administrator uses external hosting services, VPS, or dedicated servers provided by Internet Invest Ltd.
No reviews or questions yet