Passively provided information
When you surf the internet, perhaps without being aware of this, you allow web page managers to collect certain data about you. Examples are the “IP number” of your PC, the operating system, the internet browser you use and the last internet page you visited. With this information the quality and accessibility of internet pages can be improved. To the extent we use such data, these are processed anonymously.
We use the so-called ‘cookies’. Cookies consist of a standard internet technology that makes it possible to store and access certain information on the user’s system. Cookies can not be used to identify people, a cookie can only identify a machine. Any internet user can set his computer in such a way that cookies are not accepted. If the computer does not accept cookies, it is possible that you will experience problems during the ordering process. If this is the case then we ask you to contact us so that we can still enter the order. If you do not want to receive cookies, you can look in the help file of the internet browser how you can block all cookies or how you can ensure that you receive a warning before a cookie is stored.
When you place an order with us, you will be asked to provide the necessary information to us. In case this is necessary for the correct processing of the order, we will only share the necessary information with third parties. We only use the personal data for the execution of the concluded agreement that you conclude with us through the order. At the customer’s request, we will remove this customer’s data from the database, provided that the customer has fulfilled his / her (payment) obligations. If desired, the customer can inform us of changes in his / her details by telephone or request the personal data, please contact customer service.
We keep online visitor statistics to see which pages of the website are visited to which extent. These statistics are used to make the internet site more accessible.
Backup and security techniques
We use backup and security techniques to prevent and / or restore the loss, mutilation or any other damage to information.