Data Privacy Statement

Who we are

The address of my website is:

Responsible for the content (in accordance with Art 24 DSGVO): 

Dipl.-Ing. Dr. Hermann Bühler GmbH
Hyrtlstraße 30
A-2340 Moedling

represented by:

Dipl.-Ing. Roman Zelenka
+43 2236 24130 71

Personal data we are collecting and why we are collecting it


Each time our website is accessed, our system automatically collects data and information from the computer system of the calling computer. The following data are collected:

  • Information on type of browser and used version
  • Operating system of the user
  • Internet Service Provider of the user
  • IP address of the user
  • Date and time of access
  • Websites, of which the user’s system is getting to this website
  • Websites, which are accessed by the user’s system through this website

The data is also stored in the log files of our system. This data is not stored together with other personal data of the user.

Rights you have to your data

If you have sent us an e-mail, you can request an export of your personal data from us, including any data you have provided to us. In addition, you may request the deletion of any personal information we have stored about you. This does not include the data we have to keep for administrative, legal or security-related needs.

You are entitled to the right to information, correction, deletion, restriction, data portability, revocation and opposition. If you believe that the processing of your data violates data protection law or if your data protection claims have otherwise been violated in a way, you can complain to the supervisory authority. In Austria, this is the data protection authority.

Where we send your data

IP addresses and other access data can be examined by an automated hacker attack detection service.

Contact information

If you have questions about the protection of your personal information on our site and in our company, please contact us.

How we protect your data

Our website is encrypted. In addition, we take special care to protect our data from unauthorized access through two-factor authentication, brute-force attack protection mechanisms and other measures. For safety reasons, not all techniques are listed here.