Privacy Policy

Responsible for the websites of Product Hackers

Corporate name: Product Hackers SL (hereinafter, Product Hackers)

Tax ID: B87635850

Intracommunity Operator Tax ID: ESB87635850

Registered office: C/Rascafría 33, Villaviciosa de Odón, Madrid

Contact:

Email address: info@producthackers.com

Registrations:

PRODUCT HACKERS, S.L., a Spanish commercial entity, with Tax ID B87635850, and registered office in Madrid, at Rascafría street, 33, 28670 – Villaviciosa de Odón (Madrid), constituted by public deed dated September 1, 2016, before the Notary of Madrid, Mr. Juan López Durán, No. 1606 of his protocol, and registered in the Mercantile Register of Madrid, Volume 35025, Folio 154, Sheet M-629911, 1st Registration.

Product Hackers pages (Hereinafter, Website):

Main website: https://conference.producthackers.com/

Social profiles: Twitter ES, Facebook ES, Instagram ES, YouTube ES, LinkedIn ES

I.- Personal data protection

I.A.- RESPONSIBLE (FOR PROCESSING)

Contact details of the responsible party: Product Hackers (B87635850) with registered office at C/Rascafría 33, Villaviciosa de Odón, Madrid and contact email address info@producthackers.com

Contact details of Security Manager: Andrés Velasco Collado, contactable through the email info@producthackers.com

I.B.- DATA PROTECTION RIGHTS

How to exercise your rights: Users can send a written communication to the registered office of Product Hackers or to the email address indicated at the beginning of this legal notice, including in both cases a photocopy of their ID card or other similar identification document, to request the exercise of the following rights:

Right to request access to personal data: you can ask Product Hackers if this company is processing your data.

Right to request its rectification (if incorrect) or deletion.

Right to request the limitation of its processing, in which case it will only be kept by Product Hackers for the exercise or defense of claims.

Right to object to processing: Product Hackers will stop processing the data in the way you specify, unless for compelling legal reasons, or the exercise or defense of possible claims need to continue processing.

Right to data portability: if you want your data to be processed by another firm, Product Hackers will facilitate the portability of your data to the new responsible.

Models, forms, and more information on the referred rights: Official website of the Spanish Data Protection Agency

Possibility to withdraw consent: in the case that consent has been granted for a specific purpose, you have the right to withdraw consent at any time, without affecting the legality of the processing based on the consent prior to its withdrawal.

How to complain to the Control Authority: If a user considers there is a problem with the way Product Hackers is handling their data, they can direct their complaints to the Security Manager of Product Hackers or to the corresponding data protection authority, being the Spanish Data Protection Agency the indicated in the case of Spain.

I.C.- DATA RETENTION

Disaggregated data: The disaggregated data will be retained without a deletion period.

Customer Data: The period of conservation of personal data will be 10 years since the customer ceased to be a current customer of the company.

Email feed subscribers data: From the moment the user subscribes until they unsubscribe.

Data of users uploaded by Product Hackers to pages and profiles on social networks: From the moment the user gives their consent until they withdraw it.

Data of applicants for internships or job positions: In case the candidate is not selected, Product Hackers may keep their resume stored for a maximum of two years to incorporate it into future calls, unless the candidate states otherwise.

Data of users connecting to Product Hackers’ wifi network: The data will be retained for a maximum period of two years.

I.D.- ORIGIN, PURPOSES, AND LEGITIMACY

I.D.1.- EMAIL, CONTACT FORMS, AND TRADITIONAL COMMUNICATION MEDIA

Web and hosting: The Product Hackers Website has SSL TLS v.1.2 encryption that allows the user to securely send their personal data through standard contact forms, hosted on the servers that Amazon Web Services offers to Product Hackers.

Data collected through the web: Personal data collected will be subject to automated processing and incorporated into the corresponding files of which Product Hackers is the owner.

Your IP address will be collected, which will be used to check the origin of the message in order to provide you with legal advice appropriate to it (for example, recommendations of professionals and services from countries different from Spain) and to detect possible irregularities (for example: opposing parties of the same case write to Product Hackers from the same IP), as well as data related to your ISP.

Likewise, you can provide your data through email and other communication media.

Email: The email service provider used by Product Hackers is Google, Inc.

Instant messaging: Product Hackers does not provide service through instant messaging such as, for example, WhatsApp, Facebook, Telegram, Messenger, KakaoTalk, or Line.

Other services: Certain services provided through the Website (for example, the possibility to participate in a contest or draw) may contain particular conditions with specific provisions on personal data protection. It is essential to read and accept them before requesting the service in question.

Purpose and legitimacy: The purpose of processing this data will only be to provide you with the information or services you request.

I.D.2.- SOCIAL NETWORKS

Presence on networks: Product Hackers has profiles on some of the main Internet social networks, recognizing itself as responsible for the treatment in relation to the data published by Product Hackers (for example, photos uploaded by Product Hackers in which people’s faces appear) or data that users send privately to Product Hackers for the purpose of being extracted (for example, initial communications for Product Hackers to advise on a case).

Purpose and legitimacy: The treatment that Product Hackers will carry out with the data within each of the referred networks will be, at most, the one that the social network allows to corporate profiles. Therefore, Product Hackers may inform, when the law does not prohibit it, its followers by any means that the social network allows about its activities, presentations, offers, as well as providing personalized customer service.

Data extraction: In no case will Product Hackers extract data from social networks, unless the user’s consent is obtained punctually and expressly for this.

Rights: When, due to the very nature of social networks, the effective exercise of the follower’s data protection rights is subject to the modification of the personal profile of this, Product Hackers will help and advise to that end to the extent of its possibilities.

I.D.3.- NEWSLETTER OR RSS VIA EMAIL

Service provider: The automatic updates service or subscription via feed of the Website is managed through ActiveCampaign. The sending of updates of the Website’s content through email is daily, automatic, and free for the user who, to subscribe, must provide their prior and express authorization through two successive identity verification systems.

Purpose and legitimacy: The purpose of processing these data will only be to provide you with the subscription service that the user requests.

Rights: If you are subscribed via email to the feed of the Website, you can unsubscribe at any time by clicking the link that appears at the end of the update message you receive in your email or by making a request to exercise your right to Product Hackers.

I.D.4.- RAFFLES, CONTESTS, AND OTHER PROMOTIONAL ACTIONS

When participating in promotional actions organized exclusively by Product Hackers, the data you provide will be processed only by Product Hackers for the purpose indicated in the statement of the action.

I.D.5.- EMPLOYMENT AND INTERNSHIPS, SCHOLARSHIPS OR PRACTICES

Reception of CV: Only applications for employment or internships that the candidate sends through email or by those arranged in the areas of employment and internships on university websites where Product Hackers has posted a specific offer will be considered by Product Hackers. The rest of the applications will be rejected.

Purpose: The applicant authorizes Product Hackers to analyze the documents sent, all content that is directly accessible through search engines (Bing, Google, Baidu, DuckDuckGo, etc.), profiles maintained on professional social networks (LinkedIn, Xing, Viadeo, etc.), data obtained in access tests, and information revealed in the job interview, with the aim of assessing their candidacy and possibly offering them a position. Product Hackers may use the data duly anonymized to make statistics on the type of person who presents themselves as a candidate, with the idea of publishing reports on it.

I.D.6.- WIFI FOR VISITORS

We store information about the connected device, not about the browsing. At Product Hackers, we offer a specific SSID so that clients and other visitors can navigate the Internet for free. We store the following data of each device that connects: name, MAC, IP, channel (wifi or ethernet), and moment of connection. We do not store information about browsing

Purpose and legitimacy: Security measure necessary to know which devices connect to the network of Product Hackers and, if necessary, be able to block the connection to unauthorized ones.

I.E.- PROCESSORS OUTSIDE THE EEA

Storage and encryption. Product Hackers uses Mac computers that have the hard drive encrypted and cloud storage services offered by Google that ensure the encryption of the information.

Email. The email service of Product Hackers is provided using the services of Google Inc.

Social Networks. Product Hackers makes use of the American social network Twitter, as well as services from Automattic, towards which an international transfer of data, of analytical and technical type in relation to the Website is made being on their servers where Product Hackers processes the data that, through them, the users, subscribers or browsers deliver to the firm Product Hackers or share with it.

II.- Cookies and local storage policy

This website uses cookies and similar technologies to provide the service, as well as allow us to improve it, by obtaining statistics on its use, and other purposes.

Browsing this website necessarily implies the use of cookies and similar technologies as long as it is necessary for its operation. Likewise, for certain purposes, cookies and local storage will be subject to your prior consent. You can accept or reject cookies through the established configuration system, and it is also possible to configure the browser to prevent their use.

This policy is part of our privacy policy and includes the following:

  • What are cookies?
  • What are cookies used for?
  • What do we understand by technologies similar to cookies?
  • What are third-party cookies? Who are the recipients of the information?
  • How long are cookies or similar technologies active?
  • Use of browsers with private browsing mode
  • How to prevent the use of cookies and how to delete them?
  • Detailed information on the cookies used by this website

What are cookies?

“Cookies” are small temporary files that are created on the user’s device (computer, phone, tablet, etc.) when visiting a website, and that allow the website to store or retrieve information when browsing, for example, to save your usage preferences or to recognize you on subsequent visits, as well as obtain information about your browsing habits.

When a website creates a cookie on the user’s device, the address/domain of the website that created the cookie, the duration of the cookie which can range from a few minutes to several years, as well as the content of the cookie is stored. The user can disable cookies at any time through the cookie configuration system of this website, as well as configure their browsing program to prevent (block) the use of cookies by certain websites, as well as delete previously stored cookies.

What are cookies used for?

The most common uses or purposes are:

Essential technical cookies. They are used to manage the flow of navigation within the web or to keep the user connected to it. Disabling them may mean that some section of the web does not function properly.

Customization cookies. Necessary to remember certain user preferences.

Analytical cookies. They help us and third parties to collect information on the origin of the users and their navigation within the web, for the purpose of performing a statistical analysis to improve the structure and content.

Advertising cookies. Used to manage the ads that appear on the web, decide the content or the frequency of the ads.

Behavioral advertising cookies. They help collect the user’s browsing habits to create a profile of their interests and to show ads adapted to them.

Social sharing cookies. They are necessary to identify the user on their social networks and thus allow them to share content.

What do we understand by technologies similar to cookies?

Technologies similar to cookies are understood as any type of data storage and retrieval mechanism that is used on the user’s device to obtain information. The most common include:

Local storage of the browser. Some websites use local storages called “sessionStorage” and “localStorage”, as well as the browser’s indexed database, to store information;

Local storage of browser plugins, such as the local storage of Flash (“Flash Local Shared Objects”) or the local storage of Silverlight (“Isolated Objects”).

The “web beacon” is a tracking technique that consists of inserting on a web page (or in an email) an image hosted on an Internet server so that, when the browser or email program connects to said server to download and view the image, the connection is registered. This allows knowing that the user has viewed the web page or the email. Sometimes this image is very small or transparent so that the user is not aware of its existence.

“Fingerprinting” techniques combine information obtained from the browser or navigation equipment to distinguish a user in their subsequent visits to different websites.

What are third-party cookies? Who are the recipients of the information?

Cookies on this website can be classified, based on who creates them, into two categories:

Own cookies: they are created and managed from our websites and domains, with the information obtained managed directly or indirectly by us for our own purposes.

Third-party cookies: are cookies that are created and managed from other websites that, although not completely under our control, provide functions and features that we have decided to include on our website, such as: interactive maps, videos and multimedia elements, buttons to share on social networks, ads, etc. These cookies are under the control of the third party that provides the corresponding function.

The vast majority of third-party functions involve access or collection of information (and the use of cookies) by the third party that provides the function, based on their own criteria and purposes, including the collection of browsing habits to show personalized advertising. In the following section, the functions and features of third parties used on this web page are indicated.

How long are cookies or similar technologies active?

Depending on their permanence or activity time, we can differentiate between:

Session temporary cookies; remain stored on the navigation equipment until the user leaves the web page; the browser deletes them at the end of the browsing session.

Persistent cookies; remain on the navigation equipment and the website reads them each time the user makes a new visit. These cookies are automatically deleted after a certain period of time, which can be short or very long.

This policy includes information about the duration of cookies; for more information, consult our privacy policy, as well as the information provided in the privacy policies of third-party web feature providers.

Use of browsers with private browsing mode

If you want to use this website with a greater degree of privacy and limiting the cookies to be stored for long periods of time, we recommend that you use a web browser that has a “private” browsing option. You can obtain information about this possibility on the help pages of the most common browsers.

How to prevent the use of cookies and how to delete them?

You can configure your preferences at any time through the cookie configuration system integrated into this website, you can activate/deactivate the use of cookies according to their purposes.

Most browsers allow globally disabling cookies. Many browsers also allow deleting cookies associated with specific websites/domains. For this, the user must consult the help of their browser. Below are links to the help pages of the most common browsers to learn about the cookie settings in each one:

Chrome: https://support.google.com/chrome/answer/95647?hl=es

Explorer: https://support.microsoft.com/es-es/help/17442/windows-internet-explorer-delete-manage-cookies

Microsoft Edge: https://privacy.microsoft.com/es-ES/windows-10-microsoft-edge-and-privacy

Firefox: https://support.mozilla.org/es/kb/habilitar-y-deshabilitar-cookies-sitios-web-rastrear-preferencias

Safari: https://support.apple.com/kb/PH17191?viewlocale=es_ES&locale=es_ES

Safari for IOS: https://support.apple.com/es-es/HT201265

Opera: http://www.opera.com/es/help

To delete data stored in the browser’s local storage, the user can delete the browsing history.

To know how to delete the local storage of Flash or to limit the amount of space allowed, consult the Adobe Help pages: http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager07.html

For other browsers, as well as for any clarification or question about the cookies on this website, you can contact us through the contact details of the website.

Important notice: in case of blocking cookies, certain services or functionalities of the website may not work correctly.

Detailed information on the cookies used by this website

Information on own cookies:

Functional/technical cookies: Necessary to correctly display the website and ensure the proper functioning of the site. They allow you to navigate on our website and use the different options or services it offers. With them, we can, for example, control traffic and data communication, identify you during the session, give you access to restricted access areas, and use security elements during your browsing.

Analytical Cookies: They are used to analyze the behavior of users in an aggregated and anonymous way including the number of visitors to the website and different internal pages, the origin of the visits, day and time, platform, search words used by a user to find their desired content.

Information on Third-Party Cookies:

They are cookies managed and controlled by Third Parties, with the purpose of performing/providing functionalities, performing navigation analysis, personalization of navigation and searches, as well as compartmental advertising.

Functional/technical cookies: They allow you to navigate through our page, using the different options or services we offer you, such as, for example, viewing videos or sharing content through social networks.

OwnerDuration Information about use and purposeCookie_notice_accepted1 monthThis cookie remembers if the cookie warning message has been accepted to stop showing it for the time it is active.pil_language6 hoursown cookie called pll_language. It is a persistent cookie (6 hours duration) and personalization. It belongs to the WordPress plugin Polylang and allows saving the language in which the site will be displayed to the user.

Analytical cookies: These third parties provide us with statistical information on the behavior of different users on our website to introduce improvements based on the analysis of data on the use of products and/or services on the website.

Third Party OwnerDurationInformation about use and purposeGoogle Analytics (_ga)2 yearsThese cookies are used to collect information about how our website visitors use these web pages. All information is collected anonymously and may include data such as the browser being used, number of pages viewed. This information helps us improve this website and your experience when visiting us.Google Analytics (_gid, _gat_UA-156564397-1)24 hoursThese cookies are used to collect information about how our website visitors use these web pages. All information is collected anonymously and may include data such as the browser being used, number of pages viewed. This information helps us improve this website and your experience when visiting us.Microsoft Clarity (_clck, _clsk)1 yearThese cookies are used to analyze user behavior on our website, through session replays and heat maps. Microsoft Clarity does not show any personal information to our company.

III.- Confidentiality and document custody period

Professional secrecy. The professionals working at Product Hackers and who had any type of intervention in the services provided to the client, are committed not to disclose or make use of the information they have accessed by reason of their profession. The information provided by the client will, in any case, be considered confidential, without being able to be used for purposes other than those related to the services contracted to Product Hackers. Product Hackers undertakes not to disclose or reveal information about the client’s claims, the reasons for the advice requested, or the duration of its relationship with it.

Documentary custody. With the aim of preserving and guaranteeing confidentiality, Product Hackers commits to destroy all the confidential information to which it has had access by reason of a service provision once 90 days have elapsed since the end of the service to the Client, unless there is a legal obligation for its conservation. If the Client wishes to keep the original or a copy of such information, they must print it or save it by their own means or go to the headquarters of Product Hackers to collect it before its destruction.

IV.- Brand, domain, and content of the Product Hackers websites

Product Hackers, security manager of Product Hackers, is the sole owner of the proprietary rights existing over the “Product Hackers” brand, the domains, and the other digital assets, including the contents of the website and the profiles on social networks.

The literary contents of the Website are registered and offered under the license indicated at the bottom of the page. All non-literary contents, those on which another applicable license is indicated, distinctive signs (brands, trade names, etc.) and the template whose authorship and license of use should be consulted on the web that links from there are excluded from this license.

The Website contains texts prepared for purely informative or divulgative purposes that may not reflect the current state of legislation or jurisprudence and that refer to general situations so its content can never be applied by the user to specific cases. The opinions expressed therein do not necessarily reflect the views of Product Hackers. The content of the articles published on this Website cannot be considered, in any case, a substitute for legal advice. The user should not act on the basis of the information contained in this Website without previously seeking the corresponding professional advice.

The external links contained in this Website lead to sites managed by third parties. Product Hackers is not responsible for the contents or the state of such sites. The use of external links also does not imply that Product Hackers recommends or approves the contents of the landing pages.

V.- Norms and conflict resolution

The present Conditions of Use of the Website are governed in each and every one of their aspects by Spanish law. The language of drafting and interpretation of this legal notice is Spanish. This legal notice will not be filed individually for each user but will remain accessible via the Internet on this Website.

To resolve any controversy or claim arising from any activity of Product Hackers in the framework of a service that requires membership and that has been provided as a lawyer by Product Hackers, the Client must go to the corresponding body of the ICAM.

Users who have the status of consumers or users as defined by Spanish legislation and reside in the European Union, if they have had a problem with an online purchase made to Product Hackers, to try to reach an out-of-court agreement they can go to the Online Dispute Resolution Platform, created by the European Union and developed by the European Commission under Regulation (EU) 524/2013.

Provided that the User is not a consumer or user, and when there is no rule that obliges otherwise, the parties agree to submit to the Courts and Tribunals of Madrid capital, as this is the place of the contract, with express waiver to any other jurisdiction.

 

Privacy Overview

This website uses cookies and similar technologies to provide the service, as well as allow us to improve it, by obtaining statistics on its use, and other purposes.

Browsing this website necessarily implies the use of cookies and similar technologies as long as it is necessary for its operation. Likewise, for certain purposes, cookies and local storage will be subject to your prior consent. You can accept or reject cookies through the established configuration system, and it is also possible to configure the browser to prevent their use.

You can take a look at our Privacy Policy here: https://conference.producthackers.com/privacy-policy/