Privacy Policy

Privacy Policy describes the principles of processing information about you, including personal data and cookies, known as cookies.

I. General Information

  1. This policy applies to the website, operating under the URL address: hit-glio.eu.
  2. The data controller is: The Nencki Institute of Experimental Biology of the Polish Academy of Sciences, ul. Pasteura 3, 02-093 Warsaw.
  3. All questions and requests regarding the processing of personal data should be sent to our Data Protection Officer’s contact email address: iod@nencki.edu.pl.
  4. Your personal data is processed in accordance with the Regulation of the European Parliament and Council (EU) 2016/679 of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, repealing Directive 95/46/EC (GDPR).
  5. We take particular care to protect the interests of the persons whose data is processed, ensuring that the data we collect is: a. processed lawfully; b. collected for specific, legitimate purposes and not subjected to further processing incompatible with those purposes; c. factually correct and adequate to the purposes for which it is processed, and stored in a form that allows the identification of the persons it concerns for no longer than necessary to achieve the processing purpose.

II. Scope of Collected Data

  1. Your personal data is collected and processed only based on appropriate legal grounds.
  2. The personal data processed by the Administrator mainly includes data contained in the content of messages voluntarily sent to us: first and last name, email address.

III. Purposes and Legal Bases for Data Collection

  1. Your personal data is processed for the following purposes: a. to take actions at your request before entering into an agreement and to perform the agreement – processing based on Article 6(1)(b) GDPR, i.e., to carry out actions necessary for the conclusion of an agreement or actions taken before its conclusion; b. to comply with legal obligations incumbent on the Administrator in the area of finance and accounting – processing based on Article 6(1)(c) GDPR; c. to respond to inquiries directed to us by phone or sent via the contact form available on the website – processing based on Article 6(1)(f) GDPR, i.e., the legitimate interest of the administrator related to building and developing relationships with our clients; d. to pursue and defend potential claims – processing based on Article 6(1)(f) GDPR, i.e., the legitimate interest of the Administrator.

IV. Processing Period

  1. Your personal data will be processed only for the period necessary to achieve the purpose for which it was collected, i.e.: a. for the period necessary to perform the Agreement and thereafter for the limitation period of claims, i.e., up to 6 years from the date of completion or settlement; b. for the period necessary to respond to an inquiry sent via the contact form, but no longer than 6 months from the last contact.
  2. In the case of processing data based on the Administrator’s legitimate interest, your data will be processed until the processing purpose ceases (e.g., limitation of claims) or until a valid objection is raised.

V. Data Recipients

  1. The Administrator may transfer personal data only to trusted recipients, such as entities providing and servicing IT systems or solutions, entities supporting website management, marketing service providers, and law firms providing services to the Administrator, based on separately concluded processing agreements.
  2. Personal data is not transferred to third countries within the meaning of data protection regulations, which means we do not transfer it outside the European Union.

VI. Rights of Individuals

  1. At any time, you have the right to: a. withdraw consent to processing, with withdrawal not affecting the legality of data processing that took place before the withdrawal; b. request access to your personal data; c. request the rectification of your personal data; d. request the deletion or restriction of the processing of your personal data; e. object to the processing of data, noting that the right to object cannot be exercised if there are legally justified grounds for processing that override your interests, rights, and freedoms, particularly for the establishment, exercise, or defense of claims.
  2. To exercise your rights, we encourage you to contact our Data Protection Officer directly via email: iod@nencki.edu.pl.
  3. If you have doubts regarding the respect of your rights, you have the right to lodge a complaint with the supervisory authority (President of the Personal Data Protection Office).

VII. Privacy Statement – Website Usage and Data Protection Principles

  1. In this privacy statement, we explain what we do with the data we obtain about you via https://idea-fast.eu. We recommend that you read this statement carefully.
  2. Third-party websites This privacy statement does not apply to third-party websites to which links are provided on our website. We cannot guarantee that these third parties will process your personal data reliably and securely. We recommend that you read the privacy statements of these websites before using them.
  3. The website performs the functions of obtaining information about users and their behavior in the following ways: a. By voluntarily entering data into forms, which are then entered into the Operator’s systems. b. By storing cookies (so-called “cookies”) on end devices. c. Consent to data processing is voluntary but necessary for the operation of the Service.

VIII. Selected Data Protection Methods Used by the Operator

  1. Login and data entry points are protected at the transmission layer (SSL certificate). This ensures that personal data and login data entered on the site are encrypted on the user’s computer and can only be read on the target server.
  2. Personal data stored in the database is encrypted in such a way that only the Operator with the key can read it. This way, the data is protected in case the database is stolen from the server.
  3. User passwords are stored in a hashed form. The hashing function is one-way, meaning it cannot be reversed, which is currently a modern standard for storing user passwords.
  4. The service uses two-factor authentication, which provides an additional layer of protection for logging into the Service.
  5. The Operator periodically changes its administrative passwords.
  6. To protect data, the Operator regularly performs backups.
  7. A crucial element of data protection is the regular updating of all software used by the Operator to process personal data, which specifically means regular updates of software components.

IX. Hosting

  1. The service is hosted (technically maintained) on the servers of the operator: cyberFolks.pl.
  2. The hosting company maintains server logs to ensure technical reliability. The logs may include: a. resources identified by URL (addresses of requested resources – pages, files), b. the time the request was received, c. the time the response was sent, d. the client station name – identification performed by the HTTP protocol, e. information about errors that occurred during the HTTP transaction, f. the URL of the page previously visited by the user (referrer link) – if the transition to the Service was made via a link, g. information about the user’s browser, h. information about the IP address, i. diagnostic information related to the self-ordering process through the registrars on the site, j. information related to the handling of email correspondence addressed to the Operator and sent by the Operator.

X. Information in Forms

  1. The service collects information provided voluntarily by the user, including personal data, if provided.
  2. The service may record information about connection parameters (time stamp, IP address).
  3. In some cases, the service may record information that facilitates linking data in the form with the email address of the user filling out the form. In such cases, the user’s email address appears within the URL address of the page containing the form.
  4. Data provided in the form is processed for the purpose resulting from the function of a particular form, e.g., to carry out the service request or contact process, service registration, etc. The context and description of the form clearly inform what it is used for each time.

XI. Administrator Logs

  1. Information about user behavior on the site may be logged. These data are used to administer the service.

XII. Important Marketing Techniques

  1. The Operator uses statistical traffic analysis on the site via Google Analytics (Google Inc., USA). The Operator does not pass personal data to the operator of this service, only anonymized information. The service is based on the use of cookies on the user’s end device. Within the scope of information about user preferences collected by Google’s advertising network, the user can view and edit the information derived from cookies using the tool: https://www.google.com/ads/preferences/.
  2. Operator uses the Facebook pixel. This technology allows Facebook (Facebook Inc., based in the USA) to know that a registered user of its platform is using the Service. In this case, it relies on data for which Facebook itself is the controller; the Operator does not transmit any additional personal data to Facebook. The service is based on the use of cookies in the user’s end device.

XIII. Cookie Information

  1. The service uses cookies.
  2. Cookies (“cookies”) are IT data, especially text files, stored on the User’s end device and intended for the use of the Service’s websites. Cookies typically contain the name of the website from which they originate, the time of storage on the end device, and a unique number.
  3. The entity placing cookies on the User’s end device and accessing them is the Service operator.
  4. Cookies are used for the following purposes: a. maintaining the Service user’s session (after logging in), so the user does not have to re-enter the login and password on each subpage of the Service; b. achieving the purposes set out above in the “Important Marketing Techniques” section.
  5. Two basic types of cookies are used within the Service: “session” cookies and “persistent” cookies. “Session” cookies are temporary files stored on the User’s end device until logging out, leaving the website, or turning off the software (web browser). “Persistent” cookies are stored on the User’s end device for the time specified in the cookie parameters or until deleted by the User.
  6. Web browsing software (web browser) typically allows cookies to be stored on the User’s end device by default. Users of the Service can change the settings in this regard. The web browser allows for the deletion of cookies. It is also possible to automatically block cookies. Detailed information on this topic can be found in the help section or documentation of the web browser.
  7. Restrictions on the use of cookies may affect some functionalities available on the Service’s website.
  8. Cookies placed on the User’s end device may also be used by entities cooperating with the Service’s operator, particularly companies such as Google (Google Inc. based in the USA), Facebook (Facebook Inc. based in the USA), Twitter (Twitter Inc. based in the USA).
  9. Managing cookies – how to express and withdraw consent in practice?
  1. If a user does not wish to receive cookies, they can change their browser settings. We reserve the right to note that disabling cookies necessary for authentication, security, and user preference maintenance processes may hinder, and in extreme cases may prevent, the use of websites.
  2. To manage cookie settings, select the web browser you are using from the list below and follow the instructions:

○ Edge

○ Internet Explorer

○ Chrome

○ Safari

○ Firefox

○ Opera

  • Mobile devices:

○ Android

○ Safari (iOS)

○ Windows Phone