Privacy Policy - Judo Mobile Console
The following Privacy Policy sets forth rules for storing and accessing data on Users' Devices using the Service for the purpose of providing electronic services by the Administrator, and rules for collecting and processing Users' personal data that they have provided personally and voluntarily through the tools available on the Service.
§1 Explanation of expressions
- Service - the Internet service Judo Mobile Console operating at console.judomobile.app and as a computer program.
- External Service - websites of partners, service providers or service recipients cooperating with the Administrator.
- Service / Data Administrator - the Administrator of the Service and Data Administrator (hereinafter referred to as Administrator) is a natural person, Daniel Górka, residing at steet Batalionu Zośka 3/706, Opole, Poland, providing services electronically through the Service.
- User - a natural person for whom the Administrator provides services electronically through the Service.
- Device - an electronic device with software through which the User accesses the Service.
- Cookies - text data collected in the form of files placed on the User's Device.
- GDPR - Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation).
- Personal data - means information about an identified or identifiable natural person ("data subject"); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of the natural person.
- Processing - means an operation or set of operations performed on personal data or sets of personal data in an automated or non-automated manner, such as collection, recording, organizing, structuring, storing, adapting or modifying, downloading, viewing, using, disclosing by transmission, dissemination or otherwise making available, matching or linking, restricting, erasing or destroying;
- Restriction of processing - means the marking of stored personal data for the purpose of limiting its future processing.
- Profiling - means any form of automated processing of personal data that involves the use of personal data to evaluate certain personal factors of an individual, in particular to analyze or forecast aspects of that individual's performance, economic situation, health, personal preferences, interests, reliability, behavior, location or movement
- Consent - expression of the data subject's will means a voluntary, specific, informed and unambiguous demonstration of will by which the data subject, in the form of a statement or explicit affirmative action, consents to the processing of personal data concerning him or her
- Personal data breach - means a breach of security leading to the accidental or unlawful destruction, loss, modification, unauthorized disclosure of, or unauthorized access to personal data transmitted, stored, or otherwise processed
- Pseudonymization - means the processing of personal data in such a way that it can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is stored separately and is covered by technical and organizational measures preventing its attribution to an identified or identifiable natural person
- Anonymization - the intentional modification of data. It is an irreversible process of data operations that destroys / overwrites "personal data" making it impossible to identify, or associate a particular record with a specific user or individual.
§2 Data storage security
- Cookie Storage and Reading Mechanisms - The mechanisms for storing, reading and exchanging data between Cookies stored on the User's Device and the Website are implemented through the built-in mechanisms of Internet browsers and do not allow the downloading of other data from the User's Device or data of other websites visited by the User, including personal data or confidential information. It is also virtually impossible to transfer viruses, Trojan horses and other worms to the User Device.
- Internal cookies - the cookies used by the Administrator are safe for the Users' Devices and do not contain scripts, content or information that may compromise the security of personal data or the security of the Device used by the User.
- External cookies - The Administrator makes every possible effort to verify and select service partners in the context of Users' security. The Administrator selects well-known, large partners with global public trust for cooperation. However, it does not have full control over the content of cookies from external partners. The Administrator is not responsible for the security of Cookie files, their content and their use in accordance with the license by the Scripts installed in the service, coming from external Services, as far as the law allows. The list of partners is provided later in the Privacy Policy.
- Control of Cookies.
- The user can at any time, independently change the settings for storing, deleting and accessing the data of stored cookies by each website
- Information on how to disable Cookies depends on the browser and is usually available in the browser's help menu.
- The User may at any time delete any cookies stored to date using the tools of the User's Device through which the User accesses the services of the Website.
- **Dangers on the side of the User ** - The Administrator uses all possible technical measures to ensure the security of the data placed in cookies. However, it should be noted that ensuring the security of this data depends on both parties including the activities of the User. The Administrator is not responsible for the interception of this data, impersonation of the User's session or its deletion, as a result of the User's conscious or unconscious activity, viruses, Trojan horses and other spyware with which the User's Device may be or was infected. In order to protect themselves from these threats, Users should adhere to the Safe Internet Use Policy.
- Personal Data Storage - The Administrator ensures that it makes every effort to ensure that the processed personal data voluntarily entered by Users is secure, access to it is limited and carried out in accordance with its purpose and the purposes of processing. The Administrator also ensures that it makes every effort to secure the data in its possession against loss, through the use of appropriate physical as well as organizational safeguards.
- Password storage - The Administrator declares that passwords are stored in encrypted form, using the latest standards and guidelines in this regard. It is virtually impossible to decrypt account passwords provided on the Service.
§3 Purposes for which cookies are used
- Streamlining and facilitating access to the Service
- Personalizing the Service for Users
- Enabling logging into the Service
- Keeping statistics (users, number of visits, types of devices, link, etc.)
- Provision of community services