We value your privacy
This policy affects Testa Center and our websites at: testacenter.com and testachallenge.com
We value your privacy!
Testa Center protects your privacy and prioritizes to protect information that you share with us in accordance to the data protection laws of the European union. Therefor only a limited number of by Testa Center selected people have access to the information you share.
What personal data we collect and why we collect it
If you submit data in a contact form your information will be stored with Testa Center and our Customer Relationship Management system at Hubspot.com.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Your usage of our web-pages are measured by and shared with Google Analytic services for Testa Center to be able to understand the need of improvement in our website.
We Hubspot.com for analytics who will set a (3rd party) temporary cookie to your browser.
Who we share your data with
We collect information about visitors who comment on Sites that use our Akismet anti-spam service. The information we collect depends on how the User sets up Akismet for the Site, but typically includes the commenter’s IP address, user agent, referrer, and Site URL (along with other information directly provided by the commenter such as their name, username, email address, and the comment itself).
Form data is sent to and stored at Hubspot.com
Sales and marketing data is shared with our business partners under GDPR and NDA constraints; Cytiva and STUNS.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service, Akismet.
How we protect your data
We carefully evaluate our business partners for digital tools, and restrict sharing of personal information in a way to minimize the exposure to personal and business information, to use only whats needed.
What data breach procedures we have in place
In the event of a breach we activate our incident response team to handle the incident, minimize the damage, notify those whose data has been breached and legally pursue the perpetrator(s).