Círculo de emprendedoras makes available through the website https://circulodeemprendedoras.com. this privacy policy in order to inform you, in detail, about how we treat your personal data and protect your privacy and the information you provide to us. In the event of future modifications to the same, we will inform you through the web page or other means so that you can be informed of the new privacy conditions introduced.

In compliance with Regulation (EU) 2016/679, General Data Protection and Organic Law 3/2018, of December 5, on Personal Data Protection and guarantee of digital rights we inform you of the following:

Responsible for the treatment

Identity: ALOHA VERA: ESPACIO DE EXPERIENCIAS IDIOMÁTICAS, S.L., with NIF B86820404
Dir. Postal: Calle Altozano 10, 10450 Jarandilla de la Vera, Cáceres, Spain
E-mail: info@circulodeemprendedoras.com
Website: https://circulodeemprendedoras.com

For what purposes do we process your personal data?

El círculo de emprendedoras collects and treats your personal information in general to manage the relationship we have with you. The main purposes we have identified are the following:

How do we collect your information?

We collect your personal information through different means:

You will always be informed at the time of collection by means of informative clauses about the data controller, the purpose and legal basis of the processing, the recipients of the data and the period of conservation of your information, as well as the way in which you can exercise your rights regarding data protection.

In general, the personal information we process is limited to identification data (name and surname, date of birth, address, ID number, telephone number and e-mail address).

The circle of women entrepreneurs uses social networks and this is another way to reach you. The information collected through the messages and communications you post may contain personal information that is available online and accessible to the public. These social networks have their own privacy policies explaining how they use and share your information, so we recommend that you consult them before using them to confirm that you agree with the way in which your information is collected, treated and shared.

Also, this website collects cookies, which can be found at the following link: COOKIES POLICY

User’s responsibility

By providing us with your data through electronic channels, the user guarantees that he/she is over 14 years of age and that the data provided to the circle of female entrepreneurs is true, accurate, complete and up to date. To this effect, the user confirms that he/she is responsible for the veracity of the data provided and that he/she will keep such information conveniently updated so that it corresponds to his/her real situation, being responsible for any false or inaccurate data that he/she may provide, as well as for any damages, direct or indirect, that may arise.

How long do we keep your information?

We will only keep your information for the period of time necessary to fulfill the purpose for which it was collected, to comply with the legal obligations imposed on us and to meet the possible responsibilities that may arise from the fulfillment of the purpose for which the data were collected.

If at any time we have collected your data to address you as a potential user of our services or to respond to a request for information made by you, such data will be retained for a maximum of 6 months from its collection, and will be deleted after that period if a contractual relationship has not been formalized or at the time you request us to do so.

In any case, and as a general rule, we will keep your personal information as long as there is a contractual relationship that binds us or you do not exercise your right of deletion and / or limitation of treatment, in which case, the information will be blocked without giving use beyond its conservation, while it may be necessary for the exercise or defense of claims or could derive some kind of liability that had to be addressed.

To whom do we communicate your data?

In general, we do not share your personal information, except for those disclosures that we are required to make based on legally imposed obligations.

Although it is not a transfer of data, in order to provide you with the requested service it may be that third party companies, acting as our suppliers, access your information to carry out the service we have contracted from them. These persons in charge access your data following our instructions and without being able to use them for a different purpose and maintaining the strictest confidentiality.

Likewise, your personal information will be at the disposal of the Public Administrations, Judges and Courts, for the attention of possible liabilities arising from the treatment.

International data transfers

We have agreed with our suppliers that, for the provision of the contracted service, they make use of servers located in the EEA and if, in the future, we need to make use of servers located outside the EU territory, appropriate measures will be taken, which will be incorporated into this Privacy Policy, ensuring that there are adequate safeguards.

What are your rights regarding the processing of your data and how can you exercise them?

Data protection regulations allow you to exercise your rights of access, rectification, deletion and portability of data and opposition and limitation to their processing, as well as not to be subject to decisions based solely on the automated processing of your data, where appropriate.

These rights are characterized by the following:

In order to facilitate their exercise, we provide links to the application form for each of the rights:

Form to exercise the right of access

Form for exercising the right of rectification

Form for exercising the right to object

Form for exercising the right of deletion (“right to be forgotten”)

Form for exercising the right to limit the processing of personal data

Form for exercising the right to portability

Form of exercise of the right not to be subject to automated individual decisions

To exercise your rights we have the following means at your disposal:

  1. By means of a written and signed request addressed to the postal address of the data controller with Ref. Exercise of LOPD Rights.
  2. By sending a scanned and signed form to the e-mail address of the data controller indicated above, indicating in the subject Exercise of Rights LOPD.

In both cases, you must prove your identity by attaching a photocopy or, if applicable, a scanned copy of your ID card or equivalent document in order to verify that we are only responding to the interested party or his legal representative, in which case you must provide proof of representation.

Likewise, and especially if you consider that you have not obtained full satisfaction in the exercise of your rights, we inform you that you may file a complaint with the national supervisory authority by contacting the Spanish Data Protection Agency, C/ Jorge Juan, 6 – 28001 Madrid.

How do we protect your information?

We are committed to protecting your personal information.

We use reasonably reliable and effective physical, organizational and technological measures, controls and procedures aimed at preserving the integrity and security of your data and ensuring your privacy.

In addition, all personnel with access to personal data have been trained and are aware of their obligations in relation to the processing of their personal data.

In the case of the contracts we sign with our suppliers, we include clauses in which they are required to maintain the duty of secrecy regarding the personal data to which they have had access by virtue of the order made, as well as to implement the necessary technical and organizational security measures to ensure the confidentiality, integrity, availability and permanent resilience of the systems and services for the processing of personal data.

All these security measures are reviewed periodically to ensure their adequacy and effectiveness.

However, absolute security cannot be guaranteed and no security system is impenetrable, so in the event that any information under our control and under our control is compromised as a result of a security breach, we will take appropriate steps to investigate the incident, notify the Control Authority and, where appropriate, those users who may have been affected to take appropriate action.