Privacy Policy

Effective Date: 28 November 2025

THIS PRIVACY POLICY (the "policy") DESCRIBES HOW RM HOLDING GMBH, AUCHTWEIDE 32, D-87775 SALGEN, GERMANY (the "controller"), COLLECTS, USES, STORES, AND PROCESSES PERSONAL DATA IN CONNECTION WITH THE USE OF THE WEBSITE, DOCUMENTATION, AND SOFTWARE-AS-A-SERVICE PLATFORM "offgen" (the "services"). BY ACCESSING OR USING THE SERVICES, THE USER (the "user") ACKNOWLEDGES AND AGREES TO THE PRACTICES DESCRIBED IN THIS POLICY. IF THE USER DOES NOT AGREE WITH THIS POLICY, THE USER MUST NOT ACCESS OR USE THE SERVICES.

THIS POLICY APPLIES TO BOTH WEBSITE VISITORS AND USERS OF THE SERVICES, AND OPERATES IN ACCORDANCE WITH THE GENERAL DATA PROTECTION REGULATION (EU) 2016/679 ("GDPR") AND OTHER APPLICABLE DATA PROTECTION LAWS.

1. DEFINITIONS

Clarifying key terms used throughout this policy

1.1 Defining core privacy terms

"controller" means RM Holding GmbH, determining the purposes and means of the processing of personal data collected through the services.

"user" means any natural person accessing the website, interacting with documentation, or using the services on behalf of a corporate customer.

"personal data" means any information relating to an identified or identifiable natural person, as defined under Article 4(1) GDPR.

"processing" means any operation performed on personal data, such as collection, storage, transmission, or deletion.

"services" means the offgen application, including the web platform, Microsoft Office add-in, documentation pages, and associated functionalities.

"technical and organizational measures" or "toms" means safeguards implemented by the controller to protect personal data in accordance with Article 32 GDPR.

1.2 Defining roles of the parties

RM Holding GmbH acts as controller for: (a) website analytics, (b) customer accounts and authentication, (c) billing and subscription administration, (d) support interactions, (e) monitoring of product usage and performance.

The corporate customer acts as a separate controller for personal data uploaded by its users into slide content or AI prompts. The controller does not access or inspect such content except as required to operate the services.

1.3 Identifying third-party providers

"sub-processors" means third-party providers supporting the services, including but not limited to:

  • PostHog (analytics)
  • SendGrid (email communication)
  • Lemlist (outbound communication)
  • Attio (CRM)
  • Cognism (prospecting data)
  • Microsoft (authentication)
  • AWS, Hetzner, Neon (hosting)
  • Stripe (billing)

These providers process personal data in accordance with their respective privacy commitments and data protection addenda.

2. PERSONAL DATA COLLECTED

Identifying the categories and sources of personal data processed through the services

2.1 Collecting data provided directly by the user

The controller collects personal data voluntarily provided by the user, including: (a) name, (b) email address, (c) Microsoft 365 authentication details, (d) organization and tenant identifiers, (e) billing and subscription information, (f) communication content sent to support channels, (g) preferences and configuration settings within the services.

This information is collected during account creation, login, subscription management, or direct communication with the controller.

2.2 Capturing data processed automatically during use of the services

When a user accesses or interacts with the services, the controller automatically processes technical data, including: (a) IP address, (b) browser type and version, (c) device and operating system identifiers, (d) timestamp and session information, (e) telemetry and performance metrics, (f) page views, feature usage, and navigation patterns.

Such data is collected through server logs, Microsoft Office add-in APIs, telemetry endpoints, and secure product instrumentation.

2.3 Collecting data through cookies and local storage

The services use strictly necessary cookies and local storage technologies to: (a) maintain user sessions, (b) enable authentication flows, (c) store preferences and interface states, (d) ensure security and fraud prevention, (e) enable core operational functionality.

The services do not use advertising cookies or third-party marketing pixels.

2.4 Gathering pseudonymised analytics data

The controller uses PostHog to collect pseudonymised analytics data, including: (a) user actions within the services, (b) feature usage metrics, (c) performance indicators, (d) aggregated behavioral statistics.

All analytics data is pseudonymised and processed without identifying natural persons unless explicitly necessary for debugging or support.

2.5 Processing data through external communication and CRM tools

The controller may process personal data through third-party communication or CRM tools, including:

  • SendGrid (transactional email delivery),
  • Lemlist (outbound communication),
  • Attio (customer relationship management),
  • Cognism (prospecting and enrichment where permitted by law).

These tools may receive: (a) name, (b) email address, (c) company affiliation, (d) communication metadata, (e) subscription or interest category.

No slide content or AI prompt data is transferred to these tools.

2.6 Collecting data embedded in customer-generated content

The services may technically process metadata derived from slide files or AI prompts, such as structural layout information, formatting parameters, and feature usage patterns.

However, the controller does not: (a) read, (b) extract, (c) store, (d) analyse, or (e) scan any personal data contained within slide content or AI prompts, except where strictly required to operate the services.

The customer remains solely responsible for any personal data embedded in such content.

2.7 Processing billing and payment-related information

Subscription and payment information is processed through Stripe, including: (a) billing contact details, (b) payment method metadata, (c) invoice history, (d) transaction identifiers, (e) tax information where required.

The controller does not store full credit card numbers.

2.8 Handling communications and support interactions

When the user contacts the controller through email or the documentation website, the controller may process: (a) email content, (b) attachments voluntarily provided, (c) metadata associated with the request, (d) follow-up communication history.

Support requests may be processed internally or via third-party systems integrated for workflow efficiency.

3. PURPOSES OF PROCESSING

Explaining the legitimate and operational purposes for which personal data is processed

3.1 Providing and operating the services

The controller processes personal data to operate, maintain, and deliver the services, including: (a) enabling authentication via Microsoft 365, (b) providing access to the offgen add-in and platform, (c) restoring sessions and preserving state, (d) ensuring technical functionality and performance, (e) enabling AI-assisted features and content-generation tools, (f) maintaining compatibility with Microsoft Office environments.

3.2 Managing accounts, subscriptions, and billing

Personal data is processed to: (a) create and manage user accounts, (b) administer subscriptions and renewals, (c) issue invoices and process payments, (d) manage tax and regulatory obligations, (e) verify customer eligibility for enterprise features.

Billing data is processed in cooperation with Stripe.

3.3 Delivering communications and support

The controller processes personal data to: (a) respond to support inquiries, (b) send operational or security-related updates, (c) provide onboarding and enterprise implementation assistance, (d) deliver transactional messages via SendGrid.

Personal data is not used to send unsolicited marketing unless permitted under applicable law.

3.4 Conducting pseudonymised analytics and product improvement

The controller uses pseudonymised analytics data to: (a) measure feature usage, (b) identify usability patterns, (c) detect issues and optimize performance, (d) plan roadmap and product improvements.

No identifiable user content is used for model training or analytics beyond what is necessary for operating the services.

3.5 Ensuring security, integrity, and compliance

Personal data is processed to: (a) monitor system integrity, (b) prevent fraud or abuse, (c) detect unauthorized access, (d) maintain audit logs, (e) comply with legal obligations, (f) implement security incident responses.

Support logs and telemetry may be used to detect misuse or enforce the agreement.

3.6 Facilitating outbound communication and CRM operations

Where permitted under applicable law and initiated by the user or organization, personal data may be processed in: (a) Lemlist for outreach communication, (b) Attio for CRM management and pipeline operations, (c) Cognism for business-to-business prospecting where legally permissible.

No slide content or AI prompt data is shared with these tools.

3.7 Complying with legal and contractual requirements

Personal data is processed to: (a) meet statutory retention obligations, (b) comply with financial and tax regulations, (c) fulfil contractual duties under the agreement, (d) respond to lawful requests from authorities.

3.8 Excluding prohibited purposes

The controller does not process personal data for: (a) advertising or profiling unrelated to the services, (b) sale or transfer to third parties, (c) training of third-party AI models, (d) monitoring of slide content beyond operational necessity, (e) automated decision-making with legal effects.

4. LEGAL BASES FOR PROCESSING

Identifying the lawful grounds under which personal data is processed in accordance with the GDPR

4.1 Fulfilling contractual obligations (Article 6(1)(b) GDPR)

The controller processes personal data where necessary to: (a) provide access to the services, (b) authenticate users via Microsoft 365, (c) operate the offgen add-in, (d) deliver AI-assisted features, (e) manage accounts, subscriptions, and enterprise implementations, (f) provide support and troubleshooting.

Without this processing, the services cannot function.

4.2 Complying with legal obligations (Article 6(1)(c) GDPR)

Personal data is processed to comply with: (a) financial reporting rules, (b) tax and invoicing regulations, (c) data retention obligations, (d) security, audit, and fraud-prevention requirements, (e) lawful requests from authorities.

Such processing is limited to what is strictly necessary.

4.3 Pursuing legitimate interests (Article 6(1)(f) GDPR)

The controller processes certain personal data based on legitimate interests, including: (a) ensuring the stability, availability, and security of the services, (b) protecting the services from misuse or unauthorized access, (c) improving performance, functionality, and user experience, (d) analyzing aggregated or pseudonymised usage patterns, (e) conducting permissible business-to-business outreach.

These interests do not override the fundamental rights of the user.

4.4 Obtaining consent where required (Article 6(1)(a) GDPR)

The controller may process personal data based on explicit consent for specific scenarios, including: (a) optional newsletters or product updates via SendGrid, (b) optional CRM-related actions triggered by outreach channels, (c) optional feedback submissions or surveys, (d) optional use of certain analytics features, where legally required.

Consent may be withdrawn at any time without affecting prior lawful processing.

4.5 Excluding special categories of personal data (Article 9 GDPR)

The services are not designed to process special category data such as: (a) health information, (b) political opinions, (c) religious beliefs, (d) biometric identifiers.

If the customer uploads such data into slide content or AI prompts, the customer acts as the independent controller and bears full responsibility.

4.6 Establishing the controller–controller boundary for customer content

For any personal data contained in slide content or AI prompts: (a) the corporate customer acts as the independent controller, (b) the controller (RM Holding GmbH) processes only what is necessary for technical operation, (c) no training is performed on such content, (d) the controller retains no independent control over such data.

5. SHARING OF PERSONAL DATA

Explaining when and with whom personal data may be shared in the course of providing the services

5.1 Engaging sub-processors for operational purposes

The controller shares personal data with carefully selected sub-processors who support the technical and operational delivery of the services, including: (a) AI infrastructure providers (OpenAI, Anthropic, Google Gemini), (b) hosting providers (AWS, Hetzner, Neon), (c) analytics provider (PostHog), (d) authentication and platform provider (Microsoft), (e) payment processor (Stripe), (f) email delivery platform (SendGrid), (g) CRM and outreach tools (Attio, Lemlist, Cognism).

Sub-processors process personal data strictly in accordance with contractual data protection obligations and only to the extent required to support the services.

5.2 Sharing data with payment service providers

For subscription billing and payment processing, certain personal data is shared with Stripe, including: (a) billing contact details, (b) transaction metadata, (c) invoice identifiers, (d) subscription status.

Payment card information is handled solely by Stripe and is not stored by the controller.

5.3 Transmitting communications through service providers

When the controller sends transactional messages, email confirmations, or support responses, personal data (e.g., name, email address, content of correspondence) may be processed through SendGrid or other communication providers used by the controller.

5.4 Sharing pseudonymised analytics information

Aggregated or pseudonymised usage data may be processed through PostHog to improve performance, stability, and functionality.

Such data does not identify individual users, unless necessary for debugging or support.

5.5 Limiting sharing to authorized purposes

The controller does not: (a) sell personal data, (b) transfer personal data to third parties for advertising or profiling, (c) share slide content or AI prompt data with sub-processors unless technically required to operate the services, (d) allow sub-processors to use personal data for their own purposes.

5.6 Complying with legal disclosures

Personal data may be disclosed where required to comply with: (a) statutory obligations, (b) binding court orders, (c) lawful requests from government authorities. The controller will notify the user or the corporate customer of such disclosures unless prohibited by law.

5.7 Sharing data within the corporate structure

Personal data may be shared within RM Holding GmbH and its affiliates for: (a) administration, (b) accounting, (c) support and customer success, (d) internal security operations.

Such sharing is limited to what is necessary and governed by internal data protection controls.

5.8 Transferring data in the event of corporate changes

In the event of a merger, acquisition, divestiture, or restructuring involving the controller, personal data may be transferred to the acquiring or successor entity, provided that such entity assumes the obligations under this policy.

6. INTERNATIONAL DATA TRANSFERS

Clarifying how personal data is transferred, stored, and protected across jurisdictions

6.1 Transferring personal data to hosting regions

The controller stores and processes personal data in regional hosting locations provided by its infrastructure partners, including AWS, Hetzner, and Neon.

Data may be stored in: (a) the European Union for EU-based users, (b) the United States for US-based users, or (c) other regions geographically aligned with the user's corporate location.

Such transfers are strictly limited to what is required to deliver the services.

6.2 Ensuring lawful cross-border transfers

Where personal data is transferred from the European Economic Area (EEA), Switzerland, or the United Kingdom to a third country lacking an adequacy decision, the controller ensures that transfers are made under one or more of the following safeguards: (a) standard contractual clauses (sccs) adopted by the European Commission, (b) the UK International Data Transfer Agreement (IDTA) or Addendum, (c) supplementary technical and organizational measures, (d) documented transfer risk assessments (TRAs), (e) pseudonymisation where appropriate.

6.3 Applying supplementary safeguards

When personal data is transferred outside the EEA, the controller applies additional safeguards to protect confidentiality and integrity, including: (a) encryption in transit and at rest, (b) strict access controls, (c) access logging, (d) "need-to-know" authorization restrictions, (e) vendor contractual obligations to prevent disclosure to third parties.

6.4 Limiting access by sub-processors

Sub-processors located outside the EEA may access personal data only: (a) when required for support or technical operation, (b) under binding contractual safeguards, (c) with encryption controls preventing unauthorized access, (d) in accordance with this policy and the dpa.

No sub-processor is permitted to use personal data for advertising, profiling, or model training unrelated to the services.

6.5 Communicating information on transfer mechanisms

The controller may provide additional details upon request regarding: (a) specific transfer mechanisms applicable to each sub-processor, (b) applicable SCC modules, (c) supplementary technical measures, (d) current hosting regions.

Such information may be provided through public-facing documentation or direct communication, subject to confidentiality protections.

7. DATA RETENTION & DELETION

Explaining how long personal data is stored and how deletion is performed

7.1 Storing personal data only as long as necessary

The controller retains personal data only for the duration necessary to fulfill the purposes described in Section 3, unless a longer retention period is required or permitted by applicable law.

7.2 Deleting personal data after termination of the services

Following termination or expiration of the services, the controller shall delete personal data associated with the user's account within ninety (90) days, unless:

  • (a) continued retention is legally required (e.g., tax, accounting),
  • (b) data is stored in secure backups subject to scheduled overwrites,
  • (c) deletion is technically impossible without disproportionate effort, in which case data will be securely isolated and protected.

7.3 Retaining billing and financial records for statutory periods

Billing, invoicing, and transaction records processed through Stripe or internal systems may be retained for statutory retention periods, typically six (6) to ten (10) years, depending on jurisdictional requirements.

7.4 Managing content uploaded by the customer

For personal data included in slide content or AI prompts submitted by corporate customers: (a) such data is stored only as technically necessary for the operation of the services, (b) the corporate customer acts as the controller, (c) the controller (RM Holding GmbH) does not store, read, analyze, or extract such data outside technical processes, (d) deletion responsibility lies with the customer through their account or API actions.

7.5 Securing deletion and implementing industry-standard methods

The controller employs secure deletion practices, including: (a) cryptographic erasure, (b) scheduled purge jobs, (c) versioned overwriting, (d) controlled removal from backups when feasible, (e) audit logs of deletion events.

7.6 Respecting user rights to erasure

Upon receiving a valid request from a user or from a corporate customer acting on behalf of the user, the controller will delete personal data in accordance with applicable data protection laws, subject to legal retention obligations.

8. SECURITY MEASURES (TOMS)

Describing the technical and organizational safeguards used to protect personal data

8.1 Implementing appropriate technical and organizational measures

The controller implements security measures designed to ensure a level of protection appropriate to the risks associated with the processing of personal data, in accordance with Article 32 GDPR.

These measures include physical, technical, and administrative safeguards to maintain confidentiality, integrity, and availability.

8.2 Applying encryption and data protection controls

The controller uses encryption technologies to protect personal data from unauthorized access, including: (a) encryption in transit (TLS or equivalent), (b) encryption at rest, (c) secure key management procedures, (d) monitoring and enforcing encryption standards across environments.

8.3 Restricting access through identity and access management

The controller maintains strict access controls, including: (a) multi-factor authentication (MFA) for administrative access, (b) role-based access control (RBAC), (c) "least privilege" and "need-to-know" principles, (d) secure provisioning and revocation procedures, (e) periodic reviews of access rights.

Access is limited to authorized personnel involved in operating or securing the services.

8.4 Protecting infrastructure and networks

The controller and its hosting providers (AWS, Hetzner, Neon) maintain: (a) firewalls and network segmentation, (b) intrusion detection and prevention mechanisms, (c) DDoS mitigation capabilities, (d) secure VPN and remote access controls, (e) hardened server configurations, (f) physical security protections at data centers.

8.5 Ensuring secure development and operational practices

The controller applies secure development principles, including: (a) code reviews and peer validation, (b) automated dependency and vulnerability scanning, (c) separation of development, staging, and production environments, (d) documented deployment pipelines with integrity checks, (e) regular update and patch cycles.

8.6 Monitoring systems and maintaining audit logs

The controller operates continuous monitoring across the services, including: (a) administrative audit logs, (b) event and anomaly detection, (c) error tracking and telemetry, (d) logging access to sensitive systems.

Audit logs are protected against alteration and retained for appropriate periods.

8.7 Conducting assessments, testing, and reviews

To validate the effectiveness of TOMs, the controller performs: (a) periodic penetration testing, (b) internal and external vulnerability assessments, (c) regular security reviews of sub-processors, (d) compliance evaluations of data flows and infrastructure.

8.8 Maintaining business continuity and disaster recovery plans

The controller maintains: (a) redundant infrastructure, (b) automated backups with integrity checks, (c) disaster recovery runbooks, (d) incident response procedures, (e) emergency operations protocols.

These measures help ensure resilience and minimize downtime across the services.

8.9 Updating security measures as needed

The controller may adjust or enhance TOMs to reflect technological advancements, evolving threats, or regulatory requirements, provided such changes do not materially reduce the level of protection afforded to personal data.

9. DATA SUBJECT RIGHTS

Outlining the rights available to individuals under data protection laws and the procedures for exercising them

9.1 Exercising rights under the GDPR

Depending on jurisdiction and applicable data protection laws, a user may exercise the following rights with respect to their personal data: (a) right of access, (b) right to rectification, (c) right to erasure ("right to be forgotten"), (d) right to restriction of processing, (e) right to data portability, (f) right to object to processing based on legitimate interests, (g) right not to be subject to automated decision-making where applicable.

Requests may be submitted to privacy@offgen.ai.

9.2 Verifying identity before responding

To protect the confidentiality of personal data, the controller may request additional information necessary to verify the identity of the individual submitting a request.

Unverified requests may be refused in accordance with data protection laws.

9.3 Responding to requests within statutory timelines

The controller shall respond to valid data subject requests within the time periods required under GDPR, generally one (1) month, extendable by two additional months where necessary due to complexity or volume.

9.4 Respecting user rights with regard to account data

For personal data processed directly by the controller, including account information, authentication details, billing data, and analytics, the controller will fulfill the applicable rights unless restricted by: (a) legal obligations, (b) compelling legitimate interests, (c) data embedded in logs or backups, (d) technical limitations with disproportionate impact.

9.5 Managing rights related to customer-uploaded content

Where personal data is embedded in slide content or AI prompt data uploaded by a corporate customer: (a) the corporate customer acts as an independent controller, (b) requests concerning such data must be directed to that customer, (c) the controller (RM Holding GmbH) cannot delete, edit, or locate such data independently, (d) any assistance is provided only upon documented instructions of the corporate customer.

9.6 Handling objections to processing for outreach activities

Where the user or organization receives outreach via Lemlist, Attio, or Cognism and wishes to opt out: (a) objections may be submitted via privacy@offgen.ai, (b) the controller will remove or suppress contact information for such purposes, (c) this does not affect necessary operational communications.

9.7 Addressing unreasonable or excessive requests

The controller may decline a request or charge a reasonable fee where requests are: (a) manifestly unfounded, (b) repetitive, (c) excessive in nature, (d) beyond the scope of GDPR obligations.

10. USER RESPONSIBILITIES

Clarifying obligations of users and corporate customers when accessing and using the services

10.1 Providing accurate and lawful information

The user is responsible for ensuring that all personal data submitted to the services, including account details, billing information, and communication content, is accurate, current, and lawfully obtained.

10.2 Maintaining account security

The user shall: (a) keep login credentials confidential, (b) safeguard access to their Microsoft 365 account, (c) prevent unauthorized use of the services, (d) promptly notify the controller of any suspected compromise or unauthorized activity.

The controller is not liable for damages arising from compromised credentials or misuse caused by the user.

10.3 Avoiding the upload of restricted content

The user shall not upload or submit content containing: (a) special categories of personal data (Article 9 GDPR), (b) sensitive or regulated data (e.g., health, financial or biometric data), (c) personal data not lawfully collected, (d) content infringing intellectual property, (e) malicious code or harmful files.

If the user uploads such content, the corporate customer assumes full responsibility as the independent controller.

10.4 Ensuring compliance with applicable laws

The user is responsible for ensuring that use of the services complies with applicable laws, internal policies, and contractual requirements, including: (a) GDPR and national data protection laws, (b) employer guidelines regarding data handling, (c) Microsoft 365 usage terms, (d) industry-specific compliance obligations.

10.5 Preventing unauthorized access and misuse

The user shall not: (a) attempt to gain unauthorized access to the services, (b) circumvent technical protections or security controls, (c) probe or scan infrastructure or APIs, (d) use the services to generate harmful, unlawful, or abusive content, (e) interfere with or disrupt the services.

10.6 Managing data subject requests relating to uploaded content

For slide content or AI prompt data uploaded by users on behalf of a corporate customer: (a) the corporate customer is the controller, (b) the controller (RM Holding GmbH) cannot independently identify, extract, or delete such data, (c) the user or corporate customer must handle data subject rights requests directly.

10.7 Ensuring lawful use of CRM and outreach integrations

Where outreach or CRM tools (Lemlist, Attio, Cognism) are involved, users must ensure that: (a) contacts are lawfully sourced, (b) communication is compliant with applicable marketing laws, (c) opt-out requests are respected, (d) no sensitive personal data is uploaded into these tools.

10.8 Following documentation and operational instructions

The user shall follow: (a) the offgen documentation, (b) setup instructions and best practices, (c) enterprise deployment guidelines, (d) any technical notices issued by the controller.

Failure to follow required procedures may impact service quality or security.

11. SUPPORT & SERVICE AVAILABILITY

Describing how support is provided and clarifying service availability obligations

11.1 Providing tiered support channels

The controller offers support for the services through a structured, tiered model: (a) first-level support via the offgen documentation available at https://www.offgen.ai/docs, (b) second-level support via email at support@offgen.ai, (c) third-level support in the form of individual technical assistance sessions with a dedicated implementation engineer, available exclusively to enterprise customers.

Support inquiries must include sufficient information to allow the controller to reproduce or assess the issue.

11.2 Defining support availability and response expectations

Support is provided during standard business hours in Germany (CET/CEST), excluding weekends and public holidays.

The controller strives to respond promptly to inquiries but does not guarantee specific resolution times unless expressly agreed in a separate enterprise contract.

11.3 Clarifying operational availability of the services

The controller aims to maintain high availability of the services and target a level of 99.9% uptime measured as an annual average.

However, the controller does not warrant uninterrupted or error-free operation and may perform maintenance, updates, or improvements that temporarily affect availability.

11.4 Communicating planned maintenance

Planned maintenance windows that may significantly impact the services will be communicated in advance where feasible.

Emergency maintenance may occur without prior notice if required to protect security or system integrity.

11.5 Limiting responsibilities for external dependencies

Availability may be affected by third-party services outside the controller's reasonable control, including: (a) Microsoft 365 infrastructure and authentication, (b) hosting providers (AWS, Hetzner, Neon), (c) AI model providers (OpenAI, Anthropic, Google Gemini), (d) networking or internet-service providers.

The controller is not liable for interruptions caused by such external dependencies.

11.6 Enabling reporting of service issues

Users may report service degradation, outages, or technical concerns through the designated support channels.

The controller may request logs, screenshots, or additional context to resolve issues efficiently.

12. DATA BREACH NOTIFICATIONS

Describing the procedures for identifying, assessing, and reporting personal data breaches

12.1 Defining a personal data breach

A personal data breach is any event leading to: (a) accidental or unlawful destruction of personal data, (b) loss, alteration, or unauthorized disclosure of personal data, (c) unauthorized access to personal data, (d) any compromise affecting confidentiality, integrity, or availability.

This definition is consistent with Article 4(12) GDPR.

12.2 Detecting and assessing potential incidents

The controller operates monitoring and alerting systems designed to detect anomalies and potential security incidents.

Upon identification of a suspected breach, the controller promptly: (a) initiates internal incident response procedures, (b) assesses the scope and severity, (c) determines whether personal data is affected, (d) documents all relevant facts in an incident log.

12.3 Notifying corporate customers in accordance with GDPR timelines

If a breach involving personal data processed on behalf of a corporate customer is likely to result in a risk to the rights and freedoms of individuals, the controller will notify the affected customer: (a) without undue delay, and (b) no later than seventy-two (72) hours after becoming aware of the breach, where feasible.

Notifications will include: (a) a description of the nature of the breach, (b) categories and approximate number of affected data subjects, (c) likely consequences, (d) mitigation or remediation measures, (e) contact information for further inquiries.

12.4 Supporting controller obligations under data protection laws

Upon request, the controller will assist the corporate customer in: (a) assessing risks to data subjects, (b) preparing notifications to supervisory authorities, (c) communicating breaches to affected data subjects, (d) implementing corrective measures.

The controller does not contact data subjects directly unless expressly instructed or required by law.

12.5 Addressing breaches affecting the controller's own data

If the controller experiences a breach involving its own business or account data, it will notify affected individuals or entities in accordance with applicable data protection laws.

12.6 Mitigating and preventing future incidents

Following a breach, the controller undertakes reasonable measures to: (a) contain and remediate the incident, (b) assess root causes, (c) strengthen security policies and TOMs, (d) update prevention and detection mechanisms, (e) document all actions taken.

13. CHANGES TO THIS POLICY

Explaining how updates to this policy are made and communicated to users

13.1 Amending this policy as necessary

The controller may amend or update this policy from time to time to reflect: (a) changes in legal or regulatory requirements, (b) updates to the services, (c) new security practices, (d) modifications to sub-processors or infrastructure, (e) improvements in internal data protection processes.

Changes will be made in accordance with applicable data protection laws.

13.2 Communicating material changes

If updates materially affect the rights or obligations of the user, the controller will provide notice through: (a) the website, (b) the documentation portal, (c) email notifications, (d) in-product messages, where appropriate and feasible.

13.3 Providing effective dates and revision history

Each version of this policy will include an effective date at the top of the document.

The controller may maintain a revision history or changelog accessible to users for transparency purposes.

13.4 Continuing use as acceptance of changes

By continuing to use the services after an updated version of this policy becomes effective, the user acknowledges and agrees to the modifications.

If the user does not accept the updated policy, the user must discontinue use of the services.

14. CONTACT INFORMATION

Providing contact channels for privacy-related inquiries and rights requests

14.1 Submitting privacy-related inquiries

For questions regarding this policy, the processing of personal data, or the exercise of rights under data protection laws, the user may contact the controller at: privacy@offgen.ai

Inquiries must include sufficient information to allow the controller to identify the requester and address the matter appropriately.

14.2 Contacting the controller by mail

Written correspondence may also be sent to the following address:

RM Holding GmbH

Auchtweide 32

D-87775 Salgen

Germany

14.3 Escalating complaints to supervisory authorities

The user has the right to lodge a complaint with a competent supervisory authority if the user believes that the processing of personal data violates applicable law. The competent authority for RM Holding GmbH is:

Bayerisches Landesamt für Datenschutzaufsicht (BayLDA)

Promenade 18

91522 Ansbach

Germany

14.4 Requesting additional information

The controller may provide additional details regarding sub-processors, transfer mechanisms, retention periods, or security measures upon reasonable request, provided that such disclosure does not compromise security or confidentiality.