nsofar as the webmaster of these pages has any influence on it, data collected in the context of the use of these pages is collected, processed and stored in accordance with the Teleservices Data Protection Act. This is merely statistical data on access to this website without any specific personal reference (number of pages accessed per day and week, ranking of pages visited, ranking of links to external pages clicked on). This is done in accordance with the applicable data protection laws. In particular, we do not know who has visited our website for how long and how they have behaved during their visits. The personal data processed as part of the e-mail form is only used to process consultation inquiries and corresponding consultation contracts. No further data processing or transmission takes place. All persons mentioned on this website expressly object to any commercial use and disclosure of their data (see § 28 BDSG).
All persons mentioned on this website expressly object to any use of their addresses for commercial purposes (§ 28 of the German Federal Law on the Protection of Privacy).
All articles and illustrations published on this website are protected by copyright. Any use not permitted by copyright law requires the prior written consent of the provider. This applies in particular to the duplication, editing, translation, storage, processing or reproduction of content in databases or other electronic media and systems. Photocopies and downloads of web pages may only be made for personal, private and non-commercial use.
You may refuse the use of cookies by selecting the appropriate settings on your browser, however please note that if you do this you may not be able to use the full functionality of this website. You can also prevent Google from collecting the data generated by the cookie and relating to your use of the website (including your IP address) and from processing this data by Google by downloading and installing the browser plug-in available under this link.
Communication via e-mail can have security gaps. For example, e-mails can be intercepted and viewed by experienced Internet users on their way to our company's employees. If we receive an e-mail from you, we assume that we are authorized to reply by e-mail. Otherwise, you must expressly refer to another form of communication. On request, we are able to encrypt messages using common encryption standards (e.g. PGP).