XLAB follows the framework set out by the leading international standards for information security. Our policies and processes are designed in line with ISO 27001 and ISO27701 to protect confidentiality, privacy, integrity and regulate accessibility of information at XLAB. Additionally, the policies and processes are designed to support compliance with GDPR.
General Data Protection Regulation (GDPR)
We are a Data Controller of your information.
- XLAB s.r.o. needs to perform a contract with you
- You have given XLAB s.r.o. permission to do so
- Processing your personal information is in XLAB s.r.o. legitimate interests
- XLAB s.r.o. needs to comply with the law
If you are a resident of the European Economic Area (EEA), you have certain data protection rights. If you wish to be informed what Personal Information we hold about you and if you want it to be removed from our systems, please contact us.
In certain circumstances, you have the following data protection rights:
- The right to access, update or to delete the information we have on you.
- The right of rectification.
- The right to object.
- The right of restriction.
- The right to data portability
- The right to withdraw consent
Live, virtual and hybrid events | XLab follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services' analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users' movement on the website, and gathering demographic information.
Cookies and Web Beacons
Like any other website, Live, virtual and hybrid events | XLab uses 'cookies'. These cookies are used to store information including visitors' preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information.
Note that Live, virtual and hybrid events | XLab has no access to or control over these cookies that are used by third-party advertisers.
Third Party Privacy Policies
You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers' respective websites.
Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity.
Live, virtual and hybrid events | XLab does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to contact us immediately and we will do our best efforts to promptly remove such information from our records.
According to Certification ISO27001, XLAB is committed to:
Plan and release resources to develop and continuously improve the effectiveness of the information security management system. Encourage, by all appropriate means, management to continuously increase the efficiency of the information security management system. Regularly and systematically assess information security risks and set up effective measures to eliminate them. Regularly plan, monitor and review information security management objectives and use them as an important tool to improve and prevent incidents of security. Ensure awareness of all company staff about the importance of the information security management system for the development of the company and for gaining customer trust. Ensure that all company staff are aware of the importance of all activities undertaken to ensure the ongoing, stable and continuously improving security of information provided by the firm to customers. Regularly review the effectiveness of the information security management system and accept opportunities for improving the information security management system. Work closely with partners and suppliers to integrate efforts to ensure planned information security criteria. Use customer requests and recommendations to develop an information security management system. Apply legal data protection standards.