- Objective of the Privacy Policy
- Definition of personal data
- Identity of the Data Controller
- Applicable laws and regulations
- Principles applicable to the processing of personal data
- Security measures
- Purposes of processing
- Lawfulness of processing
- Recipients of your data
- Data processing activities carried out
- Personal data of minors
- Origin and types of data processed
- Rights of data subjects
- Modification
- Postal address and our offices: Paseo de la Castellana Nº 70, first floor. 28046, Madrid (Madrid), Spain
- Registered office: Paseo de la Castellana Nº 70, first floor. 28046, Madrid (Madrid), Spain
- Email: privacy@southsummit.io - Phone: +34 915625784
- Auratech Legal - NIF B87984621
- Email: privacy@spain-startup.com
- Phone: 911134963
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Hereinafter GDPR.
- Organic Law 3/2018, of December 5, on Personal Data Protection and Guarantee of Digital Rights. Hereinafter LOPD/GDD.
- Law 34/2002, of July 11, on Information Society Services and Electronic Commerce. Hereinafter LSSICE.
- Lawful, fair, and transparent: We provide clear and accessible information on how data is collected and used.
- Limited to specific purposes: Data is collected for legitimate purposes and not used for other purposes.
- Data minimization: We only request strictly necessary data.
- Accuracy: We keep data updated and correct inaccurate data.
- Storage limitation: Data is retained only for the time necessary for the stated purposes.
- Integrity and confidentiality: We apply appropriate security measures to protect data.
- Proactive accountability: We assume responsibility for complying with and demonstrating compliance with these principles.
- Confidentiality: Only authorized persons can access the information.
- Integrity: Information is kept accurate and protected against unauthorized modifications.
- Availability: We ensure that data is accessible to authorized persons at all times.
- Continuous evaluation: We regularly review and improve our security measures to adapt to new threats and technological advances.
- Pseudonymization and encryption: We apply these techniques to strengthen data protection, especially sensitive data.
- Images and recordings: Will be retained according to the policies of the social media platforms used and for historical and promotional purposes of the event.
- Transaction data: Will be retained for 5 years according to applicable tax and accounting regulations.
- Video surveillance data: 1 month from the recording date.
- Compliance with GDPR obligations: As long as its erasure is not requested by the data subject.
- Access control: 5 years from the last confirmation of interest.
- Participant management: 6 years according to the Commercial Code and tax regulations.
- Registered user management: 6 years from the last confirmation of interest.
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.e GDPR) Performance of a task carried out in the public interest or in the exercise of official authority vested in the Controller
- GDPR: 6.1.c) Processing is necessary for compliance with a legal obligation to which the controller is subject.
- Law 39/2015, of October 1, on the Common Administrative Procedure of Public Administrations. Common administrative procedure law
- General Data Protection Regulation. REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 22 LOPD/GDD) Processing of images from camera or video camera systems to preserve the security of people, property, and facilities
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.f GDPR) Legitimate interest of the Controller or third parties
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.f GDPR) Legitimate interest of the Controller or third parties
- (Art. 6.1.a GDPR) Consent of the data subject
- GDPR: 6.1.a) Consent of the data subject. The legal basis for sending information related to professional practice or professional interest and for the provision of voluntary services is the consent you provide, which you can withdraw at any time.
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.f GDPR) Legitimate interest of the Controller or third parties
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.f GDPR) Legitimate interest of the Controller or third parties
- GDPR: 6.1.f) Satisfaction of legitimate interests pursued by the controller.
- Explicit consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.a GDPR) Consent of the data subject
- GDPR: 6.1.a) Consent of the data subject. The legal basis for sending information related to professional practice or professional interest and for the provision of voluntary services is the consent you provide, which you can withdraw at any time.
- 6.1.e) Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller.
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.c GDPR) Compliance with legal obligations of the Controller
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 22 LOPD/GDD) Processing of images from camera or video camera systems to preserve the security of people, property, and facilities
- (Art. 6.1.f GDPR) Legitimate interest of the Controller or third parties
- (Art. 6.1.a GDPR) Consent of the data subject
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- (Art. 6.1.f GDPR) Legitimate interest of the Controller or third parties
- (Art. 6.1.b GDPR) Existence of a contractual relationship with the data subject through a contract or pre-contract
- Standard contractual clauses
- Activity: Name of the data processing activity.
- Purposes: Uses and processing carried out with the collected data.
- Legal basis: Legal grounds that legitimize data processing.
- Data processed: Types of data processed.
- Origin: Source of the data.
- Retention: Data retention period.
- Recipients: Third parties to whom data is transferred.
- International transfers: Data transfers outside the European Union.
- Definition of internal procedures for ticket management, access control, and incident resolution.
- Training for personnel responsible for access on best practices in personal data management and data protection regulations.
- Assignment of clear roles and responsibilities in the organization of access control.
- Establishment of confidentiality agreements for personnel or third parties who manage attendee data.
- Ticket validation using encrypted QR codes, ensuring security and accuracy in identification.
- Encryption of data in transit (HTTPS) and at rest (AES-256) to protect information stored in access systems.
- Multi-factor authentication system for employees with access to ticket management platforms.
- System activity logging to audit access and prevent misuse of data. Regular backups of data related to tickets and access, stored on secure servers.
- Physical access control in registration areas and access control systems, including surveillance and security measures at the event venue.
- Secure storage of devices and documents related to access management.
- Information Security Policy (ISP): Implement and keep updated a security policy adapted to legal regulations and company needs.
- Access Control: Restricted access to personal data through multi-factor authentication (MFA) and role-based permissions.
- Information Encryption: Use of encryption during data transmission and storage (HTTPS, disk encryption).
- Training and Awareness: Regular training for collaborators on best practices in data protection and information security.
- Activity Logging: Maintenance of a detailed log of data access and modifications.
- Implementation of internal policies to regulate the use of video surveillance systems in offices and events, ensuring that access to recordings is exclusive to authorized personnel.
- Visible notices in all monitored areas (offices and temporary event venues) informing data subjects about the existence of cameras and the processing of images in accordance with the GDPR.
- Supervision by a designated responsible person to ensure that recordings are used only for security purposes.
- Training of personnel responsible for applicable regulations and the proper use of video surveillance systems.
- Configuration of recording systems with secure and encrypted storage (AES-256)
- Use of multi-factor authentication to access video surveillance systems, limiting access only to authorized personnel
- Scheduling for automatic deletion of recordings after the retention period (1 month)
- Monitoring and auditing of access to video surveillance systems to ensure traceability.
- Storage of recordings on secure servers, preferably with ISO 27001 certification, located within the EEA.
- Strategic installation of cameras in common areas, access points, loading/unloading zones, and sensitive areas, avoiding image capture in private spaces (such as bathrooms or changing rooms)
- Physical protection of recording devices through restricted access systems (security locks, physical surveillance)
- Access control to monitored venues (offices and events) to minimize risks related to recordings.
- Clear and transparent information: Notice within the application and in the privacy policy about data sharing when scanning a QR.
- Access control and permissions: Only authorized companies within the platform can receive data, ensuring that event terms are met.
- Encryption of data in transit and storage: Protection of information within the application.
- Logging and traceability of access: Monitoring which company receives each user's data within the application.
- Privacy settings: Possibility for the user to manage what data is shared within the platform.
- Implementation of internal policies that limit access to data only to authorized personnel and partners related to travel and accommodation management.
- Obtaining explicit consent from the data subject during the landing page registration process.
- Signing confidentiality agreements with partners and suppliers who manage personal data to ensure GDPR compliance.
- Training of personnel responsible for data protection regulations and best practices in personal data management.
- Encryption of data in transit (HTTPS) and at rest (AES-256) to protect personal information sent through the landing page and during communications with partners.
- Use of secure request management systems with multi-factor authentication.
- Logging and auditing of access to personal data to ensure traceability and prevent misuse.
- Automatic backups stored on secure servers with ISO 27001 certification.
- Storage of related physical documents (if applicable) in restricted areas with controlled access.
- Control of physical access to devices used to manage requests.
- Secure deletion of physical documents once processing purposes are met, through certified shredding.
- Establishment of confidentiality agreements with evaluation committee members to ensure proper handling of data from participating startups.
- Periodic review of access to the evaluation platform to prevent unauthorized access.
- Data classification and deletion policy after evaluation completion to ensure compliance with the minimization principle.
- Specific training for platform managers and committee members on personal data processing and applicable regulations.
- Multi-factor authentication for access to the evaluation platform.
- Encryption of data in transit (HTTPS) and at rest (AES-256) to protect startup information and evaluations performed.
- Activity logging on the platform to audit actions performed by evaluators.
- Restriction of data access only to the authorized three-week period after evaluation sessions end.
- Regular data backup to prevent loss of key information during the evaluation process.
- Security in offices where information is accessed, including physical access controls (locked doors, surveillance)
- Use of secure servers located in data centers with international certifications such as ISO 27001.
- The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services.
- The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
- A process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.
- The pseudonymization and encryption of personal data.
- Co-organizers: Data may be shared with IE University (INSTITUTO DE EMPRESA, S.L., IE UNIVERSIDAD and FUNDACIÓN IE) and South Summit for joint event management.
- Service providers: Security, marketing, technology, and logistics companies.
- Public authorities: When required by applicable legislation (royal household and ministry of the presidency).
- Law enforcement agencies: For the investigation of criminal offenses.
- Participants and attendees: Through attendee lists and event promotional materials.
- Social networks: Data will be transferred to platforms such as Meta and Instagram.
- Collaborating companies: For event management and marketing.
- Travel agencies: For accommodation and travel offers.
- Registration and contact data: Will be retained for 5 years from the last confirmation of interest.
- Images and recordings: Will be retained according to the policies of the social media platforms used and for historical and promotional purposes of the event.
- Transaction data: Will be retained for 5 years according to applicable tax and accounting regulations.
- Video surveillance data: 1 month from the recording date.
- Compliance with GDPR obligations: As long as its erasure is not requested by the data subject.
- Access control: 5 years from the last confirmation of interest.
- Participant management: 6 years according to the Commercial Code and tax regulations.
- Registered user management: 6 years from the last confirmation of interest.
- Pseudonymization and encryption of personal data: Use of encryption techniques to protect data during transmission and storage
- Confidentiality, integrity, and availability: Implementation of access controls, firewalls, and intrusion detection systems to protect information.
- Data restoration: Ability to quickly restore the availability and access to personal data in the event of a physical or technical incident.
- Regular evaluations: Continuous process of verifying, assessing, and evaluating the effectiveness of technical and organizational measures to ensure the security of processing.
- Protection against unauthorized access: Use of multi-factor authentication and role-based access permissions
- Granular and verifiable consent (double opt-in, registration with date/IP).
- Preference panel for easy revocation.
- Restricted access to authorized marketing personnel.
- TLS/SSL encryption for data transmission.
- Formalized processing agreements with providers.
- Logging and retention of consent and unsubscribe evidence.
- Bi-annual audit of lists and sub-processors.
- Automatic exclusion mechanism ("unsubscribe" functional in each mailing).
- Implementation of internal policies to regulate the use of social media, ensuring compliance with the GDPR and personal data protection.
- Training for personnel responsible for social media management on best practices and data protection regulations.
- Logging of access and roles assigned to the team responsible for managing social media to prevent improper access.
- Internal supervision and approval of publications to ensure that sensitive personal data is not included without prior consent.
- Use of certified tools for centralized social media management, with in-transit encryption (HTTPS).
- Restriction of access through multi-factor authentication on all social media accounts.
- Monitoring of access and activities on platforms to ensure traceability and detect potential incidents.
- Regular backups of created content and statistics on secure servers with ISO 27001 certification.
- Physical access control to devices used to manage social media, including measures such as automatic locking and biometric authentication.
- Secure storage of materials related to social media campaigns (images, videos, etc.) in restricted areas.
- Encryption of data in transit (HTTPS) and at rest (AES-256) to protect personal information
- Implementation of multi-factor authentication (MFA) for access to the registered user management platform
- Monitoring and logging of activities on the platform to detect improper access or security incidents
- Regular backups and storage on servers with security certifications (ISO 27001)
- Limitation of access to sensitive data through role-based permissions
- Restricted access control policies, ensuring that only authorized personnel access registered data
- Periodic audits of data processing to ensure compliance with regulations and prevent improper access
- Continuous training for personnel on proper personal data management and legal obligations under the GDPR
- Use of a consent management system to verify and store explicit user authorizations
- Organizational:
- Creation of specific internal policies for volunteer data management, limiting access only to authorized personnel.
- Obtaining explicit consents during the volunteer registration process, detailing the specific purposes of their data processing.
- Signing confidentiality agreements by volunteers in case of access to sensitive event information (startups, investors, etc.).
- Training for the management team and volunteers on data protection regulations and their responsibilities during the event.
- Use of secure systems for volunteer data management, including digital platforms with multi-factor authentication and encryption (AES-256).
- Encryption of data in transit (HTTPS) to protect information during exchange between systems.
- Logging and auditing of access to the volunteer management system to ensure traceability.
- Regular backups of data, stored on ISO 27001 certified servers.
- Storage of physical documents (such as signed agreements) in restricted access areas. Control of access to devices and spaces where volunteer personal data is managed.
- Secure deletion of physical documents, through certified shredding, once processing purposes are met.
- Internal procedures to ensure that only authorized personnel access information about jury members and evaluated startups.
- Signing confidentiality agreements by jury members to protect information about evaluated projects.
- Training for personnel responsible for jury management on GDPR compliance and data processing obligations.
- Logging and documentation of activities related to jury data processing, including invitations and evaluations.
- Use of secure and certified platforms for managing evaluations and personal data of jury members.
- Encryption of data in transit (HTTPS) and at rest (AES-256).
- Implementation of multi-factor authentication for access to the project evaluation platform.
- Monitoring and logging of access and activities performed on the platform to ensure traceability.
- Daily backups of stored information, with rapid recovery in case of incidents.
- Storage of any physical documents related to the jury in restricted access areas.
- Use of access control systems in spaces where jury and evaluated startup data is managed.
- Secure deletion of physical documents through certified shredding.
- Definition and application of role-based access policies to ensure that only authorized users access agenda data.
- Regular audits of agenda use and management to identify potential breaches or errors.
- Continuous staff training on security measures, data management, and GDPR compliance.
- Logging and documentation of all processing activities related to agenda management.
- Implementation of multi-factor authentication for access to the agenda management platform.
- End-to-end encryption of data in transit (HTTPS) and at rest (AES256).
- Use of cloud servers with updated security certificates and compliance with standards such as ISO 27001.
- Constant monitoring of access and activities in the system to detect potential misuse.
- Automatic backups to ensure information recovery in case of incidents.
- Physical access control in data centers hosting servers, including 24/7 surveillance, alarm systems, and biometric authentication
- "Clean desk" policies and secure deletion of physical documents related to event planning.
- Access control through multi-factor authentication.
- Specific staff training on data protection.
- Periodic security audits of the application.
- Encryption of data in transit (HTTPS) and at rest.
- Pseudonymization of data to minimize risks.
- Implementation of security incident detection and response systems.
- Security of physical servers where data is hosted.
- Obtaining explicit consent from attendees, speakers, and participants through visible notices in recording areas, and during online registration to participate in the event.
- Internal policies that limit access and use of images to authorized communication and marketing personnel.
- Periodic training for the responsible team on regulations applicable to recording and use of images, including GDPR and image rights.
- Documentation of agreements with photographers, videographers, and media participating in the event, ensuring compliance with data protection regulations.
- Encryption of images and videos stored in internal systems (AES-256).
- Use of secure platforms for content management and publication (social networks, servers with SSL certificates).
- Monitoring of access and activities related to image management to ensure traceability.
- Automatic backups and storage in controlled environments with ISO 27001 certification.
- Storage of any physical media (memory cards, hard drives) in secure, restricted access areas.
- Control of physical access to editing and image management areas within South Summit facilities.