Privacy Policy

Below we inform you that the service provider SWTE Group Kft (registered seat: Hungary, 2161 Csomád, Kossuth Lajos u. 47., Company Registration Number: 13 09 188554) handles your personal data in the following ways and for the following purposes.

During data processing, we act in accordance with the relevant legislation – especially Regulation (EU) 2016/679 of the European Parliament and of the Council (GDPR).

This Privacy Policy covers the following website: https://musthaveplugins.com

We reserve the right to modify this Privacy Policy at any time, and any modifications become effective upon publication.

Data Controller

Legal Bases of Data Processing

  1. Performance of a contract (GDPR Article 6(1)(b))
  2. Compliance with a legal obligation (GDPR Article 6(1)(c))
  3. Legitimate interests of the controller or a third party (GDPR Article 6(1)(f))
  4. Consent of the data subject (GDPR Article 6(1)(a))
  5. Public interest or exercise of official authority (GDPR Article 6(1)(e))
  6. Fulfillment of accounting and tax obligations (e.g., GDPR Article 6(1)(c), other relevant national legislation)
  7. Enforcement of legal claims or defenses (GDPR Article 6(1)(f))

Data Processed During Use of the Website:

Processed DataPurpose of Processing
e-mailfulfillment of orders, contact forms, newsletter, remarketing, analytics
namefulfillment of orders, contact forms, newsletter, analytics
behaviorfulfillment of orders, remarketing, analytics
IP addressfulfillment of orders, contact forms, newsletter, remarketing, technical, analytics
phone numberfulfillment of orders, remarketing
addressfulfillment of orders, analytics
browserfulfillment of orders, contact forms, remarketing, analytics
payment informationfulfillment of orders, analytics
purchase historyfulfillment of orders, remarketing
deviceremarketing, analytics
search termsremarketing
device fingerprintanalytics

Hosting Provider Information

The data is processed and stored by the following hosting provider for the operation of the service.

Data Processors

We use external data processors to carry out certain data processing tasks. Data processors may only process the data in accordance with the contract concluded with us and the relevant legislation.

Remarketing Activities

In the scope of the service provider’s marketing activities, we may collaborate with external partners (e.g., displaying ads). We only transfer data to these partners with the data subject’s explicit consent.

Cookies

While browsing the website, so-called cookies may be placed on the user’s computer. These cookies contain technical information, and their primary purpose is to ensure convenient, personalized browsing. However, the site may also use cookies for analytics, remarketing, or media elements.

Essential

Essential cookies and services enable basic functions and are necessary for the proper functioning of the website. These cookies and services do not require user permission according to GDPR.

Required

These cookies and services are necessary for the proper functioning of the website, but their use requires user consent. These may include, but are not limited to: payment gateways, captcha services, embedded booking services.

Analytics

Statistics cookies collect usage information, enabling us to gain insights into how our visitors interact with our website.

Marketing

Marketing services are used by third-party advertisers or publishers to display personalized ads. They do this by tracking visitors across websites.

Media

These cookies and services are necessary to display certain media elements, such as embedded videos, maps, social media posts, etc.

Other services

This category includes all cookies, domains, and services that do not fall into the other specified categories or have not been explicitly categorized.

Cookies Used on This Website

Cookie NamePurpose
mhcookieessential
sbjs_currentanalytics
sbjs_udataanalytics
sbjs_sessionanalytics
__stripe_midessential
wordpress_test_cookieessential
sbjs_migrationsanalytics
sbjs_current_addanalytics
sbjs_first_addanalytics
sbjs_firstanalytics
wp_langessential
wp-settings-*essential
wp-settings-time-*essential
woocommerce_items_in_cartessential
woocommerce_cart_hashessential
bmsessionessential
bm_redirectsessential
wp_woocommerce_session_*essential
__stripe_sidessential
sessionIdessential
userIdanalytics
affwp_refanalytics
affwp_ref_visit_idanalytics
_fbpmarketing
_fbcmarketing
affwp_campaignanalytics
TSVB_UIDunknown

Users can regulate or disable the use of cookies in their browser settings; however, this may affect certain functions of the site.

Data of Minors

Our service is not specifically directed at minors under the age of 16. If we do collect and process data of minors, we do so only if the law prescribes consent or parental/guardian authorization.

Parents and guardians may request the modification or deletion of any recorded data about themselves or the minors under their supervision at any time.

Contact Forms

The forms on the website record the data voluntarily provided by the user, which we use for contact or case handling.

Newsletter and Marketing Communications

By subscribing to our newsletter or other marketing communications, you consent to receiving notifications (promotions, news, etc.) at the provided contact details. You can unsubscribe or withdraw your consent at any time.

Data processed in case of newsletter subscription

Data Retention Periods

We only store data for the necessary period or for the deadlines prescribed by the relevant legislation. After that, the data is deleted or anonymized.

Data Transfer to Third Parties

We only transfer your data to third parties if you have explicitly consented to this, or if it is required by law or an authority order.

Automated Decision-Making, Profiling

In some cases, the service provider may use automated decision-making systems or profiling (e.g., for marketing purposes, risk analysis). The essence of such procedures is to draw certain conclusions without human intervention, but you have the right to challenge or supplement this at any time.

If you believe that the automated decision leads to an incorrect result, you have the right to request human intervention and to object to the decision.

Data Security Measures

During data processing, both the data controller and the data processor employ organizational and technical protection measures that take into account modern technological possibilities and the nature of data processing (purpose, scope, circumstances), as well as the varying degrees of risk faced by natural persons. These safeguards aim to maintain data protection proportionate to the risks continuously.

These measures may include data encryption, maintaining the availability, confidentiality, and integrity of systems and services, and ensuring sufficient resilience. We pay particular attention to restoring the availability of and access to data as soon as possible in the event of any physical or technical incident.

By regularly reviewing and testing security measures, we ensure that the guarantees provided are not merely theoretical but actually provide an adequate level of protection in practice. We store data so that unauthorized persons cannot access it; for this purpose, paper-based documents are kept in a closed, secure environment, while electronic data is accessible only to persons with properly regulated access rights.

We also ensure that data can be deleted in a way that makes it impossible to restore once the retention period has ended or for any other reason that makes deletion necessary. In the case of paper-based documents, destruction is carried out using a specialized shredder or by involving an external partner specializing in this. When decommissioning or scrapping electronic media, we also ensure that data is irretrievably removed.

Protection of Paper-Based Documents

We provide physical protection for printed data to ensure secure, dry storage and adequately lockable rooms. Only authorized personnel have access to these documents. If the paper-based documents are also digitized, the rules for digital processing apply to them. Anyone handling data must not leave the work area without ensuring that the materials entrusted to them are locked and protected from unauthorized access.

The building and rooms where paper-based records are located have adequate fire and property protection systems, thus reducing the possibility of physical damage.

IT Protection

The computers and mobile devices involved in data processing are equipped with appropriate antivirus protection and access control. To secure the electronically stored information, we apply up-to-date backups and archiving solutions, ensuring these backups are accessible if needed.

Only authorized individuals with defined authorization levels can connect to the central server. The computers used for work and the data stored on them are protected by passwords and other access-protection measures against unauthorized access.

Management and Reporting of Data Protection Incidents

If an event occurs that threatens personal data with unauthorized access, damage, or loss, we immediately take steps to further protect the affected data and mitigate damages. If the situation suggests that the incident poses a significant risk to individuals’ rights or freedoms, we notify the affected individuals without undue delay, explaining the nature of the incident in understandable terms, as well as the measures we have taken or plan to take to address it.

We may omit notifying the affected individuals if we have previously implemented security solutions (e.g., encryption) that render the personal data unintelligible to unauthorized persons, or if further measures significantly reduce the probability of risk. In some cases, public disclosure may suffice instead of direct notification if individual notification would involve disproportionate effort.

In accordance with applicable regulations, if a data protection incident occurs that is likely to result in a risk to the rights and freedoms of natural persons, the data controller reports it to the competent supervisory authority within 72 hours of becoming aware of it. If the notification is made beyond this period, the reasons for the delay must also be provided.

User Rights

As a data subject (user), you have the following rights regarding the processing of your personal data:

To exercise these rights, please contact us (e-mail: [email protected]). We strive to respond to incoming requests as quickly as possible. Typically, we will respond within one month of receiving your request, but if necessary—e.g., if the request is complex—this period may be extended by a further two months. We will inform you of the reasons for the extension within that initial one-month period.

If we cannot fulfill your request, we will also inform you of this and the reasons why within the above deadline. In this case, you have the right to lodge a complaint with the supervisory authority or seek judicial remedy.

Complaints and Remedies

If you believe there has been an abuse of your personal data, you can make an official report at the following contact details:

We thoroughly investigate incoming complaints and inform you about the results of our investigation and any measures taken. If there is no specific time period prescribed by law for handling complaints, then at least once every three years, we review how the investigation of complaints and our process meet the purpose of data processing and the applicable legal requirements.

You are also entitled to file a complaint with the competent data protection authority:

Date of last update: March 26, 2025

This website uses cookies to enhance your browsing experience and ensure the site functions properly. By continuing to use this site, you acknowledge and accept our use of cookies.

Accept All Accept Required Only