Privacy statement

Monica Buckland
Sydney – Australia


Handling of contact data
If you contact us as the website operator using the contact options provided, your details will be stored so that we can use them to process and respond to your enquiry. This data will not be passed on to third parties.

We use cookies on our website to provide you with the best possible user experience and to provide clues to improve our service. Cookies are text files that are downloaded to your computer or mobile device when you visit a website or use an application. Some of these (known as session cookies) are necessary to enable us to provide you with the use of certain features.

Embedded content from other websites
Posts on this website may contain embedded content (e.g. videos, images, articles etc.). Embedded content from other websites behaves exactly as if the visitor had visited the other website.

Contact information
If you have any questions about the privacy practices of this website, or if you would like to request your personal information from us, please contact us by email at:

Protection of privacy
Based on Article 13 of the Swiss Federal Constitution and the data protection regulations of the Swiss Confederation (Data Protection Act, DSG), every person has the right to protection of their privacy as well as protection against misuse of their personal data. We comply with these provisions. Personal data is treated as strictly confidential and is neither sold nor passed on to third parties.

How we protect your data
In close cooperation with our hoster, we strive to protect the databases as well as possible against unauthorised access, loss, misuse or falsification.

SSL technology
The protection of personal data is very important to us. Therefore, we use SSL technology for the transmission of all data.

Monica Buckland assumes no liability whatsoever with regard to the correctness, accuracy, up-to-dateness, reliability and completeness of the information provided.

Liability for links
References and links to third party websites are outside our area of responsibility. We decline any responsibility for such websites. Access to and use of such websites is at the user’s own risk.

The copyright and all other rights to the content, images, photos or other files on the website belong exclusively to the operator of this website or to the specifically named rights holders. The written consent of the copyright holders must be obtained in advance for the reproduction of any elements.

Google Fonts
“The use of Google Fonts is not authenticated. No cookies are sent from website visitors to the Google Fonts API.”

The following data is processed by our hoster “Hostpoint”:
In order to be able to provide services reliably, technically flawlessly and also in compliance with the law, Hostpoint’s servers create so-called log files. These contain information such as:

  • IP addresses
  • Date and time
  • Protocol information such as protocol type, version, the desired action, status codes or information about the transferred data (e.g. the size of a question or an answer)
  • Error messages
  • Depending on the application, application-specific information such as message IDs in the case of e-mails, or in the case of web access, information on the browser used (user agent string) or, if applicable, the page from which the visitor accessed the website.
  • This applies not only to interactions with websites, but also to all of our services, such as e-mail (SMTP, POP, IMAP), FTP, SSH etc.

Hostpoint uses this information, among other things, to track and solve technical problems, to find human-caused errors, to fend off attacks on its infrastructure, to support post-mortem analyses of hacked customer websites or to compile visitor statistics for your website.

This usage data forms the basis for statistical, anonymous evaluations so that trends can be identified, which we can use to improve our offers accordingly.

The data remains on Hostpoint’s systems until the operational necessity ceases and the legally or contractually stipulated time limits expire, after which it is automatically deleted. For most data, this is a maximum of six months.