{"id":3826,"date":"2026-04-14T22:33:30","date_gmt":"2026-04-14T20:33:30","guid":{"rendered":"https:\/\/www.steffiscloud.de\/?page_id=3826"},"modified":"2026-04-14T23:07:55","modified_gmt":"2026-04-14T21:07:55","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/www.steffiscloud.de\/en\/privacy-policy\/","title":{"rendered":"privacy-policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3826\" class=\"elementor elementor-3826 elementor-3811\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4749a0 e-flex e-con-boxed e-con e-parent\" data-id=\"a4749a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca9ac6b elementor-widget elementor-widget-html\" data-id=\"ca9ac6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<section style=\"font-family:Verdana,Arial,sans-serif;max-width:900px;margin:auto;line-height:1.6;color:#222;\">&#13;\n&#13;\n<h1 style=\"color:#2050e0;\">Privacy Policy &amp; Terms of Use<\/h1>&#13;\n<h2><strong>Steffi's Cloud<sup>&#xAE;<\/sup> Portal (SC Portal)<\/strong><\/h2>&#13;\n&#13;\n<p><strong>Applies to:<\/strong> Windows, Linux, macOS, iOS, Android and compatible devices (e.g. Fairphone)<\/p>&#13;\n<p><strong>Available as:<\/strong> Direct download (Windows, Linux, macOS) as well as via the Apple App Store and Google Play Store<\/p>&#13;\n<p><strong>Effective date:<\/strong> April 1, 2026<\/p>&#13;\n&#13;\n<hr>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">1. Provider<\/h2>&#13;\n<p>&#13;\nSteffi's Cloud<sup>&#xAE;<\/sup><br>&#13;\nOwner: Anna-Lena Nieman<br>&#13;\nGy&#xF6;rer Str. 3 \/ 64<br>&#13;\n99089 Erfurt<br>&#13;\nGermany<br>&#13;\nEmail: <a href=\"mailto:info@steffiscloud.de\"><span style=\"display:inline;unicode-bidi:bidi-override;direction:rtl;\" class=\"\">ed.duolcsiffets<span style=\"display:none;\">obfsctd-4b03e5<\/span>@ofni<\/span><\/a><br>&#13;\nWebsite: <a href=\"https:\/\/www.steffiscloud.de\">www.steffiscloud.de<\/a>&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">2. Purpose of the Application<\/h2>&#13;\n<p>&#13;\nThe Steffi's Cloud<sup>&#xAE;<\/sup> Portal (SC Portal) is a secure communication and collaboration platform&#13;\nfor customers of Steffi&#x2019;s Cloud, designed for secure communication, IT security coordination,&#13;\nsupport, and <span class=\"glossary-tooltip glossary-term-3492\" tabindex=\"0\"><span class=\"glossary-link\"><span class=\"glossary-underline\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Incident Response&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Incident response is the process of identifying, managing, and mitigating cybersecurity incidents.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/incident-response\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">incident response<\/a><\/span><\/span><span class=\"hidden glossary-tooltip-content clearfix\"><span class=\"glossary-tooltip-text\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Incident Response&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Incident response is the process of identifying, managing, and mitigating cybersecurity incidents.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/incident-response\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Incident Response<\/a><br><br><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Incident Response&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Incident response is the process of identifying, managing, and mitigating cybersecurity incidents.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/incident-response\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Incident response<\/a> is the process of identifying, managing, and mitigating <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:table --&amp;gt;\n&amp;lt;figure class=&amp;quot;wp-block-table&amp;quot;&amp;gt;&amp;lt;table class=&amp;quot;has-fixed-layout&amp;quot;&amp;gt;&amp;lt;tbody&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;Cybersecurity&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cybersecurity refers to the protection of systems, networks, and data from digital attacks, unauthorized access, and damage.&amp;lt;\/td&amp;gt;&amp;lt;\/tr&amp;gt;&amp;lt;\/tbody&amp;gt;&amp;lt;\/table&amp;gt;&amp;lt;\/figure&amp;gt;\n&amp;lt;!-- \/wp:table --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/cybersecurity\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">cybersecurity<\/a> incidents.<\/span><\/span><\/span>.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">3. Customers Only<\/h2>&#13;\n<p>&#13;\nUse of the application is restricted exclusively to authorized customers.&#13;\nThe application cannot be used without valid access credentials.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">4. Hosting &amp; Data Processing<\/h2>&#13;\n<p>&#13;\nAll data processing takes place exclusively in secure data centers located in Germany,&#13;\nprimarily in Frankfurt am Main.&#13;\n<\/p>&#13;\n<p>&#13;\nWhere personal data is processed on behalf of customers, data processing agreements (DPA)&#13;\nare in place in accordance with Art. 28 <span class=\"glossary-tooltip glossary-term-3482\" tabindex=\"0\"><span class=\"glossary-link\"><span class=\"glossary-underline\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;GDPR&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The General Data Protection Regulation is a European law that governs how personal data must be processed and protected&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/gdpr\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">GDPR<\/a><\/span><\/span><span class=\"hidden glossary-tooltip-content clearfix\"><span class=\"glossary-tooltip-text\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;GDPR&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The General Data Protection Regulation is a European law that governs how personal data must be processed and protected&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/gdpr\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">GDPR<\/a><br><br>The General <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Data Protection&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Data protection ensures that personal and business data is securely handled and protected from unauthorized access&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/data-protection\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Data Protection<\/a> Regulation is a European law that governs how personal data must be processed and protected<\/span><\/span><\/span>.&#13;\n<\/p>&#13;\n<p><strong>Data location:<\/strong> Germany (Frankfurt)<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">5. Data Processed<\/h2>&#13;\n<ul>&#13;\n<li>Contact data (name, email, company) is processed as part of usage and &#x2013; where technically possible &#x2013; protected or pseudonymized.<\/li>&#13;\n<li>User and access data<\/li>&#13;\n<li>Communication content<\/li>&#13;\n<li>Technical data (IP address, logs)<\/li>&#13;\n<li>Files related to support and security processes<\/li>&#13;\n<\/ul>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">6. Purpose of Processing<\/h2>&#13;\n<ul>&#13;\n<li>Operation and security of the platform<\/li>&#13;\n<li>Authentication and access control<\/li>&#13;\n<li>Communication and support<\/li>&#13;\n<li>IT security and <span class=\"glossary-tooltip glossary-term-3492\" tabindex=\"0\"><span class=\"glossary-link\"><span class=\"glossary-underline\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Incident Response&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Incident response is the process of identifying, managing, and mitigating cybersecurity incidents.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/incident-response\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">incident response<\/a><\/span><\/span><span class=\"hidden glossary-tooltip-content clearfix\"><span class=\"glossary-tooltip-text\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Incident Response&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Incident response is the process of identifying, managing, and mitigating cybersecurity incidents.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/incident-response\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Incident Response<\/a><br><br><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Incident Response&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Incident response is the process of identifying, managing, and mitigating cybersecurity incidents.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/incident-response\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Incident response<\/a> is the process of identifying, managing, and mitigating <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:table --&amp;gt;\n&amp;lt;figure class=&amp;quot;wp-block-table&amp;quot;&amp;gt;&amp;lt;table class=&amp;quot;has-fixed-layout&amp;quot;&amp;gt;&amp;lt;tbody&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;Cybersecurity&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cybersecurity refers to the protection of systems, networks, and data from digital attacks, unauthorized access, and damage.&amp;lt;\/td&amp;gt;&amp;lt;\/tr&amp;gt;&amp;lt;\/tbody&amp;gt;&amp;lt;\/table&amp;gt;&amp;lt;\/figure&amp;gt;\n&amp;lt;!-- \/wp:table --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/cybersecurity\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">cybersecurity<\/a> incidents.<\/span><\/span><\/span><\/li>&#13;\n<li>Fulfillment of contractual obligations<\/li>&#13;\n<\/ul>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">7. Legal Basis<\/h2>&#13;\n<p>&#13;\nData processing is carried out in accordance with <span class=\"glossary-tooltip glossary-term-3482\" tabindex=\"0\"><span class=\"glossary-link\"><span class=\"glossary-underline\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;GDPR&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The General Data Protection Regulation is a European law that governs how personal data must be processed and protected&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/gdpr\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">GDPR<\/a><\/span><\/span><span class=\"hidden glossary-tooltip-content clearfix\"><span class=\"glossary-tooltip-text\"><a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;GDPR&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The General Data Protection Regulation is a European law that governs how personal data must be processed and protected&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/gdpr\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">GDPR<\/a><br><br>The General <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Data Protection&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Data protection ensures that personal and business data is securely handled and protected from unauthorized access&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/data-protection\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Data Protection<\/a> Regulation is a European law that governs how personal data must be processed and protected<\/span><\/span><\/span>, in particular based on:&#13;\ncontractual necessity (Art. 6(1)(b)),&#13;\nlegitimate interests (lit. f),&#13;\nlegal obligations (lit. c),&#13;\nand, where applicable, user consent (lit. a).&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">8. Data Sharing<\/h2>&#13;\n<p>&#13;\nPersonal data is only shared where necessary for service delivery,&#13;\nIT security purposes, or due to legal obligations.&#13;\nExternal service providers are contractually bound.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">9. Data Retention<\/h2>&#13;\n<p>&#13;\nData is retained only as long as necessary for the intended purposes&#13;\nor as required by law.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">10. Data Security<\/h2>&#13;\n<p>&#13;\nAppropriate technical and organizational measures are implemented&#13;\nto protect data.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">11. User Rights<\/h2>&#13;\n<p>&#13;\nUsers have the right to access, rectify, delete,&#13;\nrestrict processing, data portability, and to object to processing.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">12. Terms of Use<\/h2>&#13;\n&#13;\n<h3>12.1 Access<\/h3>&#13;\n<p>&#13;\nAccess is restricted to authorized customers of Steffi's Cloud<sup>&#xAE;<\/sup>. Each customer operates&#13;\nwithin a dedicated, logically separated and secure environment within the platform.&#13;\n<\/p>&#13;\n<p>\nThis separation is implemented in accordance with modern security concepts such as <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;Zero Trust&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Zero Trust is a security model where no device or user is trusted by default, and every access request must be verified continuously.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph --&amp;gt;\n&amp;lt;p&amp;gt;&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/zero-trust\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Zero Trust<\/a>\nand tenant isolation.\n<\/p>&#13;\n&#13;\n<h3>12.2 Security<\/h3>&#13;\n<p>&#13;\nAccess credentials must be treated confidentially.&#13;\n<\/p>&#13;\n&#13;\n<h3>12.3 Prohibited Use<\/h3>&#13;\n<ul>&#13;\n<li>Misuse or unauthorized use<\/li>&#13;\n<li>Circumvention of security mechanisms<\/li>&#13;\n<li>Use by non-customers<\/li>&#13;\n<\/ul>&#13;\n&#13;\n<h3>12.4 Suspension<\/h3>&#13;\n<p>&#13;\nAccess may be suspended in case of violations.&#13;\n<\/p>&#13;\n&#13;\n<h3>12.5 Availability<\/h3>&#13;\n<p>&#13;\nNo guarantee of uninterrupted availability.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">13. Notice<\/h2>&#13;\n<p>&#13;\nIf you are not yet a customer:&#13;\nIT security based on German standards should be a top priority.&#13;\n<\/p>&#13;\n&#13;\n<h2 style=\"color:#2050e0;\">14. Contact<\/h2>&#13;\n&#13;\n<p>&#13;\nContact details and further legal information can be found in the legal notice:<br>&#13;\n<a href=\"https:\/\/www.steffiscloud.de\/en\/imprint\/\" target=\"_blank\">&#13;\nwww.steffiscloud.de\/imprint&#13;\n<\/a>&#13;\n<\/p>&#13;\n&#13;\n<\/section>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Privacy Policy &amp; Terms of Use Steffi&rsquo;s Cloud&reg; Portal (SC Portal) Applies to: Windows, Linux, macOS, iOS, Android and compatible [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":15,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"taxonomy_page":[],"class_list":["post-3826","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/pages\/3826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/comments?post=3826"}],"version-history":[{"count":0,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/pages\/3826\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/media?parent=3826"}],"wp:term":[{"taxonomy":"taxonomy_page","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/taxonomy_page?post=3826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}