Terms, Conditions & Privacy Policy
Home / Privacy Policy and Terms
Prices
At Leave a Mark Consulting Group, all prices listed on the website are in Danish kroner or converted currency and include VAT and applicable taxes. We reserve the right to change prices at any time without prior notice. Availability is subject to change, and we reserve the right to sell out of products.
Payment
Leave a Mark Consulting Group accepts payments via the website using VISA-Dankort, VISA, VISA Electron, and Mastercard. The payment will be charged to your account once the product is available for download. We reserve the right for pricing errors and sold-out/discontinued products.
Delivery
All products are delivered digitally and can be downloaded directly.
Right of Complaint
We provide a 2-year right of complaint in accordance with Danish consumer law. This applies to defects in material or manufacturing. You may receive a replacement file if a digital product is defective, but refunds or price reductions are not available. The complaint does not apply to faults or damages caused by improper use of the product/service. You must file a complaint within a "reasonable time" after discovering the defect.
Refunds
In case of a refund, please include your bank details (registration number and account number) so that the agreed amount can be transferred. This information is not sensitive and can be safely sent via email or other electronic means, and will only be used to process the refund.
Right of Withdrawal
According to Danish law, there is no right of withdrawal for digital products once they have been accessed or used. However, if the product does not meet your expectations, please contact us.
Rights
All rights to workshops, courses, events, and digital products belong to Leave a Mark Consulting Group.
When you purchase a product, you receive a license to use it as specified in the individual product description.
Your digital product is for personal use only. It may not be sold, shared, loaned, gifted, or otherwise distributed — neither privately nor commercially. This applies to all content in our online materials, downloads, live sessions, workshops, and courses.
Privacy Policy
- When you use our website’s contact form, we collect your contact details including name, phone number, and email address. We also use cookies on our website. If you do not enter into further engagement with us, your data will generally be retained for 2 years from the last contact.
- When you become a client and purchase our advisory services, we may require additional information. In such cases, you will receive a separate privacy notice. If no further engagement is established afterward, we typically retain your data for 5 years from the end of the client relationship.
- When you contact us directly in other contexts, your contact details will be processed in our telephone and/or IT systems.
- If no further engagement is made, we may retain the data for up to 5 years, depending on the nature of the contact.
Cookies may contain data such as your name, contact details, IP address, visit time, the pages you visit, and your time spent on the site.
You choose which types of cookies you wish to consent to — however, necessary cookies are always set, as the site cannot function without them. You may review and change your cookie preferences at any time, or block cookies in your browser. You can manage your consents and learn more in the Privacy section at the bottom of the website.
The legal basis for processing is your consent, cf. Art. 6(1)(a) of the GDPR. For necessary cookies, the basis is our legitimate interest under Art. 6(1)(f), as such data is required to deliver a functional website.
If you consent to marketing cookies, you also agree to our use of third-party media plugins (e.g., LinkedIn, Facebook, Google, Zoho). In such cases, Leave a Mark Consulting Group and the plugin provider are joint data controllers regarding the processing of your data in relation to the social media platform and data collection.
Data Processors / Sub-processors
We engage a number of data processors and sub-processors to handle personal data on our behalf. These third parties are carefully selected and operate under data processing and sub-processing agreements with us, in accordance with the EU General Data Protection Regulation (GDPR) 2018 and the Danish Data Protection Act.
Transfer of Data to Third Countries.
If you accept cookies beyond the necessary ones — such as those from Facebook, Google, and Zoho — you also accept the respective companies’ privacy policies. This means your data may, in some cases, be transferred to a third country.
- Right of access
You have the right to access the personal data we process about you, along with supplementary information. - Right to rectification
You have the right to have inaccurate or incomplete data about yourself corrected. - Right to erasure ("right to be forgotten")
In certain circumstances, you have the right to have your data deleted before our standard retention period expires. - Right to restriction of processing
In specific cases, you have the right to restrict the processing of your personal data. If processing is restricted, we may still store your data, but further processing may only take place with your consent or for the establishment, exercise or defence of legal claims, or to protect the rights of another person or important public interests. - Right to object
You have the right to object to our lawful processing of your personal data in certain cases. This includes the right to object to processing for direct marketing purposes. - Right to data portability
In certain cases, you have the right to receive your personal data in a structured, commonly used, and machine-readable format and to have it transmitted to another data controller without hindrance.
Safety Breach
If you discover a security breach , we will do our utmost to handle your report in accordance with the guidelines below.
We kindly ask that you familiarise yourself with the following instructions and adhere to the relevant parts if you are reporting a breach.
When Should You Contact Us?
- You should notify us if you believe a security breach has occurred that could lead to misuse of information that appears to be confidential by nature. For example, if you are able to view information about individuals that you should not be able to access.
- In general, we would like to hear about unauthorised access to personal data or sensitive business information, such as:
- If you have received or accessed personal data of other individuals.
- If it is possible to change access rights or otherwise access another user’s account or data.
- If you have discovered vulnerabilities in software or potential exploits that could be used to access otherwise restricted data.
What Information Do We Need?
- Please provide as detailed a description as possible of the issue or error you have encountered.
- Your report should ideally include:
- How you became aware of the issue
- A description of the error/security flaw as you perceive it
- Where the issue/security flaw occurred
- Screenshots (if possible) of the issue or error
- Your contact details
- We respect your right to anonymity within the bounds of applicable legislation, but we encourage you to share your contact details. This helps us respond to your inquiry and follow up if clarification is needed.
What Are You Not Allowed to Do?
- You may not exploit the error or breach you have discovered to access data.
- If you have unintentionally accessed data that does not concern you, do not explore the breach further or attempt to access additional data.
- Once we receive your report, we will act promptly depending on the scope and severity of the breach.
We ask that you do not worsen the situation by sharing information about the breach publicly (e.g. in the media or on social media) while we are handling it.
- Some security breaches could be exploited by others, and it is essential that we are given the chance to resolve the issue before it becomes widely known. This is to minimise harm — especially to individuals who may be affected.
- If you choose to disseminate any data that has unintentionally become accessible due to the breach, we may be forced to treat your actions as complicity in hacking, and legal action may be taken, including reporting the incident to law enforcement.
Where Should You Report the Breach?
- Please send your report to: gdpr@leaveamarkgroup.com
- We kindly ask that you notify us as quickly as possible and without undue delay, so we have the opportunity to address the issue immediately.
What Not to Report
- We do not require reports of standard software errors that do not involve unauthorised access to personal data.
- We take your report seriously and will begin processing it as soon as we receive it.
- You will receive an acknowledgement of receipt within 1–2 business days, confirming that we have received your message.
- Within 2 weeks, you will receive a response outlining what action has been taken based on your report. This response will also indicate whether you should expect further communication or whether the matter is considered closed.
- In some cases, we may be legally obligated to report the breach to the Danish Data Protection Agency or other authorities. This responsibility lies with the data controller or data processor, not with you as the reporting individual. Once you inform us of the breach, we will take any necessary steps, including notification to the relevant supervisory authorities.
Cookies
We use cookies to enhance your user experience. You can change your consent and cookie preferences at any time by clicking the box in the lower right-hand corner of the screen.
We use the following types of cookies:
CleanTalk Spam Protect
Functional
CleanTalk Spam Protect
Functional
Usage
We use CleanTalk Spam Protect for spam prevention. Read more
Sharing data
For more information, please read the CleanTalk Spam Protect Privacy Statement.
Functional
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
WordPress
Functional, Preferences
WordPress
Functional, Preferences
Usage
We use WordPress for website development. Read more
Sharing data
Disse data deles ikke med tredjepart.
Complianz
Functional
Complianz
Functional
Usage
We use Complianz for cookie consent management. Read more
Sharing data
Disse data deles ikke med tredjepart. For more information, please read the Complianz Privacy Statement.
Google Analytics
Statistics
Google Analytics
Statistics
Usage
We use Google Analytics for website statistics. Read more
Sharing data
For more information, please read the Google Analytics Privacy Statement.
Google Fonts
Purpose pending investigation
Google Fonts
Purpose pending investigation
Usage
We use Google Fonts for display of webfonts. Read more
Sharing data
For more information, please read the Google Fonts Privacy Statement.
Purpose pending investigation
Name
Expiration
Function
Mixpanel
Purpose pending investigation
Mixpanel
Purpose pending investigation
Usage
We use Mixpanel for website statistics. Read more
Sharing data
For more information, please read the Mixpanel Privacy Statement.
Purpose pending investigation
Name
Expiration
Function
Adobe Fonts
Purpose pending investigation
Adobe Fonts
Purpose pending investigation
Usage
We use Adobe Fonts for display of webfonts. Read more
Sharing data
For more information, please read the Adobe Fonts Privacy Statement.
Purpose pending investigation
Name
Expiration
Function
Google reCAPTCHA
Purpose pending investigation
Google reCAPTCHA
Purpose pending investigation
Usage
We use Google reCAPTCHA for spam prevention. Read more
Sharing data
For more information, please read the Google reCAPTCHA Privacy Statement.
Purpose pending investigation
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Facebook
Purpose pending investigation
Purpose pending investigation
Usage
We use Facebook for display of recent social posts and/or social share buttons. Read more
Sharing data
For more information, please read the Facebook Privacy Statement.
Purpose pending investigation
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
LinkedIn
Purpose pending investigation
Purpose pending investigation
Usage
We use LinkedIn for display of recent social posts and/or social share buttons. Read more
Sharing data
For more information, please read the LinkedIn Privacy Statement.
Purpose pending investigation
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Diverse
Purpose pending investigation
Diverse
Purpose pending investigation
Usage
Sharing data
Deling af data afventer undersøgelse
Purpose pending investigation
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
Name
Expiration
Function
We may update this privacy policy from time to time and reserve the right to do so, as we are committed to continuously ensuring compliance with the requirements for proper handling of your personal data.