Cookie policy
USE OF COOKIES AND THE ACTIVITY FILE
The provider, on its own behalf or that of a third party contracted to provide measurement services, may use cookies when a user browses the website. Cookies are files sent to the browser through a web server with the purpose of recording the user's activities during their browsing time.
The cookies used by the website are only associated with an anonymous user and their computer, and do not themselves provide the user's personal data.
Through the use of cookies, it is possible for the server where the website is located to recognize the web browser used by the user in order to make navigation easier, allowing, for example, access to users who have registered. previously, access the areas, services, promotions or contests reserved exclusively for them without having to register for each visit. They are also used to measure the audience and traffic parameters, control the progress and number of entries.
The user has the possibility of configuring their browser to be notified of the receipt of cookies and to prevent their installation on their computer. Please consult your browser's instructions and manuals for more information.
The cookies used on this website are, in any case, temporary in nature with the sole purpose of making their subsequent transmission more efficient. Under no circumstances will cookies be used to collect personal information.
IP ADDRESSES The website servers may automatically detect the IP address and domain name used by the user. An IP address is a number automatically assigned to a computer when it connects to the Internet. All this information is recorded in a duly registered server activity file that allows the subsequent processing of the data in order to obtain only statistical measurements that allow knowing the number of page impressions, the number of visits made to the web services, the order of visits, the access point, etc.
SECURITY The website uses information security techniques generally accepted in the industry, such as firewalls, access control procedures and cryptographic mechanisms, all with the aim of preventing unauthorized access to data. To achieve these purposes, the user/client accepts that the provider obtains data for the purposes of the corresponding authentication of access controls.