What is a Cookie?
A cookie is a small file, a special text, often encoded, sent by a web browser server and then sent back (unmodified) by the browser, each time it accesses that server. The cookie is installed through a browser-based web browser request (eg Internet Explorer, Chrome, Mozilla) and is completely “passive” (it does not contain software, viruses or spyware and can not access the information on the hard drive User). Cookies are used for authentication as well as for tracking user behavior; typical applications to retain user preferences and implement the “shopping cart” system. These files make it possible to recognize the user’s terminal and present the content in a relevant way, adapted to the user’s preferences. Cookies provide users with a pleasant browsing experience and support Vismat SSH efforts to provide user-friendly services: eg: – online privacy preferences and shopping cart history. There are also used to prepare aggregate anonymous statistics that help understand how a user benefits from www.mukibooks.com allowing to improve the structure and content but excluding personal identification of User.

What types of cookies are we using?

Mukibooks website uses two types of cookies: per session and fixed (temporary files that remain in the user’s terminal until the end of the session or closing the application/ web browser). Fixed files remain on the user’s terminal for a while in the Cookie’s parameters or until they are deleted manually by the user. The cookies used by the operator’s partners for a web page, including without limitation the use of the web site, are subject to the respective Privacy Policy.

A visit to www.mukibooks.com can place: Site performance cookies, Visitor analysis cookies, Cookies for geotargetting, registration Cookies, advertising cookies, or advertiser cookies.

How is the data collected through Cookies?

Personal data collected through the use of Cookies can be collected only to facilitate certain user functions and are encrypted in a way that makes access to them unavailable for unauthorized persons. In general, an application used to access web pages allows you to save your Cookies to the terminal by default. These settings can be changed in such a way that the automatic administration of the Cookies is blocked by the web browser or the user is informed whenever the cookies are sent to his or her terminal.

What are Cookies used for?

Detailed information about the possibilities and ways of managing cookies can be found in the application settings area (the web browser). Restricting the use of Cookies may affect certain features of www.mukibooks.com. Cookies are the central focus of the efficient Internet operation, helping to generate a friendly and customized browsing experience preferences and interests of each user. Denying or disabling cookies can make some sites impossible to use. Due to their flexibility and the fact that many of the most visited sites and the biggest ones use cookies, they are almost inevitable; disabling cookies will not allow the user to access the most popular and used sites including Youtube, Gmail, Yahoo and others.

Examples of important uses of cookies:

Content and services tailored to user preferences – product categories and services.

  • Adapted access to user interests – retaining passwords.
  • Retaining child protection for content on the Internet copy filters (family mode options, safe search functions).
  • Measurement, optimization, and analytics features – such as confirming a certain level of traffic on a website, what type of content is viewed, and how a user reaches a website (eg, through search engines, directly from other websites, etc.). Websites run these analyzes of their use to improve sites for the benefit of users.

How can Cookies be used safely and responsibly?

Cookies are NOT viruses and use plain text formats; they are not made up of pieces of code so they can not be executed, nor can they auto-run. Consequently, they can not duplicate or replicate on other networks to run or replicate again. Because they can not perform these functions, they can not be considered viruses. Because cookies can be used for negative purposes because they store information about user preferences and browsing history, both on a particular site and on several other sites, being used as a form of Spyware (spying on consumer activity), many anti-spyware products constantly mark cookies to be deleted in anti-virus / anti-spyware removal / scanning procedures.

In general, browsers have built-in privacy settings that provide different levels of cookie acceptance, shelf life, and automatic deletion after the user has visited a particular site. Since identity protection is very valuable and is a right of every internet user, it is advisable to know what potential problems cookies can create. In order to transmit constant information in both ways between the browser and the website, if an attacker or unauthorized person intervenes during the data transmission, the information contained in the cookie can be intercepted. Although very rarely, this can happen if the browser connects to the server using an unencrypted network (eg., an unsecured WiFi network). Other cookie-based attacks involve bad cookie settings on the servers. It is very important for the User to choose the most appropriate method of protecting personal information and:

  • Customize cookie browser settings to reflect a comfortable cookie level.
  • Set expiration dates for storing browsing history and personal access data.
  • Consider the browser setting to delete individual browsing data each time you close your browser. This is a way to access sites that place cookies and delete any business information when you close the browsing session.
  • Install and constantly update antispyware applications.

Many of the applications for detection and prevention of spyware include the detection of attacks on sites. This prevents the browser from accessing websites that could exploit browser vulnerabilities or download dangerous software. It is recommended to constantly update your browsing programs, because many of the cookies attacks are achieved by exploiting the weaknesses of the old versions of the browsers. All modern browsers offer the ability to change cookie settings. These settings are usually found in “browser options” or “preferences” menu.

How can you turn off Cookies?

6.3. The Customer has the right to object to the collection of his or her personal data and to request their deletion, revoking its agreement for the document and thus giving up any implicit right specified therein and without any subsequent obligation of any party to the other or without any party claiming the other part damages, but only in accordance with art. 2.8.
6.4. For the exercise of the rights under art. 6.3, the Customer or the Member will address Vismat SSH, according to the contact data available on the site valid on that date.
6.5. By using the forms available on the site, the Customer or the Member has the right to modify the data he/ she has initially stated to reflect any changes, if any.

6.6. Vismat SSH does not request or store any kind of information about the Customer’s card or bank cards, processed directly on the payment service provider’s servers.
6.7. Vismat SSH Privacy Policy only refers to data provided voluntarily by the Customer or Member exclusively on the site. Vismat SSH is not responsible for the privacy policy of any third party that can be reached through links, regardless of their nature, outside the site.

6.8. Vismat SSH undertakes that Customer / Member’s collected data will be used only for declared purposes and will not to make public, sell, rent, license, transfer, etc. the database containing information about the personal or special data of the Member / Curstomer to any third party not involved in the fulfillment of the declared purposes.

6.9. Exceptions to the provisions of art. 6.9 will be made if the transfer/ access/ visualization/ etc is required by the competent bodies in the cases provided by the regulations in force at the date of the event.

6.10. Vismat SSH undertakes that the personal data of a User collected through the contact form will only be used until the problem communicated by him/ her has been resolved and then it will become exclusively statistical.
6.11. Vismat SSH is not responsible for malfunctions that may compromise the security of the server on which the database containing this data is hosted.


Please select the language from the Menu (EN, RO or CZ) before starting to create your own book. Dismiss