What is a Cookie?
A cookie is a small file, a special text, often encoded, sent by a web browser server and then sent back (unmodified) by the browser, each time it accesses that server. The cookie is installed through a browser-based web browser request (eg Internet Explorer, Chrome, Mozilla) and is completely “passive” (it does not contain software, viruses or spyware and can not access the information on the hard drive User). Cookies are used for authentication as well as for tracking user behavior; typical applications to retain user preferences and implement the “shopping cart” system. These files make it possible to recognize the user’s terminal and present the content in a relevant way, adapted to the user’s preferences. Cookies provide users with a pleasant browsing experience and support Vismat SSH efforts to provide user-friendly services: eg: – online privacy preferences and shopping cart history. There are also used to prepare aggregate anonymous statistics that help understand how a user benefits from www.mukibooks.com allowing to improve the structure and content but excluding personal identification of User.
What types of cookies are we using?
A visit to www.mukibooks.com can place: Site performance cookies, Visitor analysis cookies, Cookies for geotargetting, registration Cookies, advertising cookies, or advertiser cookies.
How is the data collected through Cookies?
What are Cookies used for?
Examples of important uses of cookies:
Content and services tailored to user preferences – product categories and services.
- Adapted access to user interests – retaining passwords.
- Retaining child protection for content on the Internet copy filters (family mode options, safe search functions).
- Measurement, optimization, and analytics features – such as confirming a certain level of traffic on a website, what type of content is viewed, and how a user reaches a website (eg, through search engines, directly from other websites, etc.). Websites run these analyzes of their use to improve sites for the benefit of users.
How can Cookies be used safely and responsibly?
In general, browsers have built-in privacy settings that provide different levels of cookie acceptance, shelf life, and automatic deletion after the user has visited a particular site. Since identity protection is very valuable and is a right of every internet user, it is advisable to know what potential problems cookies can create. In order to transmit constant information in both ways between the browser and the website, if an attacker or unauthorized person intervenes during the data transmission, the information contained in the cookie can be intercepted. Although very rarely, this can happen if the browser connects to the server using an unencrypted network (eg., an unsecured WiFi network). Other cookie-based attacks involve bad cookie settings on the servers. It is very important for the User to choose the most appropriate method of protecting personal information and:
- Customize cookie browser settings to reflect a comfortable cookie level.
- Set expiration dates for storing browsing history and personal access data.
- Consider the browser setting to delete individual browsing data each time you close your browser. This is a way to access sites that place cookies and delete any business information when you close the browsing session.
- Install and constantly update antispyware applications.
Many of the applications for detection and prevention of spyware include the detection of attacks on sites. This prevents the browser from accessing websites that could exploit browser vulnerabilities or download dangerous software. It is recommended to constantly update your browsing programs, because many of the cookies attacks are achieved by exploiting the weaknesses of the old versions of the browsers. All modern browsers offer the ability to change cookie settings. These settings are usually found in “browser options” or “preferences” menu.
How can you turn off Cookies?
6.3. The Customer has the right to object to the collection of his or her personal data and to request their deletion, revoking its agreement for the document and thus giving up any implicit right specified therein and without any subsequent obligation of any party to the other or without any party claiming the other part damages, but only in accordance with art. 2.8.
6.4. For the exercise of the rights under art. 6.3, the Customer or the Member will address Vismat SSH, according to the contact data available on the site valid on that date.
6.5. By using the forms available on the site, the Customer or the Member has the right to modify the data he/ she has initially stated to reflect any changes, if any.
6.6. Vismat SSH does not request or store any kind of information about the Customer’s card or bank cards, processed directly on the payment service provider’s servers.
6.8. Vismat SSH undertakes that Customer / Member’s collected data will be used only for declared purposes and will not to make public, sell, rent, license, transfer, etc. the database containing information about the personal or special data of the Member / Curstomer to any third party not involved in the fulfillment of the declared purposes.
6.9. Exceptions to the provisions of art. 6.9 will be made if the transfer/ access/ visualization/ etc is required by the competent bodies in the cases provided by the regulations in force at the date of the event.
6.10. Vismat SSH undertakes that the personal data of a User collected through the contact form will only be used until the problem communicated by him/ her has been resolved and then it will become exclusively statistical.
6.11. Vismat SSH is not responsible for malfunctions that may compromise the security of the server on which the database containing this data is hosted.