On this website, cookies are used to improve navigation and offer personalized information. The following explains what a cookie is, the cookies we use, the purposes for which they are used and the options available to configure, control or eliminate them.
General information about cookies
Virtually all web pages use the technology of cookies. A cookie is a file that is downloaded to your computer when you access certain web pages and whose sole purpose is to simplify navigation. Cookies allow a web page, among other things, to store and retrieve information about the browsing habits of a user or their team.
Configuration and elimination of Cookies
Most browsers are set to accept cookies automatically. Through the configuration of your browser, you can accept or reject all cookies, accept only certain cookies, deactivate them or request authorization each time a web page wants to store a cookie. Please note that the disabling or rejection of cookies may prevent or limit access to functions necessary for the website to function properly. If you wish to obtain more detailed information about cookies you can use the “Help” function of your browser or visit www.aboutcookies.org, where you will find exhaustive and independent information on how to deactivate cookies through browser settings and how to delete cookies that are already They are on your computer. To delete the cookies from your mobile device you will have to consult the instruction manual of said device.
Website servers can automatically detect the IP address and domain name used by the user. An IP address is a number that is automatically assigned to a computer when it is connected to the internet. All this information is duly registered in a file of activity of the server, which allows processing the data later in order to obtain measurements and statistics with which the number of page impressions is revealed, the number of visits to the website of services , the order of the visits, the access point, etc., but without revealing personal data.
The website uses information security techniques generally accepted in the industry, such as firewalls, access control procedures and cryptographic mechanisms, always with the purpose of preventing access to data without authorization. To achieve these ends, the user/client accepts that the provider obtains data in order to apply appropriate access controls for authentication.
Acceptance of the conditions of use