Privacy Policy


1. Communication
  • We use contact details such as First Name, Last Name, Telephone Number and Email Address, Delivery Address to keep in touch with you during the collaboration and delivery of goods and services.
  • We use the contact details to answer your messages and questions.
  • We use the contact details to send you informative messages, offers, discounts through newsletter campaigns and promotions.
2. Billing and Relationship
  • To bill you for using our services.
  • To contact you if the billing data you provided to us is about to expire or we cannot collect your payment.
  • To keep track of your payments, projects, interventions and requirements.
  • We use e-Way as a secure payment portal.
3. Marketing and analysis
  • To create profiles for analysis, credit, fraud, and security.
  • To create site activity reports and market research (these reports do not contain information that can identify you as a person).
  • To keep track of your payments, projects, interventions and requirements.
  • If you choose to subscribe to our Blog, we will send you emails with the latest articles added.


This policy applies to cookies and webpages operated by VERA CLS
1. What are Cookies?
  • The cookie is a small file of letters and numbers that will be stored on your computer, mobile terminal or other equipment of a user accessing the Internet. The cookie is installed through a web browser request from a browser (eg Internet Explorer, Chrome) and is completely “passive” (does not contain software, viruses or spyware and cannot access the information on the user’s hard drive) .
2. What are Cookies used for?
  • These files make it possible to recognize the user’s terminal and present the content in a relevant way, adapted to the user’s preferences. Cookies provide users with an enjoyable browsing experience. They are also used in the preparation of aggregated anonymous statistics that help us understand how a user benefits from our web pages, allowing us to improve their structure and content, excluding personal identification of the user.
3. What Cookies Do We Use?
  • We use two types of cookies: per session and fixes. The latter are temporary files that remain in the user’s terminal at the end of the session or closing the application (the web browser). Fixed files remain on the user’s terminal for a while in the Cookie’s parameters or are deleted manually by the user.
4. How are cookies used by this site?
A visit to this site may place cookies for:
Site performance cookies
  • Visitor analysis cookies
  • Cookies for geotargetting
  • Partner cookies
  • Cookies to store parameters, preferences, and settings.
5. Do Cookies contain personal data?
  • Cookies themselves do not require personal information to be used and, in most cases, do not personally identify Internet users. Personal data collected through the use of Cookies can only be collected to facilitate certain user functionalities. Such data is encrypted in a way that makes unauthorized persons access to them.
6. Cookie Deletion
  • Generally, an app used to access web pages allows you to save your Cookies to the terminal by default. These settings can be changed in such a way that the automatic administration of the Cookies is blocked by the web browser or the user is informed every time Cookies are sent to his or her terminal. Detailed information on the possibilities and ways of managing cookies can be found in the application settings area (web browser). Restricting the use of Cookies may affect certain features of the web page.
7. Why are Internet Cookies Important?
  • Cookies are the central focus of the efficient Internet function, helping to generate a friendly browsing experience and tailored to the preferences and interests of each user. Denying or disabling cookies can make some sites impossible to use.
  • Denying or disabling cookies does not mean you will not get online advertising – just that it will no longer be able to keep in mind your preferences and interests highlighted by your browsing behaviour.
  • Examples of important uses of cookies (which do not require authentication of a user through an account):
    • Content and services tailored to user preferences – product categories and services.
    • Offers tailored to users’ interests – retaining passwords.
    • Retrieve Child Protection Filters for Content on the Internet (family mode options, safe search functions).
    • Limit ad serving frequency – limit the number of impressions of an ad for a particular user on a site.
    • Provide more relevant advertising for the user.
    • Measurement, optimization, and analytics features – such as confirming a certain level of traffic on a website, what type of content is viewed, and how a user reaches a website (eg through search engines, directly from other websites etc.). Websites run these analyses of their use to improve sites for the benefit of users.
8. Security and confidentiality issues
  • Cookies are NOT Viruses! They use plain text formats. They are not made up of pieces of code so they cannot be executed or can auto-run. Consequently, they cannot duplicate or replicate on other networks to run or replicate again. Because they cannot perform these functions, they cannot be considered viruses.
  • Cookies can still be used for negative purposes. Because it stores information about users’ preferences and browsing history both on a particular site and on several other sites, cookies can be used as a form of Spyware. Many anti-spyware products are aware of this and consistently mark cookies to be deleted in anti-virus / anti-spyware removal / scanning procedures.
  • In general, browsers have built in privacy settings that provide different levels of cookie acceptance, shelf life, and automatic deletion after the user has visited a particular site.
  • Other security issues related to cookies:
  • Because identity protection is very valuable and is the right of every internet user, it is advisable to know what problems can create cookies. In order to constantly transmit information between the browser and the website in both directions, if an attacker or unauthorized person interferes with the data transmission path, the information contained in the cookie can be intercepted.
  • Although very rare, this can happen if the browser connects to the server using an unencrypted network (eg an unsecured WiFi network).
  • Other cookie-based attacks involve bad cookie settings on servers. If a website does not require the browser to use only encrypted channels, attackers can use this vulnerability to mislead browsers to send information through insecure channels. Attackers then use the information for purposes of unauthorized access to certain sites. It is very important to be careful in choosing the most appropriate method of protecting personal information.
9. Tips for safe and responsible cookie-based navigation
  • Due to their flexibility and the fact that most of the most visited sites and the largest ones use cookies, they are almost inevitable. Disabling cookies will not allow the user access to the most popular and used sites including YouTube, Gmail, Yahoo and others.
    • Customize your browser settings for cookies to reflect a comfortable cookie-level for you.
    • If you are not bothered by cookies and you are the only person using your computer, you can set expiration dates to store your browsing history and personal data.
    • If you share your computer access, you can consider the browser setting to delete individual browsing data each time you close your browser. This is a way to access sites that place cookies and delete any visitor information when you close the browsing session.
    • Install and constantly update your antispyware applications.
    • Many of the applications for detecting and preventing spyware include detecting attacks on sites. This prevents the browser from accessing websites that could exploit browser vulnerabilities or download dangerous software.
    • Make sure your browser is up to date.
    • Many of the cookies attacks are exploited by exploiting the weaknesses of the old versions of browsers.
  • Cookies are everywhere and cannot be avoided if you want to enjoy access to the best and greatest websites on the Internet – local or international. With a clear understanding of how they work and the benefits they bring, you can take the necessary security measures so you can browse with confidence on the internet.
  • Disabling and refusing to receive cookies can make some sites unfeasible or difficult to visit and use. Also, refusing to accept cookies does not mean you will no longer receive / see online advertising.
  • It is possible to set up the browser so that these cookies are no longer supported or you can set the browser to accept cookies from a specific site. But for example, if you are not registered using cookies, you will not be able to comment
  • All modern browsers offer the ability to change cookie settings. These settings are usually found in the browser’s “options” or “preferences” menu.