We use contact details such as First Name, Last Name, Telephone Number and Email Address, Delivery Address to keep in touch with you during the collaboration and delivery of goods and services.
We use the contact details to answer your messages and questions.
We use the contact details to send you informative messages, offers, discounts through newsletter campaigns and promotions.
2. Billing and Relationship
To bill you for using our services.
To contact you if the billing data you provided to us is about to expire or we cannot collect your payment.
To keep track of your payments, projects, interventions and requirements.
We use e-Way as a secure payment portal.
3. Marketing and analysis
To create profiles for analysis, credit, fraud, and security.
To create site activity reports and market research (these reports do not contain information that can identify you as a person).
To keep track of your payments, projects, interventions and requirements.
If you choose to subscribe to our Blog, we will send you emails with the latest articles added.
This policy applies to cookies and webpages operated by VERA CLS
1. What are Cookies?
The cookie is a small file of letters and numbers that will be stored on your computer, mobile terminal or other equipment of a user accessing the Internet. The cookie is installed through a web browser request from a browser (eg Internet Explorer, Chrome) and is completely “passive” (does not contain software, viruses or spyware and cannot access the information on the user’s hard drive) .
2. What are Cookies used for?
These files make it possible to recognize the user’s terminal and present the content in a relevant way, adapted to the user’s preferences. Cookies provide users with an enjoyable browsing experience. They are also used in the preparation of aggregated anonymous statistics that help us understand how a user benefits from our web pages, allowing us to improve their structure and content, excluding personal identification of the user.
3. What Cookies Do We Use?
We use two types of cookies: per session and fixes. The latter are temporary files that remain in the user’s terminal at the end of the session or closing the application (the web browser). Fixed files remain on the user’s terminal for a while in the Cookie’s parameters or are deleted manually by the user.
4. How are cookies used by this site?
A visit to this site may place cookies for:
Site performance cookies
Visitor analysis cookies
Cookies for geotargetting
Cookies to store parameters, preferences, and settings.
5. Do Cookies contain personal data?
6. Cookie Deletion
7. Why are Internet Cookies Important?
Cookies are the central focus of the efficient Internet function, helping to generate a friendly browsing experience and tailored to the preferences and interests of each user. Denying or disabling cookies can make some sites impossible to use.
Denying or disabling cookies does not mean you will not get online advertising – just that it will no longer be able to keep in mind your preferences and interests highlighted by your browsing behaviour.
Examples of important uses of cookies (which do not require authentication of a user through an account):
Content and services tailored to user preferences – product categories and services.
Offers tailored to users’ interests – retaining passwords.
Retrieve Child Protection Filters for Content on the Internet (family mode options, safe search functions).
Limit ad serving frequency – limit the number of impressions of an ad for a particular user on a site.
Provide more relevant advertising for the user.
Measurement, optimization, and analytics features – such as confirming a certain level of traffic on a website, what type of content is viewed, and how a user reaches a website (eg through search engines, directly from other websites etc.). Websites run these analyses of their use to improve sites for the benefit of users.
8. Security and confidentiality issues
Cookies are NOT Viruses! They use plain text formats. They are not made up of pieces of code so they cannot be executed or can auto-run. Consequently, they cannot duplicate or replicate on other networks to run or replicate again. Because they cannot perform these functions, they cannot be considered viruses.
Cookies can still be used for negative purposes. Because it stores information about users’ preferences and browsing history both on a particular site and on several other sites, cookies can be used as a form of Spyware. Many anti-spyware products are aware of this and consistently mark cookies to be deleted in anti-virus / anti-spyware removal / scanning procedures.
In general, browsers have built in privacy settings that provide different levels of cookie acceptance, shelf life, and automatic deletion after the user has visited a particular site.
Other security issues related to cookies:
Because identity protection is very valuable and is the right of every internet user, it is advisable to know what problems can create cookies. In order to constantly transmit information between the browser and the website in both directions, if an attacker or unauthorized person interferes with the data transmission path, the information contained in the cookie can be intercepted.
Although very rare, this can happen if the browser connects to the server using an unencrypted network (eg an unsecured WiFi network).
Other cookie-based attacks involve bad cookie settings on servers. If a website does not require the browser to use only encrypted channels, attackers can use this vulnerability to mislead browsers to send information through insecure channels. Attackers then use the information for purposes of unauthorized access to certain sites. It is very important to be careful in choosing the most appropriate method of protecting personal information.
9. Tips for safe and responsible cookie-based navigation
Customize your browser settings for cookies to reflect a comfortable cookie-level for you.
If you are not bothered by cookies and you are the only person using your computer, you can set expiration dates to store your browsing history and personal data.
If you share your computer access, you can consider the browser setting to delete individual browsing data each time you close your browser. This is a way to access sites that place cookies and delete any visitor information when you close the browsing session.
Install and constantly update your antispyware applications.
Many of the applications for detecting and preventing spyware include detecting attacks on sites. This prevents the browser from accessing websites that could exploit browser vulnerabilities or download dangerous software.
Make sure your browser is up to date.
Many of the cookies attacks are exploited by exploiting the weaknesses of the old versions of browsers.
Cookies are everywhere and cannot be avoided if you want to enjoy access to the best and greatest websites on the Internet – local or international. With a clear understanding of how they work and the benefits they bring, you can take the necessary security measures so you can browse with confidence on the internet.
Disabling and refusing to receive cookies can make some sites unfeasible or difficult to visit and use. Also, refusing to accept cookies does not mean you will no longer receive / see online advertising.
It is possible to set up the browser so that these cookies are no longer supported or you can set the browser to accept cookies from a specific site. But for example, if you are not registered using cookies, you will not be able to comment
All modern browsers offer the ability to change cookie settings. These settings are usually found in the browser’s “options” or “preferences” menu.