The cookies used by the website are only associated with anonymous users and their computers, and they do not access users’ personal data.
Users can configure their browsers to provide warnings about reception of cookies and to prevent installation of cookies in the equipment. Please refer to your browser instructions and manuals for further information.
In order to use the website, users do not have to allow the installation of cookies sent by the website, or by the third party acting on their behalf, and this will not affect the need for users to log in as such to each service whose performance requires previous registration or login.
The cookies used in this website are, in any case, temporary in nature and their sole purpose is to make subsequent transmission more effective. In no case will cookies be used to collect personal information.
What cookies do we use?
- _ga: Third-party and analysis cookie to record user identification. Expiration 2 years.
- _gat: Third-party cookie, and analysis cookie, to analyze browsing behavior. Expiration 10 minutes.
- _gid: Third-party and analysis cookie to record the user ID. Expiration 24 hours.
- moove_gdpr_popup: own and session cookie used to save cookie preferences. Expiration: 1 year.
The website’s servers can automatically detect the IP address and domain name used by the user. An IP address is a number automatically assigned to a computer when it connects to the Internet. This information is registered in the server’s file of activity which is duly registered and which allows subsequent processing of the data in order to obtain measurement-only statistics on e.g. the number of page printed, the number of visits to the web services, the of visits and the access point.
The website uses information security techniques that are generally accepted in the industry, such as firewalls, access control procedures and cryptographic mechanisms, all in order to prevent unauthorized access to data. In order to achieve these goals, the user accepts that THE FOUNDATION will obtain data for the purpose of the corresponding authentication of the access controls.
Any process involving the introduction of highly personal data will always be transmitted through a secure communication protocol, so that no third party will have access to electronically transmitted information.