Use of cookies and activity file

The service provider may – whether on own initiative or through a third party hired for measurement services, use cookies when the user browses the website. Cookies are files sent to the browser through a web server in order to record the user’s browsing activities.

The cookies used by the website are only associated to an anonymous user and computer, and do not in themselves supply the user’s personal data.

The use of cookies may enable the server hosting the website to recognise the user’s web browser, in order to facilitate browsing, enabling, for instance, those users that have previously registered to access areas, services, promotions or contests reserved exclusively for them, without needing to register every time they access. Cookies are also used to measure web traffic, control progress and the number of hits.

The user may permit, block or eliminate the installation of cookies on the user’s browser by using their browser preferences. Please refer to the instructions and manuals on your browser for further information.

To use the website, the user do not need to enable cookies, notwithstanding the need for the user to start session as such for those services requiring prior login.

The cookies used on the website are always temporary with the sole purpose of making its onward transmission more effective. Cookies are never used to collect personal information.


Website servers can automatically detect the IP address and name of the domain the user is accessing by. An IP address is a number automatically assigned to a computer when it connects to the Internet. All this information is recorded in a duly registered file containing the activity of the server that enables subsequent processing of the data to obtain purely statistical measurements so as to know the number of page prints, number of hits on the website services, the order of the hits, access point, etc.


The website uses security techniques generally accepted in the information industry, such as firewalls, access control procedures and cryptographic mechanisms, all with the aim of preventing unauthorised access to data. To achieve these objectives, the user/customer agrees that the provider collect data for purposes of authentication for access control.