PRIVACY POLICY

THE DATA YOU SEND WILL BE USED FOR THE SOLE PURPOSE OF BEING ABLE TO CONTACT YOU VIA THE REFERENCES YOU LEFT THROUGH THE CONTACT FORM TO FULFILL ANY REQUESTS CONTAINED IN THE MESSAGE YOU SENT.

PROCESSING OF PERSONAL DATA
(Information pursuant to art. 13 of Legislative Decree No. 196/2003)

We inform you that the data you provide to the operator of this site when filling out the “contact form” (also known as mail form) of the site, will be processed in compliance with the provisions of Legislative Decree No. 196/2003, Personal Data Protection Code. The contact form made available on the site has the sole purpose of allowing visitors to the site to contact, if they wish, the operator of the site, sending through the said form an e-mail to the operator. This information concerns the personal data sent by the visiting user at the time of filling out the contact form. We inform you of the fact that the data you voluntarily provide through the form will be transformed into an email that may possibly be stored within the email reception system used by the owner of the site.
This data will not be recorded on other media or devices, nor will any other data derived from your navigation on the site be recorded.

  1. PURPOSES OF THE PROCESSING OF PERSONAL DATA
    The purposes of the processing of your data are as follows:
  2. NATURE OF THE DATA PROCESSED AND METHODS OF PROCESSING
    The personal data processed will be exclusively those provided by you at the time of filling out the contact form.
    The processing of personal data conferences is carried out by means of the operations or the complex of operations indicated in Art. 4 paragraph 1 letter A) D. Lgs. 196/2003.
    The processing is carried out directly by the owner.
  3. OPTIONAL PROVISION OF DATA
    The provision of data is optional. However, the refusal to confer will make it impossible to be contacted by CHN Carpenteria.
  4. DATA CONTROLLER
    The data controller is CHINELLI * Eugenio Chinelli-C. F. CHN GNE 44M17 B812H-P. I. 01517960157-R. E. A. di Milano n. 750557
  5. RIGHTS OF THE DATA SUBJECT

    The subjects to whom the personal data refer have the right at any time to obtain confirmation of the existence or less of the same data and to know its content and origin, verify its accuracy or request the integration, update or correction (art. 7 D. Lgs. 196/03). Pursuant to the baptism article, the user has the right to request cancellation, transformation into anonymous form or blocking of data processed in violation of the law and, in any case, to oppose to their processing for legal reasons.

  6. DURATION OF TREATMENT
    The processing will last until the data subject decides to delete the data entered, by communication to the data controller.

COOKIE POLICY

  1. WHAT ARE COOKIES

    Cookies are small text files that websites visited by the user send to the device (usually the browser), they are stored in the corresponding folder of the browser while the user is intent to visit a web site, for the poi to be retransmitted to the same sites the next time you visit. They are used with the purpose of improving navigation, and (the http protocol is stateless and is not able to “remember” the authenticated user who browse the pages), save user preferences that have already been inserted (username, password, etc.), track the tastes and preferences of the user, allowing you to manage the presence or absence of focused marketing initiatives or the delivery of services related to the activities of the Holder come newsletter, dem, etc. If restrictions are placed on their use this will certainly affect the status of the user during the consultation. Blocking or removing them from the browser cache, may cause incomplete use of the services offered by the web application.

  2. TYPES OF COOKIES

    Session Cookies are temporary Cookies, which are limited to ” exist” for the duration of the user’s session of use. When the browser is closed, session Cookies expire. These are typically used to identify users when they access a site, to remind the user of his preferences in the passage between the pages of the site, to provide them with specific information collected previously. The most common example of this feature is the shopping cart functionality of an e-commerce site. For example, when you visit a page in a catalog and select certain items, the session cookie remembers the selection so that in a virtual shopping cart, the items remain selected when you are ready for the checkout operation. Without the session Cookie, if the user clicks on checkout, the new page could not receive the activities passed on the previous pages and the cart would always remain empty. Persistent Cookies remain active even after the browser is closed and help sites remember user data and settings for later consultation. This allows for faster and more convenient access in terms of time since, you do not need to re-access. In addition to authentication, other features of the website are made possible and include: language selection, theme selection, menu preferences, signals or favorites, and many more. During the visit the user selects his preferences and they will be remembered through the use of persistent Cookie during the next visit.

  3. THIRD-PARTY COOKIES

    There are different types of Cookies, some of them are defined as third-party. They are used, for example, by the site that the visitor first chose and that contains ads from another server or third-party website. Operationally the browser collects food information from different sources so that all items are displayed on the same page thus creating multiple Cookies in the corresponding browser folder. All these Cookies can be removed directly from the browser settings or through special programs also free or you can block the creation. In the latter case some services of the site may not work you are expected and it may not be possible to access or even no longer having the Associated Cookie lose user preferences, in this way the information would be displayed in the wrong Local form or may not be available. Web Beacon: also called “tracking pixels”, “gif 1×1”, “single-pixel gifs,” “pixel tags” or “action tags” are graphic images that typically do not exceed the size of 1 pixel x 1 pixel that are used for the purpose of collecting anonymous information on the mode of use of a site by users and to offer personalized content. They also allow to identify the types of browsers, the words entered in the search engines by visitors used to reach the site. Web Beacons present in e-mail communications and let you know if a user has received, opened or clicked on links provided with the e-mail received. Flash or Local shared objects (LSO) Cookies: Websites may use Flash content, displayed on their pages, to store certain information about the device. As with HTTP Cookies, Local Shared Objects can be used by websites to collect information about the paths taken by internet users regarding browsing between websites. Online banks, advertisers can use local shared objects for monitoring purposes. Functionally Cookies are markers that remember user choices and therefore automate some procedures or allow personalization of the user experience (e.g. allowed not to appear advertising banners in overlay). Google Analytics is a service offered by Google that generates detailed statistics on a website’s traffic and traffic sources. It is the most used statistics service. Google Analytics can track visitors from all external links to the site, including search engines and social networks, direct visits and referral sites. It also displays advertising, pay-Per-click, email marketing and also links within PDF documents. The information can be accessed at: http://www.google.it/analytics/learn/privacy.html. Google AdSense is a program operated by Google Inc. that allows advertisers on the Google network to serve advertisements on their website earning based on the number of ad exposures or clicks made on them. The information can be accessed at: https://www.google.com/adsense/localized-terms. Add This is a useful service to be able to share articles, texts present on a website on the various social platforms present in the network. It thus allows to simplify the life of all the colors that navigate a site and more or less regularly use the most famous social networking sites. AddThis.com it provides, a series of buttons to insert in a web page and facilitate the distribution and subscription of web content on ”social ” sites such as Facebook, Twitter etc.. The service plans to provide two types of buttons, one for the subscription of RSS feeds and a second to insert the contents of a Web page in the various social bookmark services. The information can be accessed at: http://www.addthis.com/privacy/privacy-policy#publisher-visitors. the example, to force a new creation of a traditional HTTP Cookie containing the information it previously hosted.

  4. PRIVACY AND SECURITY ON COOKIES

    Cookies are not viruses, they are just text files that are neither interpreted by the browser nor executed in memory. As a result, they can not duplicate, spread to other networks to be replicated again. Since they can not perform these functions, they do not fall under the standard definition of viruses. However, Cookies can be used for malicious purposes. Since thanks to them are stored information about preferences, the history of a user’s actions, the specific navigation between multiple sites, Cookies can be used to act as a form of spyware. Many anti-spyware products are well aware of this problem and routinely report Cookies as possible threats. With regard to Flash Cookies, Adobe does not directly provide a tool to customize Flash Player settings related to their management. To access the various settings offered you must instead access any web page containing the creative realized, click with the right mouse button, choose the Global Settings option then click on the link general privacy settings panel. Alternatively, you can visit the page directly: http://www.adobe.com/support/documentation/en/flashplayer/help. It is good to remember that if you delete Flash Cookies or if you disable their storage completely, some websites may no longer operate in the expected way. Flash Cookies can be used, for example, to force a new creation of a traditional HTTP Cookie containing the information it previously hosted.

  5. OTHER COOKIE-BASED THREATS

    Since Cookies are transmitted between browsers and the website, an attacker or an unauthorized person may intercept the transmission of data and information relating to them. Although relatively rare, this fact can happen if the browser connects to the site using for example an unprotected WI-Fi network. Other cookie-based attacks involve server settings. If a website does not require the browser to use only encrypted connections (eg. https), malicious may exploit this vulnerability to trick visitors by sending them personal information through unsafe channels. Attackers then hijack personal data for unauthorized processing purposes.