The information presented below is intended to provide the user with more details about the placement, use and management of “cookies” used by the Internet site of the company SC VITAMINGO SERVICES SRL. There are also some useful links related to this topic.

The website www.vitamingo.ro uses its own and third-party cookies to provide visitors with a much better browsing experience.

1. What is a “cookie”?

An “Internet Cookie” (also known as a “browser cookie” or “HTTP cookie” or simply “cookie”) is a small file, made up of letters and numbers, which will be stored on a user’s computer, mobile terminal or other equipment from which the Internet is accessed.

A cookie consists of 2 parts: the name and the content or value of the cookie. Furthermore, the duration of a cookie’s existence is determined; technically, only the web server that sent the cookie can access it again when a user returns to the website associated with that web server.

The cookie is installed by the request issued by a web server to a browser (e.g. Internet Explorer, Chrome) and is completely “passive” (it does not contain software, viruses or spyware and cannot access information on the user’s hard drive).

Cookies themselves do not require personal information in order to be used and, in most cases, do not personally identify internet users.

2. What are the advantages of cookies?

A cookie contains information that connects a web browser (the user) with a specific web server (the website). If a browser accesses that web server again, it can read the information already stored and react accordingly. Cookies play an important role in facilitating access to and delivery of the many services that the user enjoys on the internet, such as:

* Storing options for various products (sizes, other details, etc.) in the shopping cart (and memorizing these options) – thus generating the flexibility of the “shopping cart” (accessing old preferences by accessing the “forward” and “back” buttons);

* Allowing multimedia or other applications from other sites to be included in a particular site to create a more valuable, useful and enjoyable browsing experience;

* Cookies provide site owners with valuable information on how their sites are used by users, so that they can make them even more efficient and accessible to users.

3. What type of information is stored and accessed through cookies?

A cookie stores important information that improves the Internet browsing experience (e.g. keeping a user logged in to a webmail account; keeping products in the shopping cart).

4. Why are cookies important for the Internet?

Cookies are the centerpiece of the efficient functioning of the Internet, helping to generate a friendly browsing experience adapted to the preferences and interests of each user. Refusing or disabling cookies may make some sites impossible to use.

Refusing or disabling cookies does not mean that you will no longer receive online advertising – it only means that it will no longer be able to take into account your preferences and interests, highlighted by your browsing behavior.

5. What Cookies do we use?

We use two types of cookies: session and persistent. The latter are temporary files that remain on the user’s terminal until the session ends or the application (web browser) is closed. Persistent files remain on the user’s terminal for a period of time according to the cookie parameters or until they are manually deleted by the user.

6. How are cookies used by this site?

* Site performance cookies;
* Visitor analysis cookies;
* Geotargeting cookies;
* Registration cookies;
* Advertising cookies;
* Advertising provider cookies.

Examples:

– video player volume settings;
– video streaming speed that the browser is compatible with.

7. Do cookies contain personal data?

Cookies themselves do not require personal information to be used and, in most cases, do not personally identify internet users. Personal data collected through the use of cookies may only be collected to facilitate certain functionalities for the user. This data is encrypted in a way that makes it impossible for unauthorized persons to access it.

8. Tips for safe and responsible browsing based on cookies

Cookies are everywhere and cannot be avoided if you want to enjoy access to the best and biggest sites on the Internet – local or international. Due to their flexibility and the fact that most of the most visited and largest sites use cookies, they are almost inevitable. Disabling cookies will not allow the user to access the most widespread and used sites including Youtube, Gmail, Yahoo and others.

Here are some tips that can ensure you can browse worry-free with cookies:

Customize your browser settings regarding cookies to reflect a comfortable level of cookie security for you.

  • If you share your computer, you can consider setting your browser to delete individual browsing data every time you close your browser. This is an option to access websites that place cookies and delete any browsing information when you close your browsing session.
  • If you don’t mind cookies and you are the only person using your computer, you can set long expiration dates for storing your browsing history and personal access data.
  • Install and update antispyware applications regularly. Many spyware detection and prevention applications include website attack detection. This prevents your browser from accessing websites that could exploit browser vulnerabilities or download malicious software.
  • Make sure your browser is always up to date. Many of the cookie-based attacks are carried out by exploiting weaknesses in older versions of browsers.
  • It is possible to set your browser to no longer accept these cookies, or you can set your browser to accept cookies from a specific site. But, for example, if you are not registered using cookies, you will not be able to leave comments.
  • All modern browsers offer the ability to change cookie settings. These settings are usually found in the “options” or “preferences” menu of your browser.

To understand these settings, the following links may be useful, otherwise you can use the “help” option of your browser for more details:
Cookie settings in Internet Explorer
Cookie settings in Firefox
Cookie settings in Chrome
Cookie settings in Safari

9. Security and privacy issues

Cookies are not viruses. They are not made up of pieces of code so they cannot be executed or self-run. Consequently, they cannot duplicate or replicate themselves on other networks to run or replicate themselves again. Since they cannot perform these functions, they cannot be considered viruses.

Generally, browsers have built-in privacy settings that provide different levels of cookie acceptance, validity period, and automatic deletion after the user has visited a particular site.

Cookies can, however, be used for negative purposes. Because they store information about users’ preferences and browsing history, both on a specific site and on multiple other sites, cookies can be used as a form of Spyware. Many anti-spyware products are aware of this fact and consistently mark cookies for deletion as part of their anti-virus/anti-spyware removal/scanning procedures.

Other security aspects related to cookies:

Since identity protection is very valuable and represents the right of every internet user, it is advisable to know what possible problems cookies can create. Because through them information is constantly transmitted in both directions between the browser and the website, if an attacker or unauthorized person intervenes in the data transmission process, the information contained in the cookie can be intercepted.

Although very rare, this can happen if the browser connects to the server using an unencrypted network (example: an unsecured WiFi network).

Other cookie-based attacks involve incorrect cookie settings on servers. If a website does not require the browser to use only encrypted channels, attackers can use this vulnerability to trick browsers into sending information through unsecured channels. Attackers then use the information for the purpose of unauthorized access to certain sites. It is very important to be careful in choosing the most appropriate method of protecting personal information.