Cookies

V2 05-06-2018 | 06:41:22

This Cookies Policy forms part of our general Privacy Policy.

A cookie is a piece of text that is collected and sent to your hard drive during a visit to the website. In addition, Kentaa is using cookies to assemble statistical information regarding this website. The cookie will automatically identify you as a returning visitor which makes it possible to offer personalized content and to make it easier using the website. It is possible to set your browser to reject cookies when visiting this site.

Kentaa only makes use of so called functional cookies. Functional cookies record information about choices that you have made. They also allow us to tailor the website to suit your needs. For example: Kentaa makes use of cookies to log in, to share webpages via social media or to react on a news update. Besides that, Kentaa also uses cookies to remember settings and preferences.

Social plug-in cookies

Site buttons are included to promote or share pages on Facebook, Twitter, Google Plus, LinkedIn and WhatsApp. These buttons are pieces of code of social media itself, and use a cookie. This cookie remembers that you are logged in, so you do not need to log in on Twitter or Facebook every time you want to share something. To see what they do with the personal information they receive because of this code, we refer to the privacy statements of Facebook, Twitter, WhatsApp, Google+ and LinkedIn (which may change frequently).

Embed cookies

The site may contain content hosted on other sites and which is accessible on a Kentaa site. For example YouTube or Vimeo videos. Similarly as for the social plug-in cookies, these codes often use cookies. We refer to the privacy policy of the service provider of the particular service, to check what they do with cookies and personal data. We are not in control of that.

Serverlogs

Every time you open a page, you send information to the web server. This information is stored and used for statistical information. It is not the intention to use information which can be identified for that purpose. The data may also be used by developers to solve technical problems. In cases of severe abuse, the logs are also used to identify the user.