A cookie is a piece of text that is collected and sent to your hard drive during a visit to the website. In addition, Kentaa is using cookies to assemble statistical information regarding this website. The cookie will automatically identify you as a returning visitor which makes it possible to offer personalized content and to make it easier using the website. It is possible to set your browser to reject cookies when visiting this site.
Kentaa also makes use of a Google Analytics cookie. We use this service to monitor how users use our site and to generate reports. Google may supply this data to third parties if required by law, or if third parties process information on Google’s behalf. We cannot influence this. We’ve not given Google permission to use the acquired data for other Google services.
The information that Google collects is anonymised as much as possible. No user IP-addresses are tracked. Information is transmitted to and by Google onto servers in the United States. Google is obliged to comply to the rules of the EU-US Privacy Shield set up by the United States Department of Commerce. This offers a fitting level of protection when personal data is being processed.
Social plug-in cookies
Site buttons are included to promote or share pages on Facebook, Twitter, Google Plus, LinkedIn and WhatsApp. These buttons are pieces of code of social media itself, and use a cookie. This cookie remembers that you are logged in, so you do not need to log in on Twitter or Facebook every time you want to share something. To see what they do with the personal information they receive because of this code, we refer to the privacy statements of Facebook, Twitter, WhatsApp, Google+ and LinkedIn (which may change frequently).
Every time you open a page, you send information to the web server. This information is stored and used for statistical information. It is not the intention to use information which can be identified for that purpose. The data may also be used by developers to solve technical problems. In cases of severe abuse, the logs are also used to identify the user.