Cookies and Security Policy

Cookies and Security Policy

Cookie Policy

A cookie is a file that is downloaded to your computer when you access certain websites. Cookies allow a website, among other things, to store and retrieve information about a user's browsing habits or their device, and, depending on the information they contain and how you use your device, they can be used to recognize the user. The user's browser stores cookies on the hard drive only during the current session, occupying minimal memory space and not harming the computer. Cookies do not contain any specific personal information, and most of them are deleted from the hard drive when the browser session ends (these are called session cookies).

Most browsers accept cookies by default and, regardless of this, allow or prevent temporary or stored cookies in the security settings.

Without your express consent, by activating cookies in your browser, we will not link the data stored in cookies with your data.

What types of cookies does this website use?
  • Technical cookies: These are cookies that allow the user to navigate through a website, platform or application and use the different options or services that exist on it, such as controlling traffic and data communication, identifying the session, accessing restricted areas, remembering the items in an order, completing the purchase process, registering for or participating in an event, using security features while browsing, storing content for video or audio playback, or sharing content through social networks.
  • Personalization cookies: These are those that allow the user to access the service with some predefined general characteristics based on a series of criteria in the user's terminal, such as language, the type of browser through which the service is accessed, the regional configuration from which the service is accessed, etc.
  • Analytics cookies: These are cookies that, when properly processed by us or by third parties, allow us to quantify the number of users and thus perform statistical analysis of how users utilize the offered service. This involves analyzing their browsing activity on our website in order to improve the products or services we offer.
  • Third-party cookies: The www.excelia.com website may use third-party services that, on behalf of Google Analytics, will collect information for statistical purposes, regarding user use of the Site and for the provision of other services related to Website activity and other Internet services.

In particular, this website uses Google Analytics, a web analytics service provided by Google, Inc., located in the United States with headquarters at 1600 Amphitheatre Parkway, Mountain View, California 94043. To provide these services, Google Analytics uses cookies that collect information, including the user's IP address, which will be transmitted to, processed by, and stored by Google in accordance with the terms set forth on Google.com. This includes the possible transfer of such information to third parties when required by law or when such third parties process the information on Google's behalf.

By using this Site, the User expressly consents to the processing of the information collected in the manner and for the purposes described above. The User also acknowledges the option to refuse the processing of such data or information by rejecting the use of cookies through the appropriate settings in their browser. However, blocking cookies in the browser may prevent the User from fully utilizing all the Website's features.

You can allow, block, or delete cookies installed on your computer by configuring the options of the browser installed on your computer:

  • Chrome
  • Explorer
  • Firefox
  • Safari

If you have any questions about this cookie policy, you can contact us. info@excelia.com.

Security policy

We inform our stakeholders of the existence of Information Security Guidelines established in our organization to demonstrate Excelia's commitment to protecting and guaranteeing the principles of confidentiality, integrity, and availability of the information handled within the organization.

We operate under an Information Security Management System, whose scope not only affects the use of assets, but extends to all individuals and third parties in the knowledge and compliance with these Guidelines structured according to the ISO/IEC 27001:2013 standard. Both the Information Security Policy and Guidelines are in line with the General Data Protection Regulation (GDPR).

This security regulation affects the following areas of the Organization:

  • Access to the facilities. In which the access rules are regulated, making special mention of access to secure areas and regulation of access to people outside the organization.
  • Access to the corporate network. Corporate resources are protected with the necessary technical security measures to ensure information protection, whether stored on-site or externally. Access to and use of information are governed by security protocols, with particular attention to sensitive or confidential data.
  • Use of assets. Employees at Excelia are committed to using and caring for the equipment provided by the Organization for the performance of their duties and tasks responsibly. To this end, operating procedures are outlined and configurations are implemented to protect the information stored on these devices.
  • Internet use. Special attention is paid to regulating the use of the internet, email, and cloud storage for professional purposes in order to minimize risks that may arise from unregulated use of these tools.
  • Incident management. The involvement of Excelia's people in security matters helps to detect potential problems that could jeopardize the confidentiality, integrity, and availability of the services or assets they support.
  • Business continuity. All the means implemented for the availability and continuity of the business are in line with the requirements of the ISO schemes certified in the organization.
  • Intellectual property. Protected by the commitment of Excelia's people in accordance with the organization's confidentiality rules.
  • Violation of Security Policies and Guidelines is subject to sanctions in accordance with the mechanisms enabled by current legislation.

Both the policy (SGSI01-SecurityPolicy) and the guidelines (SGSI02-SecurityRegulations) are reviewed periodically to align them with the organization's needs.

The Security Committee recognizes the importance of these Policies and actively participates in their review.

When everything works,

deciding is easier