What personal data we collect and why
Comments
When visitors leave comments on the web, we collect the data shown on the contact form, as well as the visitor’s IP address and the browser’s user agent chain to help detect junk messages. An anonymized chain created from email (also named a hash) can be provided with the Gravatar service to see if it has been used. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. Once the comment is approved, the image of your profile is visible to the public in the context of the comment.
Media
If you upload images on the website, you should avoid uploading images that include embedded geolocation data (EXIF GPS). Website visitors can download and extract any information from the web images.
Contact forms
When visitors fill out any of the forms on the web, we collect the data shown on the contact form, as well as the visitor’s IP address and the browser’s user agent chain to help message detection trash. At the same time, the anti-spam systems CAPTCHA collect information to ensure that the sender is a natural person.
Cookies
If you leave a comment on the website, you can choose to save the name, email address and website in cookies. This is for your convenience so you don’t have to fill in the data again when making another comment. These cookies will last a year.
If you have an account and access this website, a temporary cookie will be defined to determine if the browser accepts cookies. This cookie does not contain personal data and will be discarded when the browser is closed. When you log in, you also set several cookies to save the login information and screen display options. The sign-in galleys last two days, and the screen options cookies last one year. If you select “Remember Me”, the login will persist for two weeks.
If the session ends, the login cookies will be deleted.
If you edit or publish an article, an additional cookie will be saved in the browser.
This cookie does not include personal data and simply indicates the identifier of the entry you just edited.
Expires after 1 day.
Embedded content from other websites
The articles on this website include integrated content (for example, videos, images, articles, etc.).
Content embedded from other web pages behaves in exactly the same way as if the visitor were visiting the other web page.
These web pages may collect data about you, use cookies, embed additional third-party tracking, and monitor the interaction with the integrated content, including the trace of the interaction with the embedded content if you have an account and are logged into this web page.
Analytical
This website collects analytics of use and access to all those contents that it shows, and these are used only for the internal study of the Association.
With whom we share your data
All the data collected on the website can be shared with other rural houses to help the user find an accommodation, it will not be sold to third parties or companies outside the sector.
How long we retain the data
If you leave a comment, the comment and its metadata are retained indefinitely.
This is to be able to automatically recognize and approve any follow-up comments instead of keeping them in the moderation queue.
What rights do you have over your data
If you have an account on this website or have left comments, you can request that you send an export file of your personal data, including all the data you have provided.
You can also ask that we erase any personal data that we have.
This does not include the data that we are required to keep for administrative, legal or security purposes.
Where we send your data
Visitor comments must be checked by an automated garbage detection service.
And a prior manual authorization.
In some cases the contact forms are forwarded to all associated houses.
Contact information
You can contact us at: Can Micos – turisme rural Serramagra n5 17421 Riudarenes info@canmicos.com
additional Information
How we protect your data
Your data is stored on protected servers and in protected databases and will never be shared with third parties.
All the software used in the management of these is
it is updated automatically to prevent access vulnerabilities to unauthorized persons.