ES | CA | EN | RUS |  中文
Facebook SF AbogadosTwitter SF AbogadosLinkedin SF AbogadosInstagram SF AbogadosTelegram SF Abogados

  

www.lawyers-in-barcelona.com uses cookies

We use our own and third-party cookies to obtain statistical data on the navigation of our users in order to improve our services. If you continue browsing, we consider that you accept their use. You can configure the use of cookies from your browser. Learn more

I understand

Cookies Policy

 SFT SERVICIOS JURIDICOS S.L.P., uses own and third party cookies to obtain browsing data of our users in order to offer quality services and provide a better browsing experience and to identify technical problems that may appear on the web. Likewise, if you give your prior consent through your browsing, we will use cookies, which allow us to obtain more information about your preferences and to customize our website based on your individual interests.

In accordance with Article 22.2nd of the Law 34/2202, of July 1st, of Services of the Information Society and Electronic Commerce (hereinafter E-commerce Law), this website informs you about its Cookies Policy.

WHAT ARE COOKIES?

Cookies are small data files that are downloaded in your computer and other communication devices which store information that will be saved in your browser. Cookies enable a page or website, among other issues, to retain and recover digital files about users browsing habits or any kind of devices, allowing the user to recognize different parameters and information about itself.

The user will be able to modify their browsing preferences at any time to block or disable cookies installation such in case of website accessing.

WHAT KIND OF COOKIES DOES THIS WEBSITE USE?

The website www.sfabogados.com may use third-party services that collect information for three mainly reasons:

  • Statistical process control
  • To personalize the users´ experience on our website and;
  • For the provision of services related to the above ones and other internet operations.

In particular, this website uses Google Analytics (hereinafter Google), a methodical web service issued by Google, Inc., a corporation with principal place of business at 1600 Amphitheatre Parkway, Mountain View (California), CA, Zip Code 94043, USA. For the current provision of services, this company uses collecting cookies that retain different kinds of data information, included, among others, the users´ IP address, that will be processed, stored and transmitted by Google, under its legal notice Including possible transmission of such information to third parties for legal reasons or when such third parties process information on Google´s behalf.

DO WE USE OTHER COOKIES?

To provide an optimal service, this website also uses the following cookies: 

  • Technical cookies: Are those that allows the user to browse through a website, platform or application,as well as the use of different options or services therein as, for example, the traffic control and data communication, the session identification, the restricted access parts norms, to carry out the purchase process of an order, the registration application or participation in an event, to use security elements during browsing and to store content for video or sound broadcasting or to share content through social media.
  • Personalization cookies: This type of cookie allows the user to access at the provide service with some predefined general characteristics based on its terminal criteria and preferences, such as the language or kind of browser through which they are connecting to our website.
  • Analytical cookies: Enabled by ourselves or by third parties,this type of cookies leads us to quantify the number of users to perform a measurement and statistical analysis of its activity. Due to this, we analyze your browsing on our website in order to improve the products or services that we offer.
  • Advertising cookies: This type of cookies, enabled by ourselves or by third parties, allows us to manage more efficiently the offer of advertising spaces on the website, adapting the ad content to the one of the requested service or to the users´ website activity. As a result, we can analyze your browsing background on the internet and show you banner ads related to your browsing profile.
  • Behavioral advertising cookies: Are those that allows the advertising spaces management as efficiently as possible, in which case, the editor has included on the website, application or platform where the requested service is provided. This type of cookie stores the behavioral data of users through the continuous observation of its browsing habits, which allows the development of a specific profile to show ads based on that information.

COOKIES MANAGEMENT

You can permit, block or delete the cookies installed on your computer through the configuration options of your browser.

Google Chrome:

  1. Click on the “menu” icon.
  2. Select “configuration”.
  3. Select “advanced configuration”.
  4. Select “privacy”.
  5. Select “configuration of content”.
  6. Choose the relevant function:
    1. To allow the storage of local data.
    2. To keep the local data until you quit the browser.
    3. Do not allow data to be saved from the sites.
    4. Block other sites´ data and the third party cookies.
  7. Once the option is selected, click “ready”.

Internet Explorer:

  1.  Click the “home” icon.
  2. Select “internet options” in the “tools” menu.
  3. Select “privacy”.
  4. Select “configuration”.
  5. Select the desired option and click “accept”.

Microsoft Edge (Explorer 10):

  1. Click the “plus” icon.
  2. Select “configuration”.
  3. Select “advanced configuration”.
  4. Select “cookies” in “Privacy and services”.
  5. Select the desired option in the drop-down menu.

Firefox:

  1. Click the “menu” icon.
  2. Select “options”.
  3. Select “privacy”.
  4. Select the desired option in the drop-down menu.

Safari:

  1. Click “safari”.
  2. Select “preferences”.
  3. Select “privacy”.
  4. Select “cookies and website data”.
  5. Select the desired option between the available ones.

CUSTOMER INFORMATION

Please take note that if you delete or block all cookies from this website, it is possible that part of it will not work correctly or the website quality may be affected.

The aforementioned cookie-information is not used to identify you individually and the pattern data is fully under our control. These cookies are not used for any other purpose than those hereinbefore described.

If you need more information about our Cookies Policy, you can contact us through our connecting tools. We also recommend that you check the websites of each browser for more information.

We use own and third-party cookies to obtain statistical data of the users´ browsing and to improve our services. If you accept or continue browsing, it shall be considered that you accept their use. You can get further information “here”.

 

Thursday, 19 October 2017 14:45

Collaboration between the Judicial Branch and the CNI to promote computer security

The transformation of the world caused by technology is a source of satisfaction for many people. Companies and organizations gradually discover the advantages of technological innovations. But as a counterpart, it is also a source of concerns that are affecting the world more and more.

The current situation and cyber attacks

The criminal attacks of viruses, hackers, scammers, and other modern agents that represent threats to people and businesses have generated a search for computer security that seems to have no end.

Have a contingency plan, train employees on the subject, install sophisticated systems. All this time ago was a luxury for a person or a business, but today is a necessity.

In times when all private personal or business information is hit by a click, exposed on the network, there are more cases of information theft and private images, and even risk of one's life.

There is a real "social engineering," which combines doses of psychology, which those unscrupulous use to deceive someone. All in order to remove confidential information, to take possession of the content of your computer device, or to know habitual habits that constitute a weakness in security.

The most well-known and frequent case of electronic fraud is phishing. A practice in which wrongdoers steal passwords and account numbers through emails and forms with which they deceive users.

What are the characteristics of computer crimes?

  • Research shows that year after year crimes are more complex, and they mix the virtual world and the real world. Many times, what begins as a process in the network, ends in a robbery in a place of business, a kidnapping, etc.
  • The lack of knowledge about the exposure and the risks to which an Internet user is exposed has multiplied the risk of crime. Either by their use of email, by participation in social networks, by access to websites. And this coupled with the fact that everyone today has a technological device with connection.
  • Children and adolescents, by their natural tendency to socialization even with strangers, are increasingly easy target for offenders.
  • There are companies that are especially persecuted by computer evildoers. These include the pharmaceutical, chemical, electronic and financial sector businesses. In recent years it has been affecting state-owned enterprises, especially those linked to justice and public safety.

A state issue

The subject of computer security has become a state issue in many countries. They have realized that a state policy is needed to monitor and address inter-institutionally the issue of increasing cybercrime.

An example of this is the collaborative agreement on computer security signed by the General Council of the Judiciary and the National Intelligence Center of Spain.

The objective of this agreement is to safeguard the information of the Judicial Power through technological systems that allow to detect and to prevent threats from Internet.

To this end, it is agreed that the Judicial Branch shall be provided with the appropriate means that the specialized agency deems appropriate. It is about ensuring efficient processes for secure storage, processing and transmission of information. The training of officials of both entities is also foreseen.

Surely, the example of a collaborative model between the CGPJ and the CNI will be imitated by other organisms in the world.

Writings SF Lawyers