Cookie usage policy for
What are cookies?

Cookies are small files downloaded and saved on your computer or terminal to improve your experience in using our website. This page describes what information is saved in cookies, how we use them, and why we sometimes need to store them.

How we use cookies

We use cookies for a variety of reasons listed below. Unfortunately, most of the time there are no industry standard options to disable cookies without disabling our site's functionality. It is recommended that you leave cookies enabled because they are used to provide you with the service you are using.

Disabling Cookies

You can disable cookie acceptance on your terminal from the browser settings you are using. Depending on the browser used (Chrome, Internet Explorer, Firefox, Opera), you can disable cookies from its options, from "Settings", "Options" or "Preferences". Disabling them may make it impossible to use certain sites.

What Cookies are we using
  • We use cookies to keep your session data.
  • Also, a very important functionality of an online store is the ability to keep products in the shopping cart. Our cookies helps store the information about the products added to the cart, even if the browser or computer is closed. The next time you visit our site products will also be in your shopping cart.
  • In some cases, we could use third-party cookie cookies. Such as those placed by the well-known Google Analytics system, one of the most widespread and trusted traffic analysis solutions. This helps us better understand how visitors interact with our site so we can improve their experience.
  • Another traffic analysis solution that could use cookies is Yandex Metrika. Along with Google Analytics, it provides us with important information how visitors interact with our site.
  • We can use cookies to check if you have already filled out the newsletter signup field.
  • Also, for Facebook integration, we use cookies placed by Facebook Connect.
Misconceptions about cookies

A misconception about cookies is that they are malicious programs. These are not viruses, nor do they have the functionality of viruses. Since they are just small data that can be read even by the user of the computer, they can not be executed, interpreted or compiled. So they do not have the functionality of programs or applications. They can not access or delete the data on your computer.