Key Partners
Contact
LET'S TALK?
Please, complete the form. We will get in touch shortly.
*Required fields
Cookies policy
This website uses cookies and similar technologies to provide the service, as well as to allow us to improve it through obtaining usage statistics, and other purposes.
Browsing this website necessarily implies the use of cookies and similar technologies as long as it is necessary for its operation. Likewise, for certain purposes, cookies and local storage will be subject to your consent. You can accept or reject cookies through the established configuration system and it is also possible to configure the browser to prevent their use.
This policy is part of our privacy policy and includes the following:
• What are cookies?
• What are cookies used for?
• What do we understand by technologies similar to cookies?
• What are third party cookies? Who are the recipients of the information?
• What third-party functions and features do we use on our website?
• How long are cookies or similar technologies active?
• Use of browsers with private browsing mode
• How to prevent the use of cookies and how to delete cookies?
What are cookies?
Cookies are small temporary files that are created on the user's device (computer, phone, tablet, etc.) when visiting a website, and that allow it to store or retrieve information when browsing, for example, to save your usage preferences or to recognize you on subsequent visits, as well as obtain information about your browsing habits.
When a website creates a cookie on the user's device, the address / domain of the website that created the cookie is stored, the duration of the cookie, which can range from a few minutes to several years, as well as the content of the cookie. The user can disable cookies at any time through the configuration system of this website, as well as configure their navigation program to prevent (block) the use of cookies by certain websites, as well as delete previously stored cookies.
What are cookies used for?
The most common uses or purposes are:
• Essential technical cookies. They are used to manage the navigation flow within the web or to keep the user connected to it. When disabling them, it is possible that some section of the web does not work correctly.
• Customization cookies. Necessary to remember certain user preferences.
• Analytic cookies. They help us and third parties to collect information on the origin of users and their navigation within the web, to perform a statistical analysis in order to improve the structure and content.
• Advertising cookies. Used to manage the ads that appear on the web, decide the content or the frequency of the ads.
• Behavioural advertising cookies. They help to collect the user's browsing habits to create a profile of their interests and to show them advertisements adapted to them.
• Cookies for social sharing. They are necessary to identify users in their social networks and thus allow them to share content.
What do we understand by technologies similar to cookies?
Technologies similar to cookies are any type of data storage and retrieval mechanism used on the user's device to obtain information. The most common are:
• The local storage of the browser. Some websites use local storages called "sessionStorage" and "localStorage" as well as the database indexed in the browser, to store information;
• Local storage of browser add-ons, such as Local Flash storage (“Flash Local Shared Objects”) or the Silverlight local storage (“Isolated Objects”).
• The "web beacon" is a tracking technique that consists of inserting into a web page (or in an email) an image hosted on an Internet server so that, when the browser or email program connects to said server to download and view the image, the connection is registered. This allows knowing that the user has viewed the web page or the email. Sometimes this image is very small or transparent so that the user is not aware of its existence.
• Fingerprinting techniques that combine series of information retrieved from the browser or the device in order to distinguish a particular user during the successive visits to the websites.
What are third party cookies? Who are the recipients of the information?
In relation to the type of cookies that we use in our services, we can differentiate depending on who manages them:
• First-party cookies: they are created and managed by our own websites or web domains, the information obtained being managed directly or indirectly by us based on our own purposes.
• Third party cookies: cookies that are created and managed from other websites that, although not completely under our control, provide functions and features that we have decided to include on our website, such as: interactive maps, videos and multimedia elements, buttons to share on social media, ads, etc. These cookies are under the control of the third party that provides the corresponding function.
The vast majority of third-party functions involve the access or collection of information (and the use of cookies) by the third party that provides the function, based on their own criteria and purposes, including the collection of browsing habits to show customized ads. The next section explains the third-party functions and features used on this website.
What third-party functions and features do we use on our website?
We include third-party features that use cookies: analytics, maps, social buttons, tourism information, behavioural advertising, and other. Some of these functions are provided by third parties located outside the European Union.
For more detailed information, including purposes and guarantees, see the section: cookie list.
How long are cookies or similar technologies active?
Depending on their permanence or activity time, we can differentiate between:
• Temporary session cookies; they remain stored in the navigation equipment until the user leaves the web page; the browser deletes them at the end of the browsing session.
• Persistent cookies; they remain on the navigation device and the website reads them every time the user makes a new visit. These cookies are automatically deleted after a certain period of time, which can be short or very long.
For information on the duration of cookies, see the section: list of cookies.
Use of browsers with private browsing mode
If you wish to use this website with a greater degree of privacy and by limiting cookies being stored for long periods of time, we recommend that you use a web browser that includes a "private" browsing mode. You can obtain information about this possibility in the help pages of your browser.
How do I block or delete the cookies?
You can configure your preferences at any time through the cookie configuration system integrated into this website. With it it you can activate / deactivate the use of cookies for different purposes.
Most browsers allow you to globally disable cookies. Many browsers also allow you to delete the cookies associated with specific websites / domains. For this, the user must consult the help of their browser. Below are links to the help pages of the most common browsers to learn about the cookie settings in each one:
• Chrome: https://support.google.com/chrome/answer/95647?hl=en
• Explorer: http://windows.microsoft.com/en-us/windows7/block-enable-or-allow-cookies
• Microsoft Edge: https://privacy.microsoft.com/en-US/windows-10-microsoft-edge-and-privacy
• Firefox: http://support.mozilla.org/en-US/kb/enable-and-disable-cookies-website-preferences
• Safari: https://support.apple.com/kb/PH17191?viewlocale=en_US&locale=es_ES
• Safari for IOS: https://support.apple.com/en-us/HT201265/
• Opera: http://www.opera.com/help/tutorials/security/cookies/
Legal warning
The owner of this website is: Key Hospitality Partners, C/ ALCALÁ 226 4ª PLANTA 28027 MADRID, C.I.F. B75428201, telephone (+34) 93 2681010 and e-mail xavier.cortes@keytel.com.
To get more information about other contact forms, visit our main contact page.
The source code, the graphical designs, the information and contents that appear in this Web are protected by rights of intellectual and industrial property pertaining to the website owner, or property of third parties, and they cannot be used without written authorization of the proprietary organizations.
The user can exclusively use the material that appears here for its personal and deprived use, whenever it respects all the rights of intellectual property, industrial property and other rights of property, being, therefore, prohibited its reproduction or any other type of use with commercial aims or to incur illicit activities; its distribution, diffusion, as well as its modification, alteration, decompilation or storage for any purpose.
The proprietary organizations, previously mentioned, will persecute the breach of the previous conditions as well as any illegal use of the presented/displayed contents exercising all the civil and penal actions that correspond to them.
Data Protection
As a result of browsing the website and completing its forms, the user accepts that the personal data provided by him or herself or that is provided in the future through such services, are subject to processing by the establishment, including the collection of access data and the use of cookies and features provided by third parties.
Purpose of the data processing, legitimation and recipients of the information
The data is used to:
• Allow the operation of the website and provide access to areas for registered users
• Register and respond to requests made by users through web forms (contact, etc)
• Provision and administration of services, processing of reservations and the payment of products and services
• Web analytics and statistics
• Include features provided by third parties (Google Maps, etc)
Web browsing and access to areas for registered users
• Purpose: the necessary data for the provision of online services are processed, including the registration of IP addresses, visited pages and access date, as well as information about the user's terminal. The data is also processed for security and web improvement purposes.
• Legitimation: the processing of data is necessary for the provision of online services; consent, expressed through the use of the website
• Recipients and transfers: establishment and web hosting companies
Use of web forms
• Purpose: meet the requests made through the web forms.
• Legitimation: consent expressed when using and sending the form.
• Recipients and transfers: establishment and companies involved in providing the requested services
Provision of services
• Purpose: to provide services including management of hotel reservations and payment. Send information about the establishment's services by electronic means. Conduct quality surveys.
• Legitimation: execution of the contract or provision of the service.
• Recipients and transfers: establishment and companies involved in providing the requested services
Web Analytics
• Purpose: to know the way in which the web is searched, accessed and used by the public. They may involve the collection of personal data such as the IP address, the location of the connection, information about the navigation software or hardware, etc.
• Legitimation: consent, expressed through the use of the website.
• Recipients and transfers: establishment
Functions provided by third parties
• Purpose: incorporate functions provided by third parties, such as maps, analytics, social buttons, Zendesk chat widget, etc.
• Legitimation: consent, expressed through the use of the website
• Recipients and Transfers: The functions of third parties establish a direct connection between the user's browser and the Internet domains of third parties, allowing the download and execution of the function, including from pages outside the European Economic Area.
This website integrates functions of Google Inc, like Google Analytics and Google Maps. By using this website, the user authorizes the processing of their data by Google in accordance with the terms of its privacy policy: https://policies.google.com/privacy
Veracity of data
The user must fill in the forms with true, exact, complete and up-to-date. The user will not enter data referring to another person; The establishment will presume that the data has been provided by the owner thereof. The user will be solely responsible for any damage or loss, direct or indirect that could cause to any person because of the completion of the form with data relating to another person.
Access rights, rectification, erasure, opposition and others
The data subject has at all times the right to access, rectify, and erase the data that concerns him or herself, as well as to oppose the processing of the data, in the terms included in the data protection legislation. He or she also has the right to request: the portability of his or her data, the revocation of the consent given if any and the limitation of the processing.
The owner of the data may exercise these rights by writing to the address of the establishment.
The data subject must include a signed request indicating the action requested and a photocopy of the ID or passport.
The data subject may also oppose the reception of commercial e-mails, just by requesting it by an email sent from the address to unsubscribe and directed to the establishment.
If the data subject thinks that the processing of his or her data violates the data protection legislation, he or she can lodge a complaint to the data protection supervisory authorities.
Minors of age
The use this website is prohibited for persons under 18 years old.
Data security
This website has one of the safest technologies, as far as the protection of your credit card data is concerned. It also complies with all international standards that legislate the subject. All sections where we request sensitive information use the SSL communication protocol. This means that the information that travels through the Internet from your computer to our server makes it encrypted, making them indecipherable to any outsider. This technology ensures and guarantees, that your data can not be intercepted, manipulated or impersonated, in any way. This way, payment through Internet is now as safe as direct purchase.
What does SSL mean?
SSL (Secure Socket Layer) is a standard Internet security technology. Applies an encryption system (coding) that provides maximum confidentiality of the data transmitted to us. This prevents illegal entry or interception in a system while the data circulates on the Internet. For greater security, this data is stored in a secure server protected by a "firewall" in continuous monitoring.