1. COLLECTION OF PERSONAL INFORMATION
1.1. During registration on the website we ask you to inform the necessary personal information to the extent necessary to provide services. We reserve the right to request additional personal information if necessary.
1.2. Cookie files - when you visit our website, we send one or more cookie files on your computer or other device. A cookie is used to improve the quality of services provided: save user preferences.
1.3. Visits information - when accessing the website our servers automatically record certain information. These server logs may include information such as a web query, the IP-address, browser type, browser language, the date and time of the request.
2. PROVIDING ACCESS TO INFORMATION
2.1. We grant access to your personal information to other parties only under the following limited circumstances:
2.1.1. We have your permission to do so. To send any confidential information we need your explicit consent.
2.1.3. We have reasonable grounds to believe that access, use, storage or disclosure of such information is reasonably necessary for:
220.127.116.11. compliance with the legislation of Ukraine, including provision of information at the request of individuals and legal entities, institutions, organizations of any form of ownership or government bodies that are entitled to receive such information in accordance with the legislation of Ukraine;
18.104.22.168. investigation of potential violations of the Public Offer, which involves providing information about you in response to a properly issued attorney's request with information on violations;
22.214.171.124. detection and prevention of fraudulent actions, as well as solving security problems and eliminating technical failures;
126.96.36.199. protection from the immediate threat to the rights, property or security of Hosting Ukraine, its users or the public under the laws of Ukraine.
3. INFORMATION PROTECTION
3.1. We take all necessary measures to protect data against unauthorized access, alteration, disclosure or destruction. These measures include, in particular, the internal check of processes of gathering, storage and processing practices, and security measures, including appropriate encryption and measures on physical security to prevent unauthorized access.
4. ACCESS TO PERSONAL INFORMATION AND ITS UPDATING
4.1. We are doing our best to provide you with access to your personal information and either to correct it if it is incorrect, or remove at your request, unless its storage is required by law or for legitimate business purposes. Before processing requests, we ask users to verify their identity and the information they want to receive, correct or delete.