Your privacy is very important to us. We want your work on the Internet to be as pleasant as possible and useful, and you have absolutely calmly used the widest range of information, tools, and capabilities that the Internet offers.
Personal information collected at the time of registration (or at any other time) is preferably used to prepare the Products or Services for your needs. Your information will not be transferred or sold to third parties.
What data is collected on the site
By voluntary registration for a consultation or application for service, you send your name, e-mail, and telephone through the registration form. By filling out the form, you agree that we are conducting a telephone conversation to improve the service and as proof of litigation.
For what purpose these data are collected
The name is used to contact you personally. The phone can be used for further communication with you. An e-mail can be used to inform via an e-mail newsletter.
Your name, e-mail, and phone are not transferred to third parties under any circumstances, except in cases related to compliance with the requirements of the law.
How are these data used?
With this data, information about the actions of visitors on the site is collected in order to improve its content, improve the functionality of the site and, as a result, create high-quality content and services for visitors.
You can change your browser settings at any time so that the browser blocks all cookies. Note, however, that some features and services will not work properly.
How these data are protected
To protect your personal information, we use a variety of administrative, managerial and technical security measures. Our Company adheres to various international standards for the control of personal information transactions, which include certain measures to control the protection of the information collected on the Internet.
We strongly recommend that you take all possible precautions while staying online. The services and websites we provide protection against leakage, unauthorized use and alteration of the information we control. While we do our best to ensure the integrity and security of our network and systems, we can not guarantee that our security measures will help prevent unauthorized access to this information by third-party hackers.