Privacy Policy

This website uses cookies so that we can give you the best possible experience for users. Information about cookies is stored in your browser and performs functions such as recognizing you when you return to our website and help our team understand which sections of the website you find most interesting and useful.

WHAT ARE COOKIES?
Cookies are small text files that the site stores on your computer or mobile device when you enter the site. Cookies are widely used both to ensure the correct or more efficient operation of the site, and to provide the necessary information to the site owners.

HOW DO WE USE COOKIES?
We use cookies to recognize you when you visit our website. This means that we can remember your preferences and preferences.

PARTY COOKIES.
In addition to our cookies, we cooperate with third-party companies that, using their own cookies, help us analyze the performance of our website so that we can optimize it for your convenience.

Most browsers allow you to see exactly which cookies are stored by you, and delete them or block them individually. Please note that if you decide to delete cookies, then in this case your settings and preferences will be lost by us.

WHO CAN THE DATA BE TRANSFERRED?

Data may be transferred to third parties to fulfill obligations.

Data can be transferred at the request of authorized bodies.

HOW TO DELETE INFORMATION ABOUT YOURSELF?

It is enough to send a request to the mail admin@izek.space in free form and confirm the deletion of data in the response letter.

INFORMATION ABOUT THE SITE
This Internet resource is for informational purposes only.

Publication, modification and deletion of any materials on this Internet resource can only be done by a predetermined circle of persons who have undergone special training.

This website uses third-party services that provide information that is publicly available, namely, computer programs that allow you to display the content of third-party resources. Each such resource uses its own privacy policy and can offer to authorize in a third-party product, or use existing authorization data that is not processed and not stored on our servers, databases and other storage media.

This resource uses modern protection measures involving encryption, restricting access rights, digital signatures, studying new types of threats, developing measures aimed at anticipating possible threats, network screening, firewall, antivirus software, intrusion detection system, and physical security of critical rooms. infrastructure, pass system for authentication and electronic pass, backup power, four independent trunk providers.

STATEMENT FOR RIGHTS MANAGERS:
If you have found content that violates any kind of copyright, please contact the email address: amin@izek.space . Provide a link to the material requiring clarification, modification or complete destruction.

TECHNICAL SUPPORT:
If you want to ask a question about the work of the resource or found inappropriate material, then send a request to the email address:

admin@izek.space

INFORMATION ON COPYRIGHT ON MATERIALS:
This Internet resource contains materials that are protected by exclusive copyright, prohibiting any use of materials for commercial, non-commercial and other purposes, without prior approval from the copyright holder. For approval of related rights, please email admin@izek.space

DESTRUCTION OF INFORMATION
If you want to delete information about yourself (if it has been provided), send a request to admin@izek.space

The administration has the right without notice to change the content of the privacy policy, which comes into force from the date of publication at https://izek.space/privacypolicy