This Cookies Policy explains what Cookies are and how We use them. You should read this policy so You can understand what type of cookies We use, or the information We collect using Cookies and how that information is used.
Cookies do not typically contain any information that personally identifies a user, but personal information that we store about You may be linked to the information stored in and obtained from Cookies. For further information on how We use, store and keep your personal data secure, see our Privacy Policy.
We do not store sensitive personal information, such as mailing addresses, account passwords, etc. in the Cookies We use.
Interpretation
The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.
Definitions
For the purposes of this Cookies Policy:
Company (referred to as either "the Company", "We", "Us" or "Our" in this Cookies Policy) refers to Medusa Red Ltd., 20-22 Wenlock Road, London, N1 7GU.
Cookies means small files that are placed on Your computer, mobile device or any other device by a website, containing details of your browsing history on that website among its many uses.
You means the individual accessing or using the Website, or a company, or any legal entity on behalf of which such individual is accessing or using the Website, as applicable.
Cookies can be "Persistent" or "Session" Cookies. Persistent Cookies remain on your personal computer or mobile device when You go offline, while Session Cookies are deleted as soon as You close your web browser.
We use both session and persistent Cookies for the purposes set out below:
REQUIRED
Type: Session Cookies
Administered by: Us
Purpose: These Cookies are essential to provide You with services available through the Website and to enable You to use some of its features. They help to authenticate users and prevent fraudulent use of user accounts. Without these Cookies, the services that You have asked for cannot be provided, and We only use these Cookies to provide You with those services.
REQUIRED
Type: Persistent Cookies
Administered by: Us
Purpose: These Cookies identify if users have accepted the use of cookies on the Website.
Type: Persistent Cookies
Administered by: Us
Purpose: These Cookies allow us to remember choices You make when You use the Website, such as remembering your login details or language preference. The purpose of these Cookies is to provide You with a more personal experience and to avoid You having to re-enter your preferences every time You use the Website.
Type: Persistent Cookies
Administered by: Third-Parties
Purpose: These Cookies are used to track information about traffic to the Website and how users use the Website. The information gathered via these Cookies may directly or indirectly identify you as an individual visitor. This is because the information collected is typically linked to a pseudonymous identifier associated with the device you use to access the Website. We may also use these Cookies to test new pages, features or new functionality of the Website to see how our users react to them.
Type: Persistent Cookies
Administered by: Third-Parties
Purpose: These Cookies track your browsing habits to enable Us to show advertising which is more likely to be of interest to You. These Cookies use information about your browsing history to group You with other users who have similar interests. Based on that information, and with Our permission, third party advertisers can place Cookies to enable them to show adverts which We think will be relevant to your interests while You are on third party websites.
If You prefer to avoid the use of Cookies on the Website, first You must disable the use of Cookies in your browser and then delete the Cookies saved in your browser associated with this website. You may use this option for preventing the use of Cookies at any time.
If You do not accept Our Cookies, You may experience some inconvenience in your use of the Website and some features may not function properly.
If You'd like to delete Cookies or instruct your web browser to delete or refuse Cookies, please visit the help pages of your web browser.
1.1 All complaints of abuse, violation and misuse of the Services, whether described in this Section or otherwise, shall be investigated promptly. If you are not sure if your actions will be an abuse, violation or misuse, please ask first.
1.2 You are responsible for all use of your service, with or without your knowledge or consent.
1.3 You agree to use the Services only for lawful purposes, in compliance with all applicable laws.
1.4 When the Company becomes aware of possible violations of this Agreement, the Company may initiate an investigation that may include gathering information from you and the complaining party, if any, and examination of material on the Server. The Company, in its sole discretion, will determine what action will be taken in response to a violation on a case-by-case basis. Violations of this Agreement could result in immediate termination of the Service and/or subject you to criminal or civil liability.
Email Use
2.1 Unacceptable affronts to netiquette and unacceptable activities include, but are not limited to, the following: spamming (sending unsolicited advertising to those with which you have no existing business relationship and posting off-topic advertising in newsgroups); spoofing (using a return email address that is not the valid reply address of the sender or sending an email message that does not contain enough information to enable the recipient to identify you); passive spamming (promoting a website hosted by the Company by spamming from some other source); trolling (posting controversial messages in newsgroups to generate responses); mailbombing (inundating a user with email without any serious intent to correspond or sending large or multiple files to a user); generating a higher volume of outgoing mail than a normal user (no more than 100 recipients in a single email, no more than 100 recipients in total per hour, and no more than 500 recipients in any 24 hour period); propagating chain letters; and subscribing someone else to an electronic mailing list without that person's permission, are prohibited.
A message is considered unsolicited if it is posted in violation of a newsgroup charter or sent to a recipient who has not requested the message. Making an email address available to the public does not constitute a request to receive messages. Distribution of mass emailing programs is also prohibited. All recipients on a mailing list must have personally subscribed. Mailing lists may not be used to distribute unsolicited email. Emails sent to mailing lists must contain a clear opt-out policy to allow the recipient to prevent any future mailings from you, and must clearly identify who you are (your company or personal name etc.) and contain contact details for you. If you are repeatedly mailbombed or attract such behaviour, the Services will be terminated.
2.2 You should not send email to any user who does not wish to receive it, either at the Company or elsewhere. The Company recognizes that email is an informal medium; however, you must refrain from sending any further emails to a user after receiving a request to stop.
2.3 You may not alter the headers of email messages to disguise their identity or to prevent users from responding to the messages. The Company may disclose the usernames of accounts responsible for forged email messages to system administrators or users requesting the information.
2.4 Violations of the Company policies outlined herein can sometimes result in massive numbers of email responses. If you receive so much email that the Company resources are affected, the Company staff may shut down your mailbox.
2.5 It is unacceptable to send abusive or threatening correspondence to the Company, whether via our website or another means. It is also unacceptable to bombard or send repeated correspondence to the Company with a single request or enquiry whilst you are awaiting a reply from the Company with regard to that same request or enquiry.
System Security
3.1 You are prohibited from utilizing the Services to compromise the security of system resources or accounts on the Servers or at any other site. Use or distribution of tools designed for compromising security or containing viruses or trojans are prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.
3.2 If you are involved in violations of system security, the Company reserves the right to release all usernames of users involved in such violations to system administrators at other sites in order to assist them in resolving security incidents. The Company will also fully cooperate with law enforcement authorities in investigating suspected lawbreakers.
System Resources
4.1 System abuse includes any use of resources that disrupts the normal use of the Servers or Services for others. Examples of system abuse include running excessive numbers of processes or consuming excessive amounts of CPU time, memory, disk space or bandwidth.
4.2 Any usage of 10% or more of system resources is an undue burden on the system and is unacceptable. If your usage ever exceeds 10% of system resources, your account may be terminated immediately and without prior notice.
4.3 Further, running programs in the background on the Servers without the Company's prior written authorization, or running chat rooms, Internet Relay Chat, IRC bots and the like are not acceptable uses of the Servers.
Reporting Abuse
If you wish to report an abuse of our service (e.g. spam originating from our systems), please contact us. Please state clearly the nature of the abuse. We will investigate any reported abuse and if necessary take immediate action to prevent it. We will reply within 5 working days to inform you of the outcome of our investigation.