To make this site work properly, we sometimes place small data files called cookies on your device. Most websites do this too.
What are cookies
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions and preferences (such as login, language, font size and other display preferences) over a period of time, so you don’t have to keep re-entering them whenever you come back to the site or browse from one page to another.
- your display preferences, such as contrast colour settings or font size;
- language and geographic location.
Also, some features embedded in our website might use a cookie to anonymously gather statistics on how you got there and what other areas of our website you visited. In that process we might collect the following basic information about:
- the date and time of your visit;
- your computer or mobile set-up (e.g. type and version of web browser, operating system, screen resolution, and connection speed);
- the IP address of the visitor;
- the pages on our website that you visit;
- the internet address, or URL, of the website that connected you to our website, if you accessed our website via a link on another website.
Enabling these cookies is not strictly necessary for the website to work but it will provide you with a better browsing experience. You can delete or block these cookies, but if you do that some features of this site may not work as intended.
The cookie-related information is not used to identify you personally and the pattern data is fully under our control. These cookies are not used for any purpose other than those described here.
How to control cookies
You can control and/or delete cookies as you wish – for details, see aboutcookies.org
. You can delete all cookies that are already on your computer and you can set most browsers to prevent them from being placed. If you do this, however, you may have to manually adjust some preferences every time you visit a site and some services and functionalities may not work.
Registration on our website
On our website you also have the possibility to sign up to receive newsletters and other information from i-EM. When you register with i-EM, you generally provide your name, organization or company name, email address, and other registration information. Such User Provided information is important when delivering the requested services and information.
If you choose to provide us with the information, we may use that information to contact you, respond to your message, and/or provide you the services or information that you requested. When making the registration i-EM will also collect and store the provided information in our Customer Relationship Management (CRM) database storing information about our customers.
i-EM might use User Provided information from the CRM database to send you information regarding our products. If you do not want to receive product information from i-EM then please contact firstname.lastname@example.org
Data Retention Policy, Managing Your Information
i-EM will retain User Provided Information for a reasonable time. i-EM will retain Automatically Collected Information for up to one year and thereafter may store it in aggregate or until the user requests that the information is being deleted.
i-EM will permit you to access all information about you in its database by contacting email@example.com
. If you believe any of the information is incorrect or needs updating, please notify i-EM. i-EM will correct its records upon verification of the requested change.
If you would like i-EM to delete User Provided Information that you have provided through the website, please contact i-EM at i-EM and we will respond in a reasonable time.
i-EM is concerned about the safeguard of the confidentiality of your information. i-EM.eu will therefore take reasonable and prudent precautions to ensure that your personally identifiable information is protected against unauthorized access, use, or disclosure. lease be aware that, although i-EM endeavors to provide reasonable security for information it processes and maintains, no security system can prevent all potential security breaches.