1.What are cookies?
1.1. Cookies are small files that websites place on your computer when you browse the sites.
1.2. A pixel is a small piece of code on a web page or in a mail notification.
1.3. Local storage is a standard technology that allows a website or application to store information locally on a computer or mobile device.
2. Authentication and security:
2.1. Ensuring your safety.
2.2. Viewing content with distribution restrictions.
2.3. Detection and elimination of spam, insults and other actions that violate the Rules of the TRITON community.
These technologies help to verify the authenticity of access to the TRITON resource and prevent unauthorized access to your account.
They also allow you to show you content relevant to your interests.
3. User parameters:
3.1. Saving information about your browser and your preferences.
3.2. Using cookies, we remember your preferred language or the country in which you are located.
4. Analytics and research:
4.1. Cookies help us test different versions of our services to understand which features or content users prefer.
4.2. Cookies allow us to optimize and improve the operation of our services.
4.3. Cookies are used to count the number of users who have viewed specific content.
5.1. Cookies make it possible to display advertising, measure its effectiveness and make it more relevant to users based on data about their actions and visits to partner websites.
5.2. Cookies and pixels are used to personalize advertising and measure its effectiveness.
With this technology, we can show you advertisements and evaluate their effectiveness based on visits to our partners websites. This helps advertisers deliver high-quality ads and content that may interest you.
6. Using technology:
6.1. We (together with third parties) use these technologies on our websites, in our applications and services, as well as on other websites, in other applications and services integrated with our services (including on third-party sites using our advertising technology).
6.2. Third-party companies may also use these technologies, for example, when you click on links on our websites or in our applications, view third-party materials or interact with them within our services, as well as visit third-party websites using our advertising technology.
7. Privacy Settings:
7.1. Website https://triton.chat (hereinafter referred to as the site) stores users personal information in accordance with the internal regulations of the services.
7.2. With respect to the users personal information, its confidentiality is maintained, except in cases where the user voluntarily provides information about himself for general access to an unlimited number of persons.
7.3. Website https://triton.chat the right to transfer the users personal information to third parties in the following cases:
— The user has expressed his consent to such actions by consent expressed in the provision of such data;
— The transfer is necessary as part of the users use of a certain site https://triton.chat, or to provide goods and/or services to the user;
— The transfer is provided for by the legislation of the issuer of the country within the framework of the procedure established by law;
— In order to ensure the possibility of protecting the rights and legitimate interests of the site https://triton.chat or third parties in cases where the user violates the User Agreement of the site https://triton.chat;
— When processing personal data of users of the site https://triton.chat it is guided by the law of the issuer of the country «On personal data».
8. Change of personal information by the user:
8.1. The User may at any time change (update, supplement) the personal information provided by him or part of it, as well as the parameters of its confidentiality, by leaving a statement to the website administration by official mail:
8.2. The User may at any time withdraw his consent to the processing of personal data by leaving a statement to the website administration at the official email: [email protected]
8.3. Website https://triton.chat takes necessary and sufficient organizational and technical measures to protect the users personal information from unauthorized or accidental access, destruction, modification, blocking, copying, distribution, as well as from other illegal actions with it by third parties.