iMe Privacy Policy

Date of publication and entry into force [Updated]: 03/11/2019 [22/08/2022]


iMe Messenger & Crypto Wallet does not transfer any user data or device information to anyone, and uses the Telegram API, so for more details, please read the Telegram Privacy Policy.

Our client’s open source code is available at GitHub ( Android and iOS) to comply with the Telegram API terms of use and the GNU GPL licenses.

Using the mobile application “iMe Messenger & Crypto Wallet” (hereinafter referred to as the Application), which is a branch project (fork) of the Telegram messenger, which operates on the basis of its open API, has additional functionality and design elements, the user (hereinafter referred to as the User) accepts this agreement (hereinafter referred to as the Agreement) regulating the rules for using the Application, the procedure for purchasing paid services in the Application, the responsibility of the parties and other relations related to the use of the Application.

The developer and copyright holder of the Application is IME LAB LTD (Company Registration No. HE409498 Incorporated in the Republic of Cyprus under the Companies Act, hereinafter the Rightholder), however, the Application is based on the Telegram API, operates through servers and services owned by Telegram, thus the exclusive right of the Rightholder applies to the results of intellectual activity and equated to them means of individualization, not affected by the terms of use of the API "Telegram".

Due to the feature of the Application and the direct relationship with the servers and the Telegram equipment, the User accepts as a fact, and the Rightholder responsibly declares that it does not store, does not intend to store in the future, and does not process the personal data of the Application Users. All personal information of Users is transmitted and processed on servers and equipment of Telegram.


  1. TERMS AND DEFINITIONS

    1. According to the text of the Agreement, as well as in connection with the relationship between the Rightholder and the Application User, the following terms and definitions apply.

      1. User - a capable adult physical person (or legal representative of a minor), who has passed the registration procedure in the Application, has civil law and capacity, is able, in accordance with the legislation, to acquire rights and bear obligations on its behalf and act as a party to the Agreement.

      2. Store - application store “App Store” or “Google Play Market” (depending on the device of the User), through which the User installed and launched the Application on his device.

      3. Neurobot – A computer program built into the Application (neurobot) that mimics a person’s speech behavior when communicating with one or more people in an Application chat.

    2. Other terms used in the Agreement and / or in relations arising from it are subject to interpretation in accordance with the legislation of the Republic of Cyprus Singapore, and in the absence of their interpretation in the legislation in accordance with the customs of business and scientific doctrine.


  2. GENERAL PROVISIONS

    1. When using the Application, the User undertakes to comply with the Agreement, with all its integral parts, including the current legislation and international agreements, the rules of the Shops, other legal acts interrelated with the functioning of the Application.

    2. The Rightholder has the right, without the consent of the User, to involve third parties to fulfill the obligations under the Agreement, while remaining responsible for their actions to the User.

    3. The User undertakes to timely and independently familiarize himself with the current version of the Agreement. In case of disagreement of the User with the current edition of the Agreement, the User is obliged to stop using the Application.

    4. The User undertakes not to use possible errors of the software part of the Application in order to gain an advantage over other Users. The User undertakes to immediately report all errors he has identified in the Application to the Rightholder.

    5. The User is responsible for the security of his account in the Application, and is obliged to take measures independently to ensure its security.

    6. The Rightholder is not responsible for possible loss or damage to data, as well as other consequences of any nature that may occur due to a violation of the Agreement by the User, as well as the terms of use of the Telegram.

    7. The User acknowledges and agrees that he should independently assess all risks associated with the use of the Application, including an assessment of the reliability, completeness or usefulness of the information contained in the Application.

  3. LEGAL GROUND FOR PROCESSING YOUR PERSONAL DATA

    We process your personal data on the ground that such processing is necessary to further our legitimate interests (including: (1) providing effective and innovative Services to our users; and (2) to detect, prevent or otherwise address fraud or security issues in respect of our provision of Services), unless those interests are overridden by your interest or fundamental rights and freedoms that require protections of personal data.


  4. WHAT PERSONAL DATA WE USE

    1. Basic Account Data

      Telegram is a communication service. You provide your mobile number and basic account data (which may include profile name, profile picture and about information) to create a Telegram account.

      To make it easier for your contacts and other people to reach you and recognize who you are, the screen name you choose, your profile pictures, and your username (should you choose to set one) on Telegram are always public. We don't want to know your real name, gender, age or what you like.

      We do not require your screen name to be your real name. Note that users who have you in their contacts will see you by the name they saved and not by your screen name. This way your mother can have the public name 'Johnny Depp' while appearing as 'Mom' to you and as 'Boss' to her underlings at work (or the other way around, depending on how these relationships are structured).

    2. Your E-mail Address

      When you enable 2-step-verification for your account or store documents using the Telegram Passport feature, you can opt to set up a password recovery email. This address will only be used to send you a password recovery code if you forget it. That's right: no marketing or “we miss you” bullshit.

    3. Your Messages

      1. Cloud Chats

        Telegram is a cloud service. We store messages, photos, videos and documents from your cloud chats on our servers so that you can access your data from any of your devices anytime without having to rely on third-party backups. All data is stored heavily encrypted and the encryption keys in each case are stored in several other data centers in different jurisdictions. This way local engineers or physical intruders cannot get access to user data.

      2. Secret Chats

        Secret chats use end-to-end encryption. This means that all data is encrypted with a key that only you and the recipient know. There is no wayfor us or anybody else without direct access to your device to learn what content is being sent in those messages. We do not store your secret chats on our servers. We also do not keep any logs for messages in secret chats, so after a short period of time we no longer know who or when you messaged via secret chats. For the same reasons secret chats are not available in the cloud — you can only access those messages from the device they were sent to or from.

      3. Media in Secret Chats

        When you send photos, videos or files via secret chats, before being uploaded, each item is encrypted with a separate key, not known to the server. This key and the file’s location are then encrypted again, this time with the secret chat’s key — and sent to your recipient. They can then download and decipher the file. This means that the file is technically on one of Telegram’s servers, but it looks like a piece of random indecipherable garbage to everyone except for you and the recipient. We don’t know what this random data stands for and we have no idea which particular chat it belongs to. We periodically purge this random data from our servers to save disk space.

      4. Public Chats

        In addition to private messages, Telegram also supports public channels and public groups. All public chats are cloud chats (see section 4.3.1 above). Like everything on Telegram, the data you post in public communities is encrypted, both in storage and in transit — but everything you post in public will be accessible to everyone.

      5. Phone Number and Contacts

        Telegram uses phone numbers as unique identifiers so that it is easy for you to switch from SMS and other messaging apps and retain your social graph. We ask your permission before syncing your contacts.

        We store your up-to-date contacts in order to notify you as soon as one of your contacts signs up for Telegram and to properly display names in notifications. We only need the number and name (first and last) for this to work and store no other data about your contacts.

        Our automatic algorithms can also use anonymized sets of phone numbers to calculate the average number of potential contacts an unregistered phone number may have on Telegram. When you open the 'Invite friends' interface, we display the resulting statistics next to your contacts to give you an idea of who could benefit most from joining Telegram.

        You can always stop syncing contacts or delete them from our servers in Settings > Privacy & Security > Data Settings.


        If you are using Android, Telegram will ask you for permission to access your phone call logs (READ_CALL_LOG). If you grant this permission, Telegram will be able verify your account by transmitting a phone call instead of asking you to enter a code. Telegram uses this permission only to confirm receipt of the confirmation call by verifying the number in the call log.


      6. Cookies

        The only cookies we use are those to operate and provide our Services on the web. We do not use cookies for profiling or advertising. The cookies we use are small text files that allow us to provide and customize our Services, and in doing so provide you with an enhanced user experience. Your browser should allow you to control these cookies, including whether or not to accept them and how to remove them. You may choose to block cookies with your web browser, however, if you do disable these cookies you will not be able to log in to Telegram Web.


  5. KEEPING YOUR PERSONAL DATA SAFE

    1. Storing Data

      If you signed up for Telegram from the UK or the EEA, your data is stored in data centers in the Netherlands. These are third-party provided data centers in which Telegram rents a designated space. However, the servers and networks that sit inside these data centers and on which your personal data is stored are owned by Telegram. As such, we do not share your personal data with such data centers. All data is stored heavily encrypted so that local Telegram engineers or physical intruders cannot get access.

    2. End-to-End Encrypted Data

      Your messages, media and files from secret chats (see section 4.3.2 above), as well as the contents of your calls and the data you store in your Telegram Passport are processed only on your device and on the device of your recipient. Before this data reaches our servers, it is encrypted with a key known only to you and the recipient. While Telegram servers will handle this end-to-end encrypted data to deliver it to the recipient – or store it in the case of Telegram Passport data, we have no ways of deciphering the actual information. In this case, we neither store nor process your personal data, rather we store and process random sequences of symbols that have no meaning without the keys which we don’t have.

    3. Retention

      Unless stated otherwise in this Privacy Policy, the personal data that you provide us will only be stored for as long as it is necessary for us to fulfill our obligations in respect of the provision of the Services.

  6. PROCESSING YOUR PERSONAL DATA

    1. Our Services

      Telegram is a cloud service. We will process your data to deliver your cloud chat history, including messages, media and files, to any devices of your choosing without a need for you to use third-party backups or cloud storage.

    2. Safety and Security

      Telegram supports massive communities which we have to police against abuse and Terms of Service violations. Telegram also has more than 400 million users which makes it a lucrative target for spammers. To improve the security of your account, as well as to prevent spam, abuse, and other violations of our Terms of Service, we may collect metadata such as your IP address, devices and Telegram apps you've used, history of username changes, etc. If collected, this metadata can be kept for 12 months maximum.

    3. Spam and Abuse

      To prevent phishing, spam and other kinds of abuse and violations of Telegram’s Terms of Service, our moderators may check messages that were reported to them by their recipients. If a spam report on a message you sent is confirmed by our moderators, your account may be limited from contacting strangers – temporarily or permanently. You can send an appeal using @Spambot. In case of more serious violations, your account may be banned. We may also use automated algorithms to analyze messages in cloud chats to stop spam and phishing.

    4. Cross-Device Functionality

      We may also store some aggregated metadata to create Telegram features (see section 6.5 below) that work across all your devices.

    5. Advanced features

      We may use some aggregated data about how you use Telegram to build useful features. For example, when you open the Search menu, Telegram displays the people you are more likely to message in a box at the top of the screen. To do this, we calculate a rating that shows which people you message frequently. A similar rating is calculated for inline bots so that the app can suggest the bots you are most likely to use in the attachment menu (or when you start a new message with “@”). To turn this feature off and delete the relevant data, go to Settings > Privacy & Security > Data Settings and disable “Suggest Frequent Contacts”.

    6. No Ads

      Unlike other services, we don't use your data for ad targeting or other commercial purposes. Telegram only stores the information it needs to function as a secure and feature-rich cloud service.

  7. WHO YOUR PERSONAL DATA MAY BE SHARED WITH

    1. Other Telegram Users

      Other users of our Services with whom you choose to communicate with and share certain information, who may be located outside the EEA. Note that by entering into the Terms of Service and choosing to communicate with such other users of Telegram, you are instructing us to transfer your personal data, on your behalf, to those users in accordance with this Privacy Policy. We employ all appropriate technical and organizational measures (including encryption of your personal data) to ensure a level of security for your personal data that is appropriate to the risk.

    2. Telegram’s Group Companies

      We may share your personal data with: (1) our parent company, Telegram Group Inc, located in the British Virgin Islands; and (2) Telegram FZ-LLC, a group member located in Dubai, to help provide, improve and support our Services. We will implement appropriate safeguards to protect the security and integrity of that personal data. This will take the form of standard contract clauses approved by the European Commission in an agreement between us and our relevant group companies.

    3. Law Enforcement Authorities

      If Telegram receives a court order that confirms you're a terror suspect, we may disclose your IP address and phone number to the relevant authorities. So far, this has never happened. When it does, we will include it in a semiannual transparency report published at: https://t.me/transparency.


  8. YOUR RIGHTS REGARDING THE PERSONAL DATA YOU PROVIDE TO US

    1. Your Rights

      Under applicable data protection legislation, in certain circumstances, you have rights concerning your personal data. You have a right to: (1)request a copy of all your personal data that we store and to transmit that copy to another data controller; (2) delete (see section 9 below) or amend your personal data; (3) restrict, or object to, the processing of your personal data; (4) correct any inaccurate or incomplete personal data we hold on you; and (5) lodge a complaint with national data protection authorities regarding our processing of your personal data.

    2. Data Settings

      You can control how your data is used (e.g., delete synced contacts) in

      Settings > Privacy & Security > Data Settings (using one of our mobile apps).

      Sadly, if you're generally not OK with Telegram's modest requirements, it

      won't be possible for us to provide you with our Services. You can delete your Telegram account by proceeding to the deactivation page.


  9. DELETING DATA

    1. Accounts

      If you would like to delete your account, you can do this on the deactivation page. Deleting your account removes all messages, media, contacts and every other piece of data you store in the Telegram cloud. This action must be confirmed via your Telegram account and cannot be undone.

    2. Messages

      In secret chats, deleting a message always instructs the app on the other end to delete it too.

      In cloud chats, you can choose to delete a message for all participants within at least 48 hours after sending. Otherwise, deleting a message will delete it from your message history. This means that a copy will stay on the server as part of your partner's message history. As soon as your partner deletes it too, it's gone forever.

      As of version 5.5, any party can choose to delete any messages in one-on-one chats, both sent and received, for both sides. There is no time limit. Any party can also opt to clear the entire chat history for both parties, in which case the apps will be instructed to remove all messages in that chat, however many of them are still retained by either of the participants.

      In supergroups and channels, deleting a message removes it for all participants. Note that deleted messages and original versions of edited messages from supergroups are stored for 48 hours after deletion in order to be shown in the admins log.

    3. Self-Destructing Messages

      Messages in Secret Chats can be ordered to self-destruct. As soon as such a message is read (2 checks appear), the countdown starts. When the timer expires, both devices participating in a secret chat are instructed to delete the message (photo, video, etc.). Media with short timers (less than a minute) are shown with blurred previews. The timer is triggered when they are viewed.

    4. Account Self-Destruction

      By default, if you stop using Telegram and do not come online for at least 6 months, your account will be deleted along with all messages, media, contacts and

      every other piece of data you store in the Telegram cloud. You can go to Settings to change the exact period after which your inactive account will self-destruct.


  10. REGISTRATION IN APPLICATION

    1. After downloading the Application to his device from the Store, the User installs the Application, launches it and goes through the registration procedure in the Application.

    2. In order to complete the registration, after installing the Application from the Store, the User needs to associate his device with the Telegram database, for which he needs to perform one of the following actions:

      1. Enter the code that came to any active “Telegram” of the User (both the mobile application and the stationary version for the personal computer);

      2. Enter the code from the SMS message.

    3. Registration and entry into the Application is carried out using the Telegram service. The service of registration and authorization of the User in the Application works exclusively with the help of the equipment and servers of Telegram.

    4. The User is obliged to immediately notify the Rightholder of any case of unauthorized (not permitted by the User) access to the User account and / or any violation (suspicion of violation) of the confidentiality of their means of access to the account in the Application. The Rightholder is not responsible for possible loss or damage to data, as well as other consequences of any nature that may occur due to a violation of the provisions of the Agreement by the User.


  11. LINK TO TELEGRAM

    1. The Application is developed on the basis of the Telegram API, accessible via the https://core.telegram.org/api link, which has open source code. The peculiarity of the Application is that all the functional features of the “Telegram” are saved in it, as well as new ones that are not included in the “Telegram”, such as the use of Neurobots, are added.

    2. It is impossible to access the User’s personal information through the equipment and / or the Rightholder’s server, since the entire User’s information is stored on its device and on the Telegram equipment.

    3. The sole function of the server hardware of the Rightholder in the Application is to store information about Neurobots, as well as their estimates, the number of installations and other information about Neurobots, which will be displayed in the Store.

    4. All cloud storage used in the Application belongs to the “Telegram”, the entire history of correspondence, contacts, files, media of the User is stored in

      his account and is displayed both in the Application and in the “Telegram”. This, in fact, is a single database.

    5. The main difference of the Application from “Telegram” is the possibility of using Neurobots, as an additional functionality, working on top of the existing one in “Telegram”.


  12. SHOPPING AND USING NEUROBOTS

    1. Neurobots available in the Application interface are divided into paid

      and free.

    2. Any Neurobot may be updated and / or deleted at any time on the

      initiative of the Rightholder and for objective reasons. No prior notice to the User of the update and / or removal of the free Neurobot is required. In case of removal of the Neurobot paid by the User, the Rightholder shall have the right to provide the User with the opportunity to choose the same Neurobot from among those functioning, at no additional charge. The User undertakes to inform the Rightholder about his choice. After updating Neurobot, the User needs to update the Application on his device.

    3. The purchase of Neurobot is carried out according to the “as is” principle, that is, from the moment the access to the Neurobot is granted, the service is considered to be rendered. The fact of non-use of Neurobot does not affect the financial relations of the parties under the Agreement. The Rightholder is not obliged to refund if the User does not use the purchased Neurobot.

    4. Any payment in the Application is carried out in accordance with the interface of the respective Store and according to its rules.

    5. The cost of any paid Neurobot, as well as other conditions for acquiring Neurobot (for example, a paid subscription, etc.) is presented in the Application interface.

    6. The current version of Neurobot, which is available to the User, is not subject to change, this means that Neurobot does not analyze the User’s correspondence and does not “complete its education” during its use, does not transmit correspondence for analysis, etc.

    7. The User, at his own discretion, decides on the use of Neurobot with his interlocutors and bears full responsibility for its use before other Users. The Rightholder does not create abusive or slanderous messages during the development of Neurobot, however, it does not control the User’s correspondence process, so some expressions proposed by Neurobot may seem to other Users unacceptable. Under no circumstances is the Rightholder responsible for the User’s correspondence, does not keep it, does not have access to it.

  13. USE OF WALLET

    1. Currently, the iMe Messenger wallet ("Wallet") is based on a centralized platform using Google servers. This is necessary to test and debug Wallet functionality, after which the transition to a decentralized platform will be made. The user will be notified additionally.

    2. Activation of the Wallet is performed by authorization of the Account of the User via Telegram. Authorization is implemented via OAuth2 Telegram bot and is required every time you log in or reinstall the Application.

    3. Any additional questions not described in this section related to the use of the Wallet the User may write in support on @iMeMessenger.


  14. ACCOUNT AND BLOCKCHAIN OF THE ETHEREUM & BINANCE SMART CHAIN

    1. Due to the inherent transparency of many blockchains, including the Ethereum Blockchain and BSC, transactions that individuals broadcast via iMe Wallet may be publicly accessible. This includes, but is not limited to, your public sending address, the public address of the receiver, the amount sent or received, and any other data a user has chosen to include in a given transaction. Information stored on a blockchain may be public, immutable, and difficult or even impossible to remove or delete. Transactions and addresses may reveal information about the user’s identity and information can potentially be correlated now or in the future by any party who chooses to do so, including law enforcement. Users are encouraged to review how privacy and transparency on the blockchain works.

      More information about Ethereum and Binance Smart Chain can be found on the official website of the platforms https://ethereum.org/en and https://www.binance.org/en/smartChain.

    2. Only you have access to your Ethereum and BSC account, private keys and funds on your accounts. The application does not store keys, access and recovery files.

      After creating a crypto wallet, be sure to make a backup copy in the settings and store it carefully. Make sure that you have saved your passphrase in a safe place. You, and only you, can restore your wallet if you lose your smartphone or when you log in from a new device, including through third-party wallets, only with the backup copy help.

      If you do not have a backup and you lose your smartphone or delete the application, you will not be able to restore your account and all funds will be lost forever. Nobody can help you.

      Beware of scams and questionable offers. Do not give your public wallet address to strangers. By knowing your address, anyone can find out your balance through the open system of blockchain operations. Set up data privacy in your Telegram profile additionally.

    3. DeFi (decentralized finance) is one of the future sections of the iMe Wallet. The iMe platform offers proven, proprietary tools and services that serve to provide a wide range of DeFi services to individual interested in creating long term value from digital assets.

      By creating a secure architecture, we are creating a safe and seamless platform for DeFi transactions, helping keep users digital assets secure.

    4. We may contract with third parties to perform functions related to the Services (“Service Providers”). In general, Service Providers will have access to your Personal Information only to the extent needed to perform their business functions but may not use or share that personal information for purposes outside the scope of their functions related to the Services.

    5. The Services contain links to other third-party websites or applications. Once you click on such a link and leave the Application or are redirected to a third-party website or application, you are no longer governed by this Policy. Any information you provide on those sites is subject to that third party’s privacy policy and we are not responsible for the privacy and security practices and policies of those third-party sites or applications.

      For example, our partner Simplex (https://www.simplex.com) is an EUlicensed fintech company that provides worldwide payment processing. You can view Simplex's Privacy Policy at https://www.simplex.com/privacy-policy.


  15. SIMPLE ELECTRONIC SIGNATURE

    1. By virtue of the Law on Electronic Signature, a simple electronic signature is an electronic signature, which, by using codes, passwords or other means, confirms the fact that an electronic signature has been generated by a certain person. Thus, any actions of the User using the login and password to his account in the Store and / or to the account in the Application confirm the fact of the formation of a simple electronic signature directly by the User.

    2. Electronic documents and messages signed with a simple electronic signature are recognized as equivalent documents on paper, signed with a handwritten signature.

    3. The user undertakes to respect the confidentiality of his electronic signature and bears full responsibility for its safety and individual use, independently choosing the method of their storage and restricting access to it.


  16. LIMITATION OF LIABILITY

    1. The User understands and unconditionally agrees that he uses the Rightholder's services under the Agreement solely at his own risk and that the services are provided to the User on an “as is” and “as available” basis, namely the Rightholder does not declare or guarantee that:

      • services will meet the requirements of the User;

      • services will be provided continuously, timely, safely and without errors;

      • any information received by the User as a result of using the services will be full-time and reliable;

      • defects in the work or functionality of any software as part of the Application will be corrected in the expected time of the User.

    2. The User also understands and agrees that all the Application’s services are provided “as is” and that the Rightholder is not responsible for any delays, malfunctions, incorrect or untimely delivery, deletion or failure of any user personal or other information.

    3. The copyright holder of "Telegram" is responsible for the quality of communication services presented in the Application.

    4. Access to downloaded malware in the Application.

    5. The Rightholder is not responsible for the loss of User data.

    6. The User agrees that the Application meets its requirements.

    7. The Rightholder or his representatives are not responsible before Users or before third parties, for any indirect, incidental, unintentional damages, including enhanced outcomes or lost data, harmful conditions, value or business reputation arising in connection with the use of the Application, all usable that can be achieved with it.


  17. INTELLECTUAL PROPERTY

    1. The design elements, all Neurobots and other objects missing in the Telegram interface are subject to the exclusive rights of the Rightholder.

    2. The user is granted a personal non-exclusive and non-transferable right to use the Application on his device, provided that neither the User himself nor any other persons with the assistance of him will:

      • copy or modify the software;

      • create software-derived programs;

      • penetrate the software in order to obtain program codes;

      • violate the rights of third parties;

      • to sell, assign, lease, transfer to third parties in any other form the rights with respect to the software provided to the User under the Agreement;

      • modify services, including in order to obtain unauthorized access to them.

    3. The User is strictly prohibited to use Neurobots, both as a whole and as a separate part (for example, images, Neurobot images) outside the interface of the Application. In the event that a violation of this condition is found, the Rightholder has the right to seek compensation for violation of the license for Neurobots in the amount of 1,000 to 50,000 US dollars at its discretion, depending on the nature of the violation.

    4. In the event of the discovery of a violation of intellectual property rights, the respective copyright holder shall, in the pretrial order, send a statement to the Rightholder by e-mail: [email protected]. A statement is submitted by an authorized person, a copy of the document is attached to a statement (in written or electronic form) confirming his authority.

    5. In case of detection of incomplete information, inaccuracies or errors in the Application, the Rightholder submits to the applicant within 24 (twenty-four) hours from the date of receipt of a statement a notification on the clarification of the submitted information. This notification may be sent to the applicant once. Within 24 (twenty-four) hours from the moment of receiving the notification, the applicant takes measures aimed at filling the missing information, elimination of inaccuracies and errors, and sends the specified information to the Rightholder.

    6. Within 24 (twenty-four) hours from the moment of receipt of a statement information specified by the applicant (in the case of notification to the applicant), the Rightholder removes the intellectual property from the Application, the rights to which have been violated.

    7. If the Rightholder has evidence confirming the legality of placing information containing the object of copyright and (or) related rights in the Application, the Rightholder has the right not to take measures to remove such information on a statement, and sends the applicant a corresponding notice with the above evidence.


  18. FINAL PROVISIONS

    1. All disagreements or disputes that may arise between the parties to the Agreement should be resolved in the pretrial order through negotiations, the sending of claim letters. The deadline for responding to a claim is 10 (ten) business days. Claims of the User are accepted and considered by the Rightsholder only in writing.

    2. If agreement for any reason is not reached during the pre-trial settlement, the dispute arising from the Agreement shall be considered on the basis of Cyprus international arbitration law.

    3. The law of the Republic of Cyprus applies to the relations of the parties under the Agreement. Acceptance of the Agreement by a foreign User means that the text of the Agreement is understandable to him and does not need translation. If necessary, the translation of foreign users undertake to translate into the language they need on their own and at their own expense.

REQUISITES OF THE RIGHTHOLDER

Name: IME LAB LTD

Company Registration No. HE409498

Incorporated in the Republic of Cyprus

Email: [email protected]