Acceptance of terms
The following are the terms of a contract entered into
between you and ICEL. By accessing and using this Website, you accept that you
have read and understood these terms and will comply with all applicable laws
If you do not agree to these terms, please do not use this
Website. The material on this Website is protected by law.
All content on this site is the exclusive property of ICEL:
texts, images, or any other information that does not come from third parties.
In this way they are protected by the Copyright Code. ICEL reserves the right
at any time to make changes to this content and is under no obligation to make
any prior communication to users.
Links to Third Party
This Website may contain links to third party sites
("linked sites"). The linked sites are not under the control of ICEL
and ICEL is not responsible for the content of any Linked Site.
Taking into consideration the use of this Website, the User
agrees to: provide correct, current and complete information when registering
on this Website; maintain the security of your password and identification;
keep your information up-to-date; accept all risks of unauthorized access to
the information and Registration Data. You are solely responsible for the
proper backup, backup and equipment used to connect to this Website.
The user of this site is only authorized to make use of the
contents here present for strictly personal purposes. The publication,
reproduction, or distribution of this content to third parties is expressly
prohibited without the prior authorization of ICEL.
ICEL reserves the right to take legal action against the
perpetrators of any unauthorized use of the contents of this Website.
Privacy and security
All your data collected by ICEL have the sole purpose of
invoicing. Our company assumes a commitment to privacy of any and all personal
data of the customer, as well as their security. Any information you provide us
will only allow our service to best suit your needs. The information entered at
the time of payment is duly protected and encrypted using the most advanced and
effective security tools.