Term of Service

These terms of service relate to use of the Web Sites Properties Impero Web www.imperoweb.it www.imperoweb.com, Community Builder Italia www.communitybuilder.it , Opensimulator Italia www.opensimulator.it of Social Networking Fun Snoop www. funsnoop.com and the World's Virtual Clone Life www.clonelife.eu.
You Tell That in all network Properties Just a single registration to access all sites, but they are separate login access so only record but multiple access (this does not apply to Community Builder Italy being updated).
Are applied to both anonymous visitors, and registered users to the sites and the 3D world, both users use the 3d world coming from other worlds interoperable even anonymously.
Users undertake to inspect and accept the terms before you sign up, login on websites or do any kind of business online.
Impero Web reserves at any time to change, unilaterlalmente these terms and conditions. By communicating through the pages of the site users.
Impero Web and 'a collaborative infrastructure.
Empire Web can contentere areas, forums, chat areas, discussion groups, online communities or other forms of communication that can be used to contact a large group of people, in particular by registering and using Impero Web  committing to enter and consistent material related to the purposes of the site.
Using the tools available and 'forbidden:
- Defame and offending other users
- Publish the post or images contained in such obscene.
- Enter the content, software or images latro material in which it does not have the property 'rights (or the rights for publication) and' obligation of the user to verify that they have rights that are assigned via his responsibility.
- Enter files that contain a virus or corrupted data or could damage the systems of other users.
- Enter advertising content or that refer to specific products
- Download the content from the site and entered by other users without asking prior permission
- Falsify or delete content from other users
- Implement behaviors that limit the use of the contents or part of the site to others.
- Use the site to gather information about other Users
- Violate any laws or regulations of the Italian state or international laws and regulations ..
Impero Web assumes no obligation to monitor the activities' of users, however, retains the right to remove without providing any justification whatsoever at its sole discretion any content that violates the above points and reserves the right to terminate any account without prior notice to users will justify .
1. Do not use disrespectful language, much less abhorrent terms.
It 'an obvious rule, but on the Internet, where there is no' direct contact, is even greater.
This does not mean that the Net you can safely give the "you" where, normally, you would use the third person. For those internet respect is a matter of substance, not of the form.

2. Do not flame.
The term (derived from Anglo-electronic) means heat, flame corresponds to ignite, push in critical tones unsuitable for a civil discussion. A fortiori, it is considered flame (in its worst kind) the use of insults.
In any electronic àmbito the debate must be characterized by the maximum balance and full respect for the people. In this sense, the experience of the Internet could be a good example for the social life of every day.
3. Do not write in all caps.
At one time, many self-taught typists loved to write in all capital letters, perhaps to better highlight their thoughts. While technology is very different, the common keyboard resulted in the passage of this practice by typing real telematics.
In fact, however, the upper case in the second ambit is absolutely not recommended: the Internet equivalent to shouting and is well understood by users. Indeed, many "purists" love to write everything in lowercase.

4. Use the "emoticons".
As in all forms of communication that do not involve direct contact (or even voice), you must be very careful not to use formulas and / or words from the ambiguous meaning. And, in fact, if visually you can always check the compatibility between the objective meaning of the speech and facial expressions or mime interlocutor, with electronic correspondence (in all three forms seen) this is not possible.
We must thank the electronic whether, today, there is one more tool to clarify the meaning of the words written (not for formal correspondence, but the Internet is a must).
They are called "emoticons", another son of telematics and English neologism composed of the terms emotional (emotional) and icons (icons in true computer language).
Avoiding difficult translations (which can not go beyond the literal), the emoticons are nothing more than simple sets of characters (colons, semicolons, dashes, parentheses, etc..) Which, in different combinations, drawing stylized faces represented virtually all the possible states of mind in the same way the Internet.
Here are the three most common examples, certainly more enlightening (to be read ideally by turning it 90 ° clockwise):
Joy :-)
:-( Sad
;-) Irony, blink (note the '"wink" that mimic the human means just wink).
Although it may be considered a whim a little 'snob, the emoticons are really fundamental. Just an example:
sentence without emoticons - "I visited your website and I did not like at all."
sentence with emoticons - "I visited your website and I did not like at all ;-)."
Only in the latter case our interlocutor will understand that it is a joke and that, in fact, the site is appreciated.
That's why emoticons, far from being a form of expression adolescence, are a cornerstone of electronic communications. In essence, a means to be better understood and correctly. In part, a way to prevent the flame.
5. Observe the topic of discussion.
Mailing lists and NG (newsgroup) is a must for relevancy. The virtual showcase represented by these means is naturally divided into several areas. A member launches a sub-topic (strictly indicated in the object-subject of the message), and they participate in the discussion developed it after the first operation.
Obvious reasons suggest not to go off topic (off-topic, off English outside and topic, topic) (5), do not put your mail in an area where interested not find it and where, moreover, could disturb those who speak of nothing else.
6. Not to intervene immediately in the discussion.
A rule that applies to the mailing list for the NG. No, just walked into a living room that houses it for the first time, it would launch immediately in the discussions that take place among the living who attended him for some time. Same rule applies for telematics. The user, for example, decide to start following the discussion of it.diritto should download for a while 'time, all messages, understand the object of discussion and observe the behavior of those who already live in . Only then can join the group by conforming to the unwritten rules that are proper. In the jargon, this is called lurking behavior (from English to lurk, hide, peek) that, Italianate, becomes "lurkare."
Some groups and lists provide, however, a "FAQ" section (which stands for Frequently Asked Questions, answers to frequently asked questions) that, for example, to avoid newcomers to raise an issue which has been widely debated and resolved, which could give much trouble to veterans.
7. Do not send unsolicited email (spamming practice called) even more so when advertising.
As anyone would like to find every morning, your mailbox full of junk mail, the internet (especially if old) does not like unwarranted invasions of email. It must also be borne in mind that the Internet is a tool for many. It follows the opportunity to not unduly influence on these activities.
Violations of this rule (unfortunately very frequent) are considered among the most serious.
8. Do not send attachments to your email unless prior consent (even tacit and generic) of the recipient.
The rule derives from the attention that is given to saving resources, an image, an executable file or a text document occupy a certain space if it should be multiplied by all the emails circulating on the Net would undermine the stability of the electronic system. For this reason, among others, most providers limit the cash flow available to the email service of the individual user (eg 1 Mb maximum for each email). However, if the item was really necessary, it is always advisable to use a compressed format (eg zip, jpeg for images).
In particular, you should not send attachments in the mailing list as this medium does not allow sending a "targeted", but affects all members.
The situation is different newsgroups so-called "tracks" based on their attachments (maps, images, etc..).
But sending attachments is also inadvisable for a far more important reason. The file formats that support macros are potential carriers of, well, "macro viruses". E 'therefore not only not a good idea to send, but not open attachments of this type. (6) The rule applies, a fortiori, for executable attachments, traditional spread viruses.
9. Do not send or forward chain letters.
Unfortunately, the e-mail suffers from this practice (chain letters) that already afflicts ordinary mail. And 'well not invent chains, nor promote them. Are not at all like the majority of users. The most dangerous, then, are those that promise easy money and fast.
There is one exception to that might be worth to contribute to the spread of the chain: the case of a charitable and social background (eg subscriptions "moral" to a particular case, to help people in need, announcements of missing persons, etc.. ).
In these cases it is always advisable to check that the chain refers to events or real people and, however, continue to send to the corresponding sensitive topic.
10. Do not use the characters accentanti, though not strictly ASCII.
In Network must be understood clearly and to do that you may want to give up certain special characters.
Sometimes you may receive partially incomprehensible and certainly not as a matter of language. In particular, it may receive messages whose end are represented by one or more characters without sense. You will find that this substitution occurs where there should be accented letters.
The fact can be explained easily. For each geographical area is assigned a certain linguistically homogeneous "character set" which includes a common core (ASCII) and an extension typical of those languages. One intended to Italy certainly includes accented letters, but this is not the case for all countries.
The character set can not be the infinite dimensions. That is why the same comprises, strictly, certain characters in use in that area. This peculiarity can best be understood by noting that there are keyboards for different languages (even for different countries). Apart from the basic features and numbers, each keyboard has its variants.
It must be said that the problem can also be met on some mailing list that, while aimed at members certainly have the same character set, are controlled by servers located abroad, for that reason, are not always able to handle characters provided for the geographical area which is in use the list.
To overcome this limitation (which, for us, it seems limited to accents and other special characters) you can use the apostrophe, as was a certain time of typewriters.
11. In electronic correspondence using the mode "text only".
The recent client (eg MS Outlook Express, Netscape Messenger 4.x and Qualcomm Eudora Pro 4.x) also support the HTML format, namely that used for the "design" of the Web pages This has the advantage of being able to send an email with the imaginable visual effects typical of the Web, but this feature is not without its drawbacks.
It is not, in fact, guaranteed compatibility with all the e-mail software. Users with clients that do not supporting this feature (maybe not the latest version) will view messages almost completely incomprehensible.
In addition, an HTML email is certainly more cumbersome (in terms of file size) than a written in plain text. In essence, the use of this format would entail yet another waste of resources often unjustified.
There is, however, a remedy more felt the need, namely to highlight, in some way, words or passages in the message. And 'in fact customary use asterisks * or the underscore character _ (underscore). For example, you can highlight words * right * and _Internet_ as just seen.
12. Be brief.
A final rule. The synthesis, in traditional correspondence, would also help save paper, then trees. But the problem of the resource is most felt on the Net Write a message synthetic equivalent to occupy minimum space required on the connecting channels worldwide and on each server. The ideology is based on the full electronic sharing of resources that, in fact, must be passed usable by all people without abuse by the few.
Appearance related to the synthesis is related to the so-called "quoting" and the signature placed in lime to messages (from some improperly called "electronic signature").
"Quoting" (from English to share, quote, quotes and quotes means) is the citation of the message to which you are responding. This is to promote understanding of the topic.
It 'a valuable option available on virtually any email client that automatically turns on and responding to the author (eg "reply" or "reply to author"). The reply email will contain at least the text to which it responds marked precisely by quotes of this type normally>. The e-mail will therefore be editable as usual.
The same feature is available for forwarding. But it is always to be avoided, for obvious reasons of privacy, the quotation of excerpts and forwarding messages from third parties. To do so will need to secure the consent of the original author.
In general, a good rule of thumb is to limit the quoting to the minimum necessary, by cutting steps which does not replicate. I enjoy the size of the message, but, of course, also its readability.
The signature (which you can enter from time to time or place through a pre-established pattern to be recalled with a single command) is a less common. Certainly useful, it can lead to abuses. A signature of four or five lines is sufficient to encompass all that is needed for business reasons. Further, you might annoy many users.

Can not Register with Email temporary, immediate account cancellation without notice.

To the Owner of the Virtual World 3D Clone Life, Impero Web Group disclaims any legal liability, and not on the sim leased to third parties for legal purposes so each owner is responsible for the material you use in your sim, or that others leave. Leaders of Impero Web promises to notify the owner in case you encounter any use of illegal material. NOT be in ANY case no form of copybot and will not be tolerated by the metaverse immediate BAN penalty and will not be available in any case refund money. Impero Web will commit to regularly carry out rescue oar format for the islands that will not give in no event will the owner of the sim it to others even in the form of compensation.

NOTE! This site uses cookies and similar technologies.

If you not change browser settings, you agree to it. Learn more

I understand

Impero Web srl owns the site Clone Life

  IT CONCERNS:

EU Directive 2009/136/EC , which requires users to give their consent before the website collect their data

Please read the following to learn more about our cookie policy .

WHAT ARE COOKIES ?

A cookie is a text file stored on a user's browser on a computer or any other device, when he / she logs on to a website. Allows you to identify the device of a user and display a suitable site for his / her preferences . In addition, he remembers a website you visited and recognizes when a user returns to the site.
COOKIES ARE USED FOR ?

Cookies are used for the regulation of content websites for user preferences and optimizing the use of websites. They store the information in order to simplify and improve the Internet experience . They are mainly used for:

allowing you to stay connected on a desired website ,

adjusting content websites for user preferences and optimizing the use of websites , especially these files allow you to recognize the device of a user of the service and display a suitable site for his / her individual needs,

the creation of statistics that help to understand how users use web services to enhance their structure and content (Google Analytics ) .

WHAT TYPES OF COOKIES ARE USED ?

There are two types of cookies , namely: persistent cookies that session cookies . Persistent cookies remain on your hard drive for the time specified in the cookie file parameters, or until the time of their removal by a user manually. A session cookie , on the other hand , are used temporarily and as they mature, once a website or a web browser is closed .

COOKIES INCLUDE PERSONAL INFORMATION ?

If there is a need for collection of personal information is required by the laws of data protection to inform users about the collection of personal data .
In the other cases , personal data are decoded in a sense it is inaccessible to unauthorized persons.

MANAGEMENT OF COOKIES

By default , you can place cookies on a browser, however, these settings can be modified in a way to block cookies or to inform service from time to time on their use . Detailed information about cookies and their service is available in the settings for each browser.

QR-Code dieser Seite