3. Conditions for the Use of the Service

3.1. Equipment

3.1.1. In order to use the service, the user will need a broadband Internet connection. The user must ensure the availability of equipment necessary in order to access the Internet or to have the capacity to communicate through it, such as headphones, microphones and webcams.

3.1.2. The software of the Service may use the computing power, memory and communication channels used by the user’s computer or mobile device solely for the purpose of providing the Service. If the User's use of the service depends on the CPU and computer communication channels owned or controlled by third parties, the User must obtain the consent of the relevant third parties.

3.1.3. From time to time it may be necessary to perform routine maintenance on the Service. In connection with this it may be necessary to temporarily suspend the service or partially limit or terminate the User's use of the Service until the completion of maintenance to the service. The user has no right to claim damages for such suspension or restriction of services available within the service.

3.2. The User’s Personal Account

3.2.1. Before the first use of the Service the user is prompted to create a user account either by specifying the email address and password, or using authentication data of third party providers to identify the user through its own account. Even if the user has registered an account with a third party, the user will be asked to specify a password for subsequent changes to the account. It is recommended that you use a password that is not simple to guess and that consists of letters, numbers and special characters.

3.2.2. The Use of the Service in its entirety can only be done through a user account. The User is fully responsible for all their actions performed during the use of the user’s account. In order to prevent unauthorized use, it is recommended to keep your password secret, do not disclose it to third parties and do not use it to access Web sites or third-party services. If you suspect that your password could be found by someone else, the user is strongly recommended to immediately change the password in order to protect the confidentiality of your user account.

3.2.3. You are allowed to use the Service for informational purposes only without using a user account, in which case, the user is given a limited set of functions.

3.3. Content of Communication Exchange

3.3.1. The Service is not responsible for the content of the information exchange, which is conducted at the discretion of the user using the Service. By using the Service, the User agrees that any content posted by them can be obtained by a person with whom the user interacts with within the Service. The user is solely responsible to third parties for their actions related to the use of the Service, including, if such action would lead to a violation of the rights and legitimate interests of any third parties, as well as the compliance with the law while using the Service.

3.3.2. i2istudy reserves the right to verify the content sent between the users through the Service in order to ensure compliance with this Agreement. The Service may, in its discretion, block a user (for example, in order to prevent the sending of messages, as well as calls to other users, or any other means of communication) in order to protect the Service and the compliance with these Conditions.

3.3.3. When using the Service, the User does not reserve the right to: upload, send, pass on, or in any other way post and/or distribute content which is unlawful, harmful, libelous, morally offensive in connection with(or which is propaganda of) violence and cruelty, violate intellectual property rights, promote hatred and/or discrimination against people on racial, ethnic, sexual, religious or social grounds, contain anything of an insulting nature to any persons or organizations, contain elements of (or which is propaganda of) pornography or child pornography, constitute an advertisement of (or a promotion of) services of a sexual nature (including any form of alluding to such types of services), discuss the procedure of manufacturing how to use or alluding to the use of narcotic substances or other analogues of substance abuse, explosives or other weapons; violate the rights of third parties, including minors and/or to bring harm to minors in any way; impersonate any person or act as a representative of any organization and/or community without sufficient rights to do so, including employees of i2istudy, as the site owner, and apply any other forms and methods of illegal representation of others within the network, as well as lead users or lead i2istudy employees into deception of any form about the properties and characteristics of any subjects or objects; upload, send, share, or in any other way to post and/or distribute content, without possessing the rights to do so by law or any contractual relationship; upload, send, share, or in any other way to post and/or distribute with the lack of specified permission of advertisements, spam (at the same time including searches), lists of e-mail addresses of others, any form of pyramid schemes, multi-level (network) marketing, systems of online get-rich-quick schemes and e-mail businesses, as well as the use of the Service in order to participate in these types of activities; upload, send, share, or in any other way to post and/or distribute any material that contains viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer or telecommunications equipment or programs for unauthorized access, as well as serial numbers for commercial software products and programs for their generation, logins, passwords and other means to gain unauthorized access to sites on the Internet or offering paid resources on the Internet, as well as provide links to the given information above; collect and store personal data of other persons in an unauthorized manner; disrupt the normal operation of the website and mobile applications of the Service; post links to network resources, use of the content of which is contrary to law; promote actions in violation to the restrictions and prohibitions imposed by the Agreement; otherwise violate the norms of the international law and legislation.

3.4. Notice of the inadmissibility of materials and their removal

3.4.1. Upon reception of notice by i2istudy that any user in the system posted materials (hereinafter - User content) which are not legally accessible or infringe the rights of third parties, or if i2istudy for any reason wishes to remove User Content, i2istudy reserves the right for any reason to automatically remove such User Content immediately or when it sees fit.

3.4.2. Deleting User Content does not imply any admission of liability on the part of i2istudy in the breaching of any rights of third parties or from the forfeiting of any rights on the part of i2istudy, including the right to receive for damages incurred and the right to defend the interests of i2istudy, of which are expressly reserved to i2istudy.

3.4.3. The User acknowledges and agrees to the fact that i2istudy is not under any circumstances obliged to recover any deleted User Content.

3.4.4. If the User Content violates any variety of rights of others (including intellectual property rights), or if anyone is led to believe that the User Content is illegal, they may notify i2istudy about this via the feedback form. i2istudy reserves the right to verify the identity of circulating and claim additional information to verify the complaint. The User making the enquiry about the said issue assumes sole responsibility for the results of an application (including, but without the limitation to, removing or blocking User Content), and also takes note of and agrees that any complaint may be used in proceedings before the court. Providing false, misleading or inaccurate information may cause civil and criminal liability.

3.5. The User does not reserve the right to:

3.5.1. intercept, listen to, disrupt or interfere with any User in any way which is not intended for the exchange of information;

3.5.2. use any software code ("viruses", "Trojan horses", "worms", etc.) which are designed to distort, delete, imitate, damage or create a breach in the integrity of the operation of the Service and transmitted information;

3.5.3. distribute without the consent of the recipients of mass commercial oriented messages (also known as "spam”) which are prohibited by the relevant provisions of the law, or use the Service to carry out illegal acts, or impersonate yourself as another person;

3.5.4. send materials to other users, which is listed in detail in paragraph 3.3.3.;

3.5.5. use the Service in order to collect any private or identifying information, including data about other User accounts;

3.5.6. influence or attempt to influence the availability of services, in particular through attacks on the DOS (denial of service - Denial of Service) or DDoS (distributed denial of service - distributed denial of service);

3.5.7. use and launch any kind of automated systems, including but not limited to, "robots", "spiders", "off-line readers of the program", etc., in order to access the Service. The exceptions are reserved for the operators of public search engines using the following programs, "spiders” in order to copy materials from the Service for the purpose of creating public search index materials.

3.6. Quality

3.6.1. i2istudy cannot guarantee that the service will always work without errors, irregularities or delays. The quality of the information exchange and the use of the Service may be affected (including the cause of disruptions with in the information exchange) a variety of factors, including: the state of the local network, the presence a firewall, the characteristics of the internet service provider, the state of the public Internet connection, etc.

3.6.2. i2istudy is not responsible for any interruptions, disconnections or delays caused by a malfunction or the inadequacy of these components or other factors which i2istudy has no control over.

i2istudy tech support