Join us! Click the links, see the pictures, communicate with the teams and listen to the music. This site is optimized for a large screen and good speakers to enjoy most.
|
We cover the interesting sites, Click! |
© 1997 - 2018 ms marketing hellas Webhosting & Design. All rights reserved. All suggestions
and comments referring to this webpage please to [email protected] For detailed information about data protection, please click here!
Privacy Policy, Data Protection:
The use of our website is usually possible without providing personal information. The collection of any personal data (such as name, address or e-mail address, etc.), is done on a voluntary basis.
BY USING OUR WEBSITE YOU AGREE EXPLICITLY THAT WE MAY COLLECT YOUR PERSONAL DATE AS DESCRIBED.
These data will not be given to third parties, except third parties who are involved in the process of keeping this website open and stable.
Visitors of this site have the right to view their collected personal data on email request. The email address has to be the same as the one by which they made their information or contact request. They have the right to have erroneous data be corrected. They can also request to have their personal data blocked or - if legally possible - deleted the same way. Please allow 30 days for deleting, because we have to check the processing of your data first, i.e. information answers, complaints. You will be informed about the final deletion of your data by email.
After the deletion of your data we won't be able anymore to answer personal service questions.
You can configure your browser to inform you about the use of cookies so that you can decide on a case-by-case basis whether to accept or reject a cookie. Alternatively, your browser can be configured to automatically accept cookies under certain conditions or to always reject them, or to automatically delete cookies when closing your browser. Disabling cookies may limit the functionality of this website.
We point out that data transmission over the Internet (e.g communication by e-mail) security vulnerabilities. A complete protection of data against unauthorized access by third parties is not possible.