Welcome to the website www.cistocarijeka.hr owned and operated by the Utility Company Čistoća Ltd Rijeka. By accessing and using the Website, you fully accept and agree to abide by these Terms of Use at all times. This means that you are familiar with all the terms of use of the website, as well as the risks that may arise. Users are required to review these Terms of Use on regular basis, as they may be modified or revised at any time without any notice.

The Website mostly consists of proprietary content, while the rest are links to other sites. By viewing and browsing the content, users undertake to use it for personal use only and not to distribute or use the content for commercial purposes without the website Owner’s express permission. The website Owner claims copyright to all textual and visual content, databases and developer code. Any unauthorized use is considered a copyright infringement and may give rise to lawsuits. Without the permission of UC Čistoća Ltd Rijeka, it is strictly prohibited to reproduce, distribute or transmit in any way the website content on other portals, electronic or print media. If the user believes that the website has caused a copyright infringement, they are obliged to inform KD Čistoća, which will withdraw the disputed content if the request is justified. Your use of any content on this website is entirely at your own risk and the portal shall not be held liable for any damage caused therein.

Content administration strives to ensure that all published data is accurate and complete, but given the speed and short deadlines in which information is posted, errors may occur. For this reason, we emphasize that all published data is for informational purposes only, and we recommend additional verification with other relevant sources of information for any other purposes.

In an effort to continuously improve the site, the administration of the website collects data on downloaded content, time of visit, method of access, data related to IP addresses and most visited content, without invading the privacy of users which is subject to maximum protection.

Any unauthorized attempts to change the data in the system, ignore the security settings or bypass them, or use the system contrary to its intended purpose, is strictly prohibited.

You can read more on privacy policy here.