Please note as recipient of this email:
This e-mail is intended solely for the addressee. If you are not the addressee please do not read, print, re-transmit, store or act in reliance on it or any attachments. Instead, please email it back to the sender and then immediately permanently delete it.
Unless otherwise expressly agreed by the sender of this email, this communication may contain confidential information and may also in certain circumstances be subject to applicable legal privilege. This information may not be used or disclosed except for the purpose for which it has been sent.
Contracts may only be concluded on behalf of iceConnect by iceConnect’s authorised signatories and not by email communication. No employee or agent of iceConnect is authorised to conclude any binding agreement on behalf of iceConnect with another party by email without the express written confirmation of an authorised signatory.
Any views expressed by the sender of this email are not necessarily those of iceConnect. iceConnect employees are expressly requested, amongst other things, not to make any defamatory, threatening or obscene statements and not to infringe any legal right (including any infringement of copyright) by email communication. Any such communication is contrary to iceConnect’s acceptable use policy and outside the scope of the employment of the individual concerned. iceConnect will not accept any liability in respect of such a communication, and the employee responsible will be personally liable for any damages or other liabilities arising.
Computer viruses can be transmitted by email and you should be aware that emails may be intercepted by third parties. Any attachments to this email will be received as separate, the subject line of which will be the file name. You are advised to check this email and any attachments for the presence of viruses as neither iceConnect nor the sender accept responsibility for any viruses transmitted by this email and/or any attachments.
iceConnect does not generally engage in systematic monitoring activities although it reserves the right to do so where there is reason to believe that misuse of its computing facilities is occurring.