Terms & Conditions

Terms and Conditions of Use

Next, it presents to you the terms and conditions under which Zoonna.com allows you to access the Site. By using the Site, you acknowledge and agree to be bound by these Terms and Conditions. Please read this page carefully and attentively. If you do not agree to the terms and conditions, please do not use the site. The following expressions (you and the user) are used to refer to all individuals and/or companies that access the Website for any purpose.


By posting any content in any public or non-public section of the Site, be it forums, contests and chat rooms, you grant the Site and its affiliates the full and exclusive right to use, reproduce, modify, adapt, publish, translate, produce derivative works from, and distribute them. To the public and display all or part of the content internationally and/or join it to other works in any way, whether in the media or in using a technological means known now or another developed in the future for the full term of any of the right contained in that content. You warrant that the person who owns any rights, including moral rights in content, fully and effectively waive them. You will permit any other Subscriber to access, display, store and reproduce any Content for their own use. The reservation by the owner of the content posted on the site is subject to all rights in that content.

Site Security Rules

Users are prohibited from violating or attempting to breach the security of this website, which includes, but is not limited to:

Accessing information that is not intended for a user or accessing a server or account that the user is not authorized to access
Attempting to detect, scan or test a system or network vulnerability or to breach the security system verification standards without proper authorization
Attempting to interfere with the service of any user by sending unwanted mail or mine the site with viruses and other methods
Send unsolicited emails containing advertisements for some products and to promote them
Falsification of any TCP/IP protocol or any part of the information in an email

Violations of the system or the security system of the network may lead to civil criminalization of the perpetrator. The site will verify such violations in cooperation with the relevant authorities and security agencies in prosecuting users who have committed such acts.

Prohibited uses in particular

The site is used only for legitimate purposes by users who are looking for reading opportunities, capacity building, job opportunities or career information to help them in their lives and owners of granting institutions, opportunity providers, companies and associations who are looking for applicants for their opportunities. You warrant and agree that you will not use the Website (or plan, induce or assist others to use it) for any purpose or in any manner prohibited by these Terms, the restrictions, notices or applicable laws. The Website in particular prohibits any use of the Website and Users must agree not to use the Website for any of these purposes:

Post any incomplete, false or inaccurate information about themselves in their resume or about yourself.
Impersonate any person or organization, whether as a representative of a company, forum leader, guide or host, or falsely defame a person or entity you work with or another.
Post or broadcast any content that you do not have the right to republish, display or broadcast under any law or under contractual or trust relationships (such as undisclosed contracts).
Post any franchises, pyramid schemes, club memberships or any agreement with a salesperson agency or any business opportunity that requires payment in advance or on a periodic basis and that in turn requires the employment of other employees, sub-distributors or sub-agents.
Posting or transmitting any advertising, promotional materials, e-mails or any other unsolicited material or any non-autobiographical information such as opinions, notices and other materials.
Delete or review any material posted by any other company or person.
Use any tool or program to interfere or attempt to interfere with the operation of the Site or any activity conducted on this Site.
Taking any action that puts the infrastructure of the site to an unnecessary load leads to a great stress on it.
Your sharing of a password that enables you to access non-public areas of the site with a third party or your use of this password for an illegal offer.
Using any engine, program or any other means (including spiders, browsers and other means) to browse or search the Site other than the search engines and searches saved by the Site in addition to internet browsers provided by third parties such as Google Chrome, Microsoft Internet Explorer.
Attempt to decrypt, disassemble, disassemble or reassemble any of the software that makes up the Site or part of it.
Broadcast, post, or distribute any content that is unlawful, harmful, abusive, obscene, morally reprehensible, or otherwise offensive to another person or entity.
Publishing or broadcasting any harmful content that contains malicious programs such as viruses and others that aim to harm or interfere, receive any system or information in a fraudulent manner or take over its ownership.
Delete any author references, legal notices, or ownership assignments that you include in communications.
Using the communications provided by the site in a manner that affects the availability of its resources or negatively affects its users. Such as (using capital letters which gives the meaning of shouting out loud or sending a text repeatedly).
Attach, publish or transmit any content or use the Site in the manner of any patent, trademark or other proprietary right or trade secret owned by any party or infringing the personal rights of any other party.
Responding to any educational or business opportunity advertised on the site for any purpose other than applying for the opportunity and inciting communications against other parties, whether from other business owners or competitors, are prohibited.
Printing or copying any personal information that can be identifiable about users, or about the nature of the work of institutions and companies, in addition to e-mails, unsolicited phone calls and sending them to the other