Accessibility Tools

Terms & Conditions

These terms of service relate to the use of sites owned by Impero Web www.imperoweb.it www.imperoweb.com, Community Builder Italia www.communitybuilder.it,

Please Be Informed That in all Proprietary networks One registration is sufficient to access in all sites, but are separate access logins therefore one registration but multiple logins (this does not apply to Community Builder Italia being updated).

They are applied to both anonymous visitors,
Users obligate themselves to read them and accept their terms before registering, logging in to sites or doing any kind of online activity.

Empire Web, reserves the right at any time to change, unilaterally these terms and conditions. By also giving notice through the pages of the site to users.

Impero Web is a collaborative infrastructure.

The Impero Web Sites, may contain, forum areas, chat areas, discussion groups, online communities or other forms of communication that can be used to contact a large group of people, such as posting content in the various existing social networks inherent to registrations, access to forum sites and more, in particular by signing up and using Impero Web you agree to enter material consistent with and related to the purposes of the site.
Through the tools made available is prohibited:

- Defame and offend other users
- Publish obscene content with posts or images.
- Posting content, software, images or other material for which you do not own the intellectual property (or the rights to publish) and it is your obligation to verify that you have the rights that are posted through your responsibility.
- Enter files that contain viruses or are corrupted or may damage the systems of other users.
- Entering content that advertises or refers to specific commercial products
- Make downloads of content from the site and entered by other users without having asked prior permission 
- Falsifying or deleting content from other users
- Engaging in behavior that restricts other users from enjoying the content or part of the site.
- Use the site to collect information about other users
- Violate laws or regulations of the Italian state or international laws and regulations..

Impero Web does not assume any obligation in monitoring users' activities, however, it retains the right to remove without providing any justification whatsoever and at its total discretion any content that violates the above points and reserves the right to terminate any accounts to users without notice or justification.

1. Do not use disrespectful language, much less foul terms.
It's an obvious rule, but on the Internet, where there is no direct contact, it becomes even more heartfelt.
This does not detract from the fact that on the Web we can safely call each other "you" where, normally, we would use the third person. For Internet users, respect is a matter of substance, not form.


2. Don't flame.
The term (of Anglo-Telematic origin) means flame, and to flame is to inflame oneself, to push oneself into criticism in tones not appropriate for civil discussion. A fortiori, it is considered flame (in its worst species) to use insults.
In any telematic environment, debate must be marked by maximum balance and full respect for the interlocutors. In this sense, the Internet experience could be an excellent example for everyday relationship life.

3.  Don't write everything in capitals.
At one time, many self-taught typists liked to write everything in capital letters, perhaps to better highlight their thoughts. Despite the fact that the technology is quite different, the common keyboard determined the transition of this practice from actual typing to teletype.
In fact, however, capitalizing text in the second àmbit is absolutely not recommended: on the Internet it is equivalent to shouting and is understood that way by users. Even, many "purists" like to write everything in lower case.

4. Using "emoticons".
As in all forms of communication that do not involve direct eye contact (or even just vocal contact), one must be very careful not to use formulas and/or words with ambiguous meanings. And, in fact, if de visu one can always verify the compatibility between the objective sense of speech and the facial expressions or facial expressions of the interlocutor, with electronic correspondence (in all three forms seen) this is not possible.
We have telematics to thank if, today, there is one more tool for clarifying the meaning of written words (certainly not for formal correspondence, but on the Internet it is almost a must).
These are the so-called "emoticons," another neologism child of telematics and English composed of the terms emotional and icons, in perfect computer language.
Avoiding difficult translations (which could not go beyond the literal), emoticons are nothing more than simple sets of characters (colon, semicolon, hyphens, parentheses, etc.) that, in different combinations, draw stylized faces representing virtually all possible moods of the correspondent via the Internet.
Here are the three most popular examples, undoubtedly most clarifying (to be read by ideally rotating them 90° clockwise):

:-) joy
:-( sadness
;-) irony, winking (note the "wink" which in human mimicry really means winking).
Although you may think of them as a somewhat snobbish whim, emoticons are really essential. One example will suffice:
sentence without emoticons - "I visited your site and did not like it at all."
sentence with emoticons - "I visited your site and did not like it at all ;-)".
Only in the second case will our interlocutor understand that this is a joke and that, in fact, the site was liked.
This is why emoticons, far from being an adolescent form of expression, represent a cornerstone of telematic communication. In essence: a means of making oneself better and correctly understood. In part, also a way to prevent flame.

5. Respect the topic of discussion.
In mailing lists and NGs (newsgroups), relevance is a must. The virtual bulletin board represented by these means is spontaneously divided into various sectors. A subscriber launches a sub-topic (strictly stated in the subject-subject of the message) and interested parties participate in the discussion by developing it from the first post.
Obvious reasons advise not to go off-topic (off, from the English off, out, and topic, subject)(5), not to put one's post in a sector where interested parties would not find it and where, moreover, it might disturb those talking about something else.

6. Do not intervene immediately in the discussion.
A rule that applies to mailing lists as much as to NGs. No one, upon entering a living room that is hosting it for the first time, would immediately jump into discussions that are held among those who have been frequenting the living room for some time. Equal rule applies to telematics. The user who, for example, decides to start following the discussion on it.diritto, should download, for a while, all the messages, understand the subject of the discussion and observe the behavior of those who are already in the thick of it. Only in this way will he be able to enter the group by conforming to those unwritten rules that are peculiar to him. In jargon, such conduct is called lurking (from the English to lurk, to hide, to peek), which, Italianized, becomes "lurking."
Some groups and lists, moreover, provide an "FAQ" (acronym for Frequently Asked Questions) section, which, for example, will prevent newcomers from raising an issue that has already been extensively debated and resolved, something that could greatly annoy veterans.

7. Do not send unsolicited mail (a practice called spamming) a fortiori if it is advertising.
Just as no one would like to find, every morning, his or her mailbox filled with useless mail, the Internet user (especially the long-time one) does not like unwarranted email invasions. It should, moreover, be kept in mind that the Internet is a working tool for many. Hence the desirability of not unduly influencing these activities.
Violations of this rule (unfortunately very frequent) are considered among the most serious.

8. Do not send attachments to one's emails except with the prior consent (even tacit and generic) of the recipient.
The rule stems from the utmost attention paid to saving resources: an image, executable file or text document occupies a certain amount of space that if it were to be multiplied by all the emails circulating on the Net would compromise the stability of the telematics system. This is precisely why, among other things, many providers limit the flow available for the individual user's email service (e.g., 1 Mb maximum per email). In any case, if sending was really essential, it is always advisable to use a compressed format (e.g., zipper, jpeg for images).
In particular, sending attachments is inadvisable in mailing lists as this medium does not allow "targeted" sending, but affects all subscribers.
Different is the case with so-called "binary" newsgroups, which are based precisely on attachments (programs, images, etc.).
But sending attachments is also inadvisable for a much more important reason. File formats that support macros are potential carriers of, precisely, "macro viruses." It is therefore a good rule not only not to send, but also not to open such attachments.(6) The rule applies, a fortiori, to executable attachments, traditional vehicles of viruses.

9.  Do not send or forward chain letters.
Unfortunately, e-mail also suffers from this practice (chain letters) that already plagues regular mail. It is good not to invent chains or promote them. They are not at all liked by the majority of users. The most dangerous, then, are those that promise quick and easy gains.
There is only one exception for which it might be worthwhile to contribute to the spread of the chain: the charitable-social case (e.g., "moral" subscriptions to a certain cause, help to people in need, missing person announcements, etc.).
In such cases, it is always advisable to verify that the chain refers to facts or people who really exist and, in any case, to continue sending to correspondents who are sensitive to the topic.

10. Do not use accent characters, however, not strictly ASCII.

On the Internet, it is essential to be clearly understood, and to achieve this, it may be advisable to avoid certain special characters.

Sometimes, you may receive partially incomprehensible messages, and this is not necessarily due to language issues. In particular, you might receive messages with endings represented by one or more nonsensical characters. You’ll discover that this substitution occurs precisely where accented letters should be.

The reason is straightforward. Each linguistically homogeneous geographical area is assigned a specific “character set,” which includes a common core (ASCII) and an extension typical of those languages. The character set designated for Italy certainly includes accented letters, but this is not the case for all countries.

The character set cannot be infinitely large. Hence, it strictly includes specific characters used in that region. To understand this better, consider that there are keyboards for different languages (even for different countries). Apart from basic characters and numbers, each keyboard has its variations.

It’s worth noting that this issue can also arise on certain mailing lists. Even though the subscribers undoubtedly possess the same character set, these lists are managed by servers located abroad. Consequently, they may not always handle characters not expected for the geographical area to which the list pertains.

To overcome this limitation (which seems limited to accents rather than other special characters), one can resort to using the apostrophe, as was done in the past on certain typewriters.

11. In electronic correspondence, use the “plain text” mode. Recent clients (e.g., MS Outlook Express, Netscape Messenger 4.x, and Qualcomm Eudora Pro 4.x) also support HTML format, which is used for the “design” of web pages. This allows you to send an email with the imaginable graphic effects typical of the web. However, this feature is not without drawbacks.

Compatibility with all email software is not guaranteed. Users with clients that do not support this function (perhaps because they are not using the latest version) will see messages that are almost entirely incomprehensible. Additionally, an HTML email is undoubtedly bulkier (in terms of file size) compared to one composed in plain text. Essentially, using this format often results in unnecessary resource waste.

However, there is a remedy for the most pressing need: highlighting specific words or passages in the message. It is customary to use asterisks (*) or the underscore character (_) for this purpose. For example, you can emphasize the words diritto and Internet as demonstrated above.

12.   Essere sintetici.

Be concise. A final rule. Conciseness in traditional correspondence would also help save paper, and consequently, trees. However, the issue of resource economy is more pronounced on the internet. Writing a succinct message means occupying the minimum essential space on global communication channels and individual servers. The telematic ideology is based on the full sharing of resources, which should be accessible to all without abuse by a few.

A related aspect to conciseness is the so-called “quoting” and the signature placed at the end of messages (sometimes inaccurately referred to as “electronic signature”). The “quoting” (derived from the English verb “to quote”) involves citing the message to which you are responding. This practice aids in understanding the topic being discussed.

It’s a valuable option available in virtually all email clients and is automatically activated when replying to the original author (using functions like “reply” or “reply to author”). The reply email will contain, at the very least, the text being responded to, marked with the usual angle brackets (>). The email remains editable as usual.

The same feature is available for forwarding messages. However, for obvious privacy reasons, it’s essential to avoid quoting and forwarding excerpts from third-party messages. To do so, you’ll need to obtain the original author’s consent.

In general, a good rule is to limit quoting to the essential minimum, omitting passages that don’t require a response. This approach benefits both the message size and, undoubtedly, its readability.

As for the signature (which can be typed each time or inserted using a predefined template invoked with a single command), it’s a less common option. While undoubtedly useful, it can also lead to misuse. A signature consisting of four or five lines is sufficient to encapsulate all necessary information, even for work-related purposes.

 

The same feature is available for forwarding messages. However, for obvious privacy reasons, it’s essential to avoid quoting and forwarding excerpts from third-party messages. To do so, you’ll need to obtain the original author’s consent.

In general, a good rule is to limit quoting to the essential minimum, omitting passages that don’t require a response. This approach benefits both the message size and, undoubtedly, its readability.

The signature (which can be typed each time or inserted using a predefined template invoked with a single command) is a less common option. While undoubtedly useful, it can also lead to misuse. A signature consisting of four or five lines is sufficient to encapsulate all necessary information, even for work-related purposes. Going beyond that might annoy many users.

Taking Knowledge of Privacy