robert potz  architects




contact                      
about
approach
projects
sketches
disclaimer
Disclaimer

Definitions
In these terms and conditions, the word ‘Site’ shall mean the Robert Potz Architects website.

Governing law
These terms and conditions of use, and your use of the Site, shall be governed by and construed in accordance with English law and the English Courts shall have exclusive jurisdiction in connection with all matters relating thereto.

Legal disclaimer
Robert Potz Architects seeks to ensure that all the material on this Site is accurate and up-to-date. Nonetheless, the content of the Site is provided without any warranty or responsibility. You should not make significant decisions based on the information provided on this Site without obtaining appropriate independent advice.

Liability
Robert Potz Architects – to the extent permissible by law – excludes all liability which may arise from your use of or reliance on the content of this Site or any linked website.

Links
This Site may have links to other websites. Robert Potz Architects is not responsible for the contents of, nor does it warrant the accuracy or reliability of any material appearing on, any linked website. A link on this Site to another website does not imply any kind of endorsement or recommendation of that website.

Copyright
The copyright in the contents of this Site is owned by Robert Potz Architects except where explicitly stated otherwise.
No material contained within this website may be reproduced, distributed, modified, transmitted, reused or adapted without the prior written permission of Robert Potz.

Data Protection
It is generally possible to use this Site without providing personal information. Insofar as any personal data (e.g. name, address or email address) is collected on this Site, this always takes place on a voluntary basis. These data will not be disclosed to third parties without your express consent. Please note that data transmission over the internet (e.g. communication by email) may have security vulnerabilities. Complete protection of data against unauthorised access by third parties is not possible.