Your browser is probably outdated and may display information incorrectly.
Welcome to our website!A-AA+
Welcome to the page of the social network "Relatives"
Our friends and partners:
The 'Relatives' site was created to run a family archive on the basis of a family tree. The peculiarity of our site can be attributed the possibility of combining tree trees with the consent of the participants and the possibility of continuing to work with the family archive descendants.
It may happen that you have already been included in the database by your relatives. In this case, you have not set a password and for the first login you will need to specify the data of the parents. After a successful login, you can edit your data, including the password for the next login.
Using the site for free. Security is provided by using a secure connection, which you can verify by checking the presence of 'https:' in the address bar of the browser.
If you do not want to keep your archive on the Internet, then you can use our program with similar capabilities for a personal computer with the Windows operating system. You can download it at: www.naslediya.ru
The full text of the agreement can be found by clicking on the link: Agreement
The main points of this agreement are as follows:
You enter data only about yourself and your relatives. You start with yourself, and then add ancestors and descendants.
Names and surnames are entered as they were at birth . The first letter is uppercase, and the rest are lowercase. Date of birth can be indicated by an interval if you do not know the exact date.
You agree to keep your email address current to contact you.
By law, we are the operator of personal data and, in order to avoid complaints from the authorities, it is required that you recognize your own and other data that you have entered are publicly available . This will mean that the list of measures for the protection of personal data is determined by the operator, that is, by us. It should be noted here that we are genuinely interested in protecting the data of our users and will gratefully accept the comments and recommendations of specialists in enhancing information security.