@font-face {
  font-family: 'legal';
  src: url('../font/legal.eot?68835719');
  src: url('../font/legal.eot?68835719#iefix') format('embedded-opentype'),
       url('../font/legal.woff2?68835719') format('woff2'),
       url('../font/legal.woff?68835719') format('woff'),
       url('../font/legal.ttf?68835719') format('truetype'),
       url('../font/legal.svg?68835719#legal') format('svg');
  font-weight: normal;
  font-style: normal;
}
/* Chrome hack: SVG is rendered more smooth in Windozze. 100% magic, uncomment if you need it. */
/* Note, that will break hinting! In other OS-es font will be not as sharp as it could be */
/*
@media screen and (-webkit-min-device-pixel-ratio:0) {
  @font-face {
    font-family: 'legal';
    src: url('../font/legal.svg?68835719#legal') format('svg');
  }
}
*/
[class^="icon-"]:before, [class*=" icon-"]:before {
  font-family: "legal";
  font-style: normal;
  font-weight: normal;
  speak: never;

  display: inline-block;
  text-decoration: inherit;
  width: 1em;
  
  text-align: center;
  /* opacity: .8; */

  /* For safety - reset parent styles, that can break glyph codes*/
  font-variant: normal;
  text-transform: none;

  /* fix buttons height, for twitter bootstrap */
  line-height: 1em;

  /* Animation center compensation - margins should be symmetric */
  /* remove if not needed */
  

  /* you can be more comfortable with increased icons size */
  /* font-size: 120%; */

  /* Font smoothing. That was taken from TWBS */
  -webkit-font-smoothing: antialiased;
  -moz-osx-font-smoothing: grayscale;

  /* Uncomment for 3D effect */
  /* text-shadow: 1px 1px 1px rgba(127, 127, 127, 0.3); */
}

.icon-001-balance:before { content: '\f101'; } /* '' */
.icon-002-auction:before { content: '\f102'; } /* '' */
.icon-003-balance-1:before { content: '\f103'; } /* '' */
.icon-004-gavel:before { content: '\f104'; } /* '' */
.icon-005-agreement:before { content: '\f105'; } /* '' */
.icon-006-legal-document:before { content: '\f106'; } /* '' */
.icon-007-compliant:before { content: '\f107'; } /* '' */
.icon-008-legal-paper:before { content: '\f108'; } /* '' */
.icon-009-compliant-1:before { content: '\f109'; } /* '' */
.icon-010-rubber-stamp:before { content: '\f10a'; } /* '' */
.icon-011-legal:before { content: '\f10b'; } /* '' */
.icon-012-management-service:before { content: '\f10c'; } /* '' */
.icon-013-certificate:before { content: '\f10d'; } /* '' */
.icon-014-legal-advice:before { content: '\f10e'; } /* '' */
.icon-015-real-estate:before { content: '\f10f'; } /* '' */
.icon-016-requirements:before { content: '\f110'; } /* '' */
.icon-017-stamp:before { content: '\f111'; } /* '' */
.icon-018-legal-advice-1:before { content: '\f112'; } /* '' */
.icon-019-law:before { content: '\f113'; } /* '' */
.icon-020-business-ethics:before { content: '\f114'; } /* '' */
.icon-022-lawyer:before { content: '\f115'; } /* '' */
.icon-023-justice-scale:before { content: '\f116'; } /* '' */
.icon-024-padlock:before { content: '\f117'; } /* '' */
.icon-025-cyber-security:before { content: '\f118'; } /* '' */
.icon-026-cyber-security-1:before { content: '\f119'; } /* '' */
.icon-027-cyber-security-2:before { content: '\f11a'; } /* '' */
.icon-028-hacker:before { content: '\f11b'; } /* '' */
.icon-029-cyber-security-3:before { content: '\f11c'; } /* '' */
.icon-030-cyber-security-4:before { content: '\f11d'; } /* '' */
.icon-031-cyber-security-5:before { content: '\f11e'; } /* '' */
.icon-032-spyware:before { content: '\f11f'; } /* '' */
.icon-033-cyber-security-6:before { content: '\f120'; } /* '' */
.icon-034-hacker-1:before { content: '\f121'; } /* '' */
.icon-035-cyber-attack:before { content: '\f122'; } /* '' */
.icon-036-malware:before { content: '\f123'; } /* '' */
.icon-037-cyber-attack-1:before { content: '\f124'; } /* '' */
.icon-038-shield:before { content: '\f125'; } /* '' */
.icon-039-cyber-attack-2:before { content: '\f126'; } /* '' */
.icon-040-cyber-security-7:before { content: '\f127'; } /* '' */
.icon-041-hacker-2:before { content: '\f128'; } /* '' */
.icon-042-cyber-attack-3:before { content: '\f129'; } /* '' */
.icon-043-cyber-security-8:before { content: '\f12a'; } /* '' */
.icon-044-cyber-security-9:before { content: '\f12b'; } /* '' */
