Acceptable Use Policy

This Acceptable Use Policy describes materials and activities that are allowed and not allowed in the Services.

Active from: July 12, 2024

We are Centoba, owned and operated under the legal name R. STRØMSNES. Our business address is Fyllingvegen 116B, 6030 Langevåg, Møre og Romsdal, NORWAY, and our organization number is NO918881603MVA.

If you wish to contact us, please send an email to post@centoba.com and present your request.

This is our Acceptable Use Policy (“AUP”) which describes how and what activities are permitted and not permitted for our Services. This agreement is not particularly comprehensive, and we reserve the right to take actions not specifically described in this agreement.

Your purchase, access to or use of our services confirms your acceptance of the applicable terms.

Illegal use

You may not use, facilitate or allow others to use our Services for any of the following illegal or abusive purposes.

Promote or encourage unlawful conduct or activities, including the dissemination of content that is unlawful under any applicable law or any judicial, regulatory or other governmental order or request.

Any use that is deceptive or harmful to others, or that may damage our business or reputation, including offering or distributing fraudulent goods, services, schemes or promotions (e.g., quick money schemes, Ponzi and pyramid schemes, phishing or pharming), deceptively impersonating another person or entity, or engaging in other fraudulent or misleading acts.

Publishing content that threatens or incites violence, promotes terrorism, harasses, invades privacy or creates risks to health and safety. Content that encourages harm based on race, ethnicity, religion, gender, sexual orientation, disability or immigration status is also prohibited. Harassment can be both active, such as unwanted messages, and passive, such as defamatory information online.

Posting or transmitting content that is likely to cause major disruption and reaction from the internet community as a whole. This may include, but is not limited to, material that is considered obscene, offensive or highly controversial.

Illegal sale or distribution of controlled substances, including, but not limited to, illegal or prescription drugs.

Posting or transmitting fraudulent information on or through our Services. This may include false advertising, identity theft, misrepresentation of any kind including phishing, forged email headers, fictitious, automatically generated or randomly created email addresses.

Posting or hosting illegal adult content, such as child pornography, content related to bestiality, or depictions of nudity or sexual activity that are obtained or distributed without the consent of those depicted (e.g. “revenge porn”). This may include, but is not limited to, material that is considered pornographic content and images.

Publishing or storing content related to weapons and firearms. This includes, but is not limited to, the sale of parts/components/kits for weapons and firearms, 3D printed parts, demonstration videos and the sale of ammunition.

Infringement, misuse or violation of intellectual property rights or proprietary rights of third parties, including but not limited to copyrights, patents, trademarks, trade secrets, privacy or right of publicity. This also includes publishing content for the purpose of assisting others to unlawfully circumvent technical protection measures for such rights.

Continuing, redistributing or reconfiguring our services to allow others to use them in an unlawful, fraudulent or inappropriate manner. The interpretation of this clause will be at our sole discretion.

Security breaches

You may not use our Services to violate the security or integrity of any user, network, computer or communications system, software, application, device or network (collectively, “Systems”).

Prohibited activities include:

  • Malicious Software: The posting or storing of content, software or other technology that may damage, disrupt, secretly intercept, or expropriate any computer system, program or data, including viruses, malware, spyware, adware, Trojan horses, worms or time bombs.
  • Unauthorized Access: Gaining access to or using a system without permission, including attempting to probe, scan, or test a system’s vulnerability or to breach any security or authentication mechanisms used by a system
  • Eavesdropping: The monitoring of data or traffic on any system or network without permission
  • False origination: The use of false or misleading TCP/IP packet banners, email headers, or any part of a message that describes its origin or route
  • Disruption/hacking: Attempting to interfere with or attack a system provided by us or a third party. This includes any deliberate attempt to prevent another user from taking advantage of services offered on the internet. It also includes attempts to gain access to hardware and services without the provider’s consent

You undertake to implement the necessary security protocols and measures against hacking, spam, worms, malware, trojans, denial of service attacks (DDoS), identity theft, unauthorized intrusions and other security-related risks that may affect your systems using our Services. You undertake to keep your security protocols up to date with the latest signatures, versions and definitions.

You agree that if you discover or are informed of a potential security risk or threat to any of your systems or websites using our Services, you will immediately (1) assess, minimize and limit the scope of the security incident, (2) remove any unauthorized data or content related to the incident, and (3) restore your systems to a known secure state and monitor them to confirm that the threat does not return.

Furthermore, you agree to comply with the measures and all rules, regulations and laws applicable to you, including, but not limited to, sending security incident notifications and messages to the affected users of your system and stakeholders, including us at Centoba.

Some of the systems we make available to you through our Services may be from a partner or third-party provider, such as a cloud provider. Please read any agreements with third party providers as they may be relevant to you. You agree to abide by the terms of such agreements to the extent they apply to your use of their services and/or our services.

Network abuse

You are not allowed to create network connections to any users, hosts or networks unless you have permission to communicate with them.

Prohibited activities include:

  • Monitoring or crawling: Monitoring or crawling of a system that impairs or disrupts the system being monitored or crawled, or any other collection or scraping of content from the Services
  • Fraud-related actions: Knowingly, intentionally or recklessly introducing viruses or other contaminating code into a Service, or collecting, transmitting or using information, including email addresses, usernames or other identifiers, through deception or covert methods (such as phishing, internet fraud, password theft, spidering and harvesting)
  • Deliberate disruption: Disrupting the proper functioning of a system, including any deliberate attempt to overload a system using email bombing, news bombing, attacks on broadcasts, flooding techniques, or executing a denial of service (“DoS”) attack
  • Operation of certain network services: Operation of open proxies, open email relays, open recursive DNS servers, Tor nodes or other similar network services.
  • Avoiding system restrictions: Using manual or electronic methods to circumvent usage restrictions placed on a system, such as access restrictions and storage restrictions
  • Retaliation against us: Any action that is likely to result in retaliation against us, including our services or our employees, officers or other representatives
  • Concealment of identity: Any activity intended to conceal or actively concealing identity or contact information, including the omission, deletion, falsification or misrepresentation of transmission or identification information, such as return addresses and IP addresses
  • Mining of Cryptocurrency: The mining of cryptocurrency, including but not limited to Bitcoin or similar currencies, without express written permission

Spam and other misuse of messages

You shall not use our Services to collect responses to messages sent by another service provider if those messages violate this Acceptable Use Policy (“AUP”) or the provider’s terms.

You may not use our services to take any action that directly or indirectly causes any of our IP addresses to be listed in a database or registry for misuse.

You shall take reasonable steps to secure your devices and networks that use our Services from being used in violation of applicable laws against spam and unsolicited messages, including by installing anti-virus, firewall, operating system and application updates where appropriate.

Our Services may allow you to manually connect to other third-party email messaging and marketing providers. If you use a third-party email provider in conjunction with our Services, you agree to comply with the requirements imposed by laws and regulations applicable to email where you are located, including but not limited to:

  • Do not publish or send unwanted material through any active channels
  • Obtaining recipients’ consent to receive emails via an active action, such as an “opt-in” procedure, respecting the withdrawal of consent and notifying recipients of this possibility
  • Have a privacy policy or similar information available for each domain related to the mailing
  • Have mechanisms or a method for collecting and handling complaints, for example by posting an email address visible on your website

Consequence of breach

If we determine, in our sole discretion, that you have violated this Acceptable Use Policy (“AUP”), we may remove, disable access to, or modify any content or resource, and/or suspend or terminate your use of our Services, at any time. We may also intercept or block any content or traffic belonging to you or users where a Service is being used illegally or in violation of the Agreement.

Our right to suspend or terminate your use of our Services applies even if the breach is committed unintentionally or without your authorization. This right does not obligate us to act at all times or towards any particular user, and we may exercise this right at any time in our sole discretion.

We reserve the right to seek damages or seek all remedies available at law and in equity against users who misuse, attack or hack our systems, servers or services – or who use our services in a manner inconsistent with the law and our terms and conditions.

Reporting of breaches

To report any violations or for more information about this or any of our agreements, you can easily contact us. Please provide as complete and accurate information as possible. Our services offer a dynamic environment where customers start and end many services in a short period of time.

This means that customers may use the same server or service at different times on the same day. Therefore, it is crucial that you identify the IP addresses, date, exact time and time zone in order for us to correctly identify which resource or service has been reported.

We may ask for your help to stop or correct any violations. We may also choose not to process or respond to spam or reports containing offensive or vulgar language. Threats of harm against us, our staff or third parties will be reported to the police.

Changes and revisions

Our services are constantly changing and therefore our policy may also change from time to time. We reserve the right, at our sole discretion, to add and/or remove portions of this policy at any time. To stay up to date with the latest changes, we recommend that you read our legal pages regularly.