Who we are

Our website address is: https://kerauno.eu.


Kerauno Acceptable Use Policy

This Acceptable Use Policy applies to all individuals and entities (collectively referred to as “customers”) using or accessing Kerauno’s products, services, network, portals, servers, websites, and applications, including internet service (“Platform”). The policy is designed to protect the security, integrity, reliability, and privacy of both the Platform Kerauno offers to its customers. Kerauno reserves the right to modify this policy at any time, effective immediately upon posting of the modification. Your access or use of Kerauno’s Platform constitutes your acceptance of the Acceptable Use Policy in effect at the time of your access or use. You are solely responsible for any and all acts and omissions that occur during or relating to your use of the Platform, and you agree not to engage in any unacceptable use of the Platform.

What Uses Are Prohibited?

Unacceptable use includes, but is not limited to, any of the following:

  1. Violations of Laws and Regulations:
    • Posting, transmission, re-transmission, or storing material on or through the Platform if, in the sole judgment of Kerauno, such posting, transmission, re-transmission, or storage is:
      • In violation of any local, state, federal, or non-United States law or regulation (including rights protected by copyright, trade secret, patent, or other intellectual property or similar laws or regulations).
      • Threatening or abusive.
      • Obscene.
      • Indecent.
      • Defamatory.
    • Each customer shall be responsible for determining what laws or regulations are applicable to their use of the products and services.
  2. Software Licensing:
    • Installation or distribution of “pirated” or other software products that are not appropriately licensed for use by the customer.
  3. Resale Without Consent:
    • Resale of Kerauno’s products and services without the express prior written consent of Kerauno (unless you are an authorized wholesaler or partner).
  4. Deceptive Marketing Practices.
  5. Network Disruptions:
    • Actions that restrict or inhibit anyone – whether a customer of Kerauno or otherwise – in their use or enjoyment of Kerauno’s Platform.
    • Generating excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
  6. Malicious Programs:
    • Introduction of malicious programs into any aspect of Kerauno Platform (e.g., viruses, trojan horses, and worms).
  7. Security Breaches:
    • Causing or attempting to cause security breaches or disruptions of Internet communications.
    • Examples of security breaches include accessing data of which the customer is not an intended recipient or logging into a server or account that the customer is not expressly authorized to access.
  8. Unauthorized Monitoring:
    • Executing any form of network monitoring that intercepts data not intended for the customer.
    • Circumventing user authentication or security of any host, network, or account.
    • Interfering with or denying service to any user other than the customer’s host (e.g., denial of service attack).
  • Email: Connect with us at pavlos@kerauno.eu
  • Social Media: Find us on Facebook, Instagram, LinkedIn, Down below.