Terms and conditions @ ‘Coloured Seeds’ coworking space

The services that coworking provides are subject to the following Terms and Conditions and the right to update them is reserved at any time. Colored Seeds will contact you to inform you of the updates within 30 days of their promulgation.
The application to join the coworking does not create a real estate lease or other ownership interest in your favor with respect to the premises, services and resources. It does allow you to use in a limited way, the equipment and services offered in each of the rates. The set of premises, services and resources remains in possession and control of the coworking at all times. The signing of this Contract cancels all the previous ones, as well as verbal or other agreements that may exist, also cancels any previous regulation on the matter that is detailed in terms of services, coverage, rights and conditions.
In accordance with article 1,279 of the Civil Code and at the request of any of the contracting parties, this document may be notarized before a Notary Public, in which case the expenses will be borne by the applicant.

Service’s description

Colored Seeds provides you with access to office space, workstations, Internet access, office equipment, meeting room, training room, kitchen office and other services that Coworking can offer from time to time or permanently. Access to the Coworking teams is subject to their availability.
The services and equipment at all times are subject to the Terms of Service (CdS – term of use number 6).

Illegal or prohibited use

As a condition of using our services, you agree to use them for absolutely legitimate purposes and for no illegal or prohibited purpose by terms and conditions or notices.
You may not use the Services in a way that could damage, disable, overload, or impair any Coworking server or its data network.
You may not attempt to gain unauthorized access to any service, accounts, computer systems or networks connected to any Coworking server or any of the Services, through hacking, password extraction or any other means.
Coworking cannot guarantee that a certain degree of availability will be reached in relation to the use of the Movistar network.
By signing this Agreement, you represent and guarantee that your participation in or use of the services does not conflict with or as a result of any breach of license, contract, agreement or other instrument or obligation that you have contracted. You represent and warrant that you have the capacity, legitimacy and authority necessary to comply with these terms and conditions of use without the need for authorization or approval.

The use of services
You agree that by participating in or using the Services, you will not:

Give your access codes to someone else. Failure to comply with this condition entails the immediate termination of this contract.
Use the Services in connection with contests, pyramid schemes, chain letters, junk mail, spam or any duplicate or unsolicited message (commercial or not)
Publish, advertise, upload, distribute or disseminate any matter, material or information whose content violates the rights recognized in Spanish Laws and International Treaties signed by Spain, or promote actions contrary to the Law.
Upload or make available to others, files containing images, photographs, software or other material protected by Intellectual Property Laws, including, by way of example, and not by way of limitation, the Laws of Copyright or Trademark (or by rights of privacy or publicity) unless you own or control the respective rights, or have received the necessary consent to do so.
Use any material or information, including images or photographs, obtained through the Coworking Services that infringes the copyright in national or international law in terms of Intellectual Property Law, trademark, patent, trade secret, or any other property rights of third parties.
Upload files that contain viruses, Trojan horses, worms, time bombs, corrupted files, or any other malware that may damage the operation of equipment or property of another. The development, distribution, alteration and / or manipulation of software, hardware or a combination of both, aimed at breaking the security of computer systems, whatever its name or technique used, whether known or not, which may become techniques of hacking that result in an impersonation, control, violation or intrusion into a computer system owned by others.
D