Acceptable Use Policy

Stealth's Acceptable Use Policy (the "Policy") for Stealth Products and Services is designed to help protect Stealth, Stealth's Customers and the Internet community in general from irresponsible or, in some cases, illegal activities. The Policy is a non-exclusive list of the actions prohibited by Stealth. Stealth reserves the right to modify the Policy at any time, effective upon posting at

Illegal use
Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

System and network security
Violations of system or network security are prohibited, and may result in criminal and civil liability. Stealth will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:

Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.

Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.

Interference with service to any user, host or network including, without limitation, e-mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks (collectively referred to as "denial-of-service attacks").

Forging of any TCP-IP packet header or any part of the header information in applications such as email or a newsgroup posting.

E-Mail Use
Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material ("e-mail spam"). This includes, but is not limited to, bulk-mailing of commercial advertising, informational announcements, and political tracts. It also includes posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting). Stealth services may not be used to solicit customers from, or collect replies to, messages sent from another Internet Service Provider where those messages violate this Policy or that of the other provider.

Customer's Responsibilities
Each Stealth customer is responsible for the activities of its customer base/representatives or end-users and, by accepting service from Stealth, is agreeing to ensure that its customers/representatives or end-users abide by this Policy. Customer who run their own mail server must maintain a mailbox and read e-mail to postmaster@( Complaints about customers/representatives or end-users of a Stealth Customer will be forwarded to the Stealth Customer's postmaster e-mail account for action.

During an investigation or violation, Stealth may block access at the router/switch level to involved customer's equipment. If Stealth believes, in its sole discretion, that a violation of this AUP has occurred, it may take the responsive action. Such action may include, but is not limited to, temporary or permanent blocking of access to customer's equipment, and the suspension or termination of the Customer's service.

Report Policy violations to

Stealth's Acceptable Use Policy - Version 04060101

Copyright 1995-2015 Stealth Communications®. All Rights Reserved. Suggestions or Comments? Help us improve: Feedback Form or e-mail: