Client Panel Login

Client Panel

Acceptable Use Policy

Acceptable Use Policy

This Acceptable Use Policy is designed to protect AlphaElite LLP, our customers and the public from any improper, abusive or illegal activities. It also serves to establish a clear understanding of the regulations and restrictions regarding the use of our services. Customers acknowledge that they are responsible for the activities of their customer base and end-users and agree to ensure that they abide by this policy. Any access or usage of our network or services constitutes acceptance and agreement to this policy. We are not obligated but reserve the right to monitor content, bandwidth and usage to identify violations of this policy. In cases where we believe or find that this policy has been violated, responsive actions will be taken without warning as deem appropriate in our sole discretion including but not limited to immediate suspension or termination of services and temporary or permanent removal of content or data. We expressly disclaim any liability for such responsive actions, the content and data residing on our servers and the actions of our customers and their customer base and end-users. Complaints in respect of potential violations must be directed to This e-mail address is being protected from spambots. You need JavaScript enabled to view it by providing the domain and IP address used to commit the alleged violation and the date and time of occurrence together with substantial evidence. We reserve the right to recover any expenses and apply reasonable charges in relation with a customer’s violation of this policy. Service credits will not be issued for any interruption of services as a result of a violation.

AlphaElite LLP hereby reserves the right to amend or modify this Acceptable Use Policy at any time in our sole discretion without prior notice. You acknowledge and agree that it is your responsibility to review this policy periodically to be aware of any revision. All changes will be effective upon being posted at this location.

We will be the sole arbiter as to what constitutes as unacceptable use. The following list of prohibited activities is non-exhaustive and serves as a general guideline.   

1. Sending of unsolicited emails that causes complaints from their recipients.

2. Mailbombing or “spamming” (bulk sending of unwanted or unsolicited emails to individual email account).

3. Forging of TCP/IP packet header or any part of the header information in an email or newsgroup posting.

4. Accessing computers, accounts or networks belonging to another party without authorisation (e.g. “spoofing”)

5. Unauthorised monitoring of data or traffic on any network or system.

6. Attempting to probe, scan or test the vulnerability of a system or network or breach security or authentication measures without express authorisation of the owner.

7. Obtaining or attempting to obtain service using any means or device with intent to avoid the applicable charges.

8. Gaining of unauthorised access to alter or destroy, or any attempt thereof, any information or data of our customers or end-users by any means or device.

9. Running of services which tend to attract denial-of-service attacks (e.g. torrent, proxy and IRC related services).

10. Engaging in activities that interferes or disrupts service to any user, host or network such as initiation of pinging, flooding and denial-of-service attacks.

11. Using our services in violation of the law or in aid of any unlawful act.

12. Transmission, distribution or storage of any material that is obscene, defamatory or infringes patent, copyright, trademark or other intellectual property rights.

13. Introduction of malicious programs into any network or server such as viruses, worms, trojans and key loggers.

14. Running scripts or software that results in excessive use or abuse of shared network resources.



Last revised: 14 September, 2008