This site is owned and maintained by Stepper Homes. Stepper Homes authorizes you to access and view the Web Site and to print out forms, web pages, and publications that are available at this Web Site for the general public solely for non-profit purposes such as learning about Free-to-Air technology and promoting the goals of your specific non-profit organization, provided that you agree to the following:
You agree not to copy, create derivative works, duplicate, display, distribute, download, upload, modify, publish, publicly perform, sell, resell, transmit, transfer, or exploit for any commercial purposes any portion of the “Content,” which is defined throughout this Usage Policy as all of the products, services and information, including, but not limited to, all of the page headers, images, graphics, text, logos, button icons, design, layout, software (including source code), sounds, music, video files, and data provided on this Web Site, with the exception of downloadable forms, publications and other interactive on-line forms that are intended for public or member usage (collectively, the “Content”). You must retain all copyright, trademark, service mark and other proprietary notices contained in the original Content in any authorized copy that you make of this Web Site. The site may be used only for lawful purposes by authorized individuals.
You are not authorized to use this Web Site or Content, except as indicated above, in any manner: (1) in violation of any applicable law, order or regulation; (2) in a way that will infringe the copyright, trademark, trade secret or other intellectual property rights of others or violate the privacy, publicity or other personal rights of others; or (3) that is defamatory, obscene, threatening, abusive or hateful. In addition, you shall not breach the security of the Web Site, including without limitation: (a) accessing data not intended for you or logging into a server account which you are not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach a security or authentication measure of this Web Site and/or Content without proper authorization, and/or (c) using viruses, spamming, flooding, etc. to interfere with service to any user, host or network.