Open Internet Policy
In accordance with the FCC’s ’Restoring Internet Freedom Order’ transparency rule, we are providing disclosure of information regarding network management practices, performance characteristics, and commercial terms of our broadband Internet access services so that consumers can make informed choices regarding the purchase and use of such services, and for entrepreneurs and other small businesses to develop, market, and maintain Internet offerings.
Network Management Practices
We do not block any customer traffic with the following exceptions:
1. Services as described below in the ‘Application-Specific Behavior’ section.
2. Traffic with spoofed source addresses. These are used to impersonate another system and are most frequently used in DoS/DDos attacks.
3. Any device that has been identified as malicious by our monitoring systems.
We only throttle traffic based on the customer’s service speed, not on any other basis.
We do not prioritize any customer traffic based on an affiliation with us.
We do not prioritize any customer traffic in exchange for monetary consideration or otherwise.
Traffic congestion may occur occasionally during peak hours. We continuously monitor utilization and proactively add capacity as much as possible to minimize congestion. When congestion occurs, we prioritize equally across all traffic in the following order: network control, voice, streaming video, all other traffic delivered as best-effort.
We block inbound traffic to services on customer devices that have the potential to be used in DoS/DDoS amplification attacks. The current list of ports is available by request, but continues to evolve.
Device Attachment Rules
1. Our network provides an ethernet (100Mbps or 1Gbps) handoff to the customer device, which can be a router or other non-harmful device. Routers must provide NAT and DHCP for IPv4, and DHCPv6 with Prefix-Delegation for IPv6.
2. Customer routers or devices must not have network protocols enabled such as STP, RSTP, RIP, OSPF, BGP.
3. If we determine a device to be harmful to our network, we reserve the right to restrict such device.
We use several methods to detect and mitigate malicious activity that has the potential to harm our network and customers. Triggering conditions include detection of network reconnaissance activity and network flows that indicate DoS/DDoS attacks. Our security practices are always evolving to deal with new threats to the network. These practices will normally not have any effect on our customers’ service.
The current description for each of our services can be found on our website on the respective Terms and Conditions document for each service.
Impact of Non-Broadband Internet Access Service Data Services
We do not provide any non-broadband Internet access services, so there is no impact of such services on the performance of our broadband Internet access service.
The current pricing for each of our services can be found on our website on the respective Plan page for each service.
The current customer support contact information can be found on our website on the Support page.