threshold-communications.com Voice and Data Services | Hosted Business Phones and Internet Phoenix AZ 85014 Seattle WA 98101 threshold-communications.com 5 4.9 1 6 http://blogs.forbes.com/account/ http://seattle.eventful.com/events/threshold-communications-/ http://thresholdcommun.livejournal.com/profile http://thresholdcommunications.newsvine.com/_news/2016/10/31/36286828-threshold-communications http://thresholdcommunications.polyvore.com/ http://www.aboutus.com/User:Thresholdcommunications http://www.dailymotion.com/thresholdcommunications1 http://www.folkd.com/user/thresholdcommunications http://www.hi5.com/thresholdcommunications http://www.scoop.it/u/threshold-communications http://www.stumbleupon.com/stumbler/thresholdcommuni https://about.me/thresholdcommunications https://del.icio.us/thresholdcom https://disqus.com/by/disqus_DF7kL3Rnbb/ https://github.com/thresholdcommunications https://storify.com/thresholdcom https://thresholdcommunications.shutterfly.com/ https://www.behance.net/thresholdcac01 https://www.diigo.com/profile/thresholdcommu https://www.plurk.com/thresholdcommunications https://www.quora.com/profile/Threshold-Communications https://www.reddit.com/user/thresholdcommunicati Jeff Matson https://twitter.com/jeffmatson https://www.linkedin.com/in/jeff-matson-b84108 http://www.zoominfo.com/p/Jeff-Matson/502185550 https://www.sos.wa.gov/corps/search_detail.aspx?ubi=602167046
October 17, 2016

Open Internet

 

OPEN INTERNET POLICY

Network Management Practices Policy Disclosure

Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, the policies of Threshold Communications, Inc., (“Provider”) regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.

Network Management Practices

In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.

Congestion Management

Congestion is an Internet access service problem that can slow web browsing, downloading, and other activities of the customers during certain peak usage periods. Congestion may be caused by capacity limits and bottlenecks in a service provider’s own network, or by limitations in the capacity of the Middle Mile transport facilities and services that many service providers must purchase from unrelated entities to carry the traffic of their customers between their service areas and the closest Internet nodes.

Provider constantly monitors its network to manage congestion avoiding over utilization of circuits. Provider maintains sufficient bandwidth to service its customers.

Application-Specific Behavior

Provider does not make use of any application-specific network management practices. Provider does not favor, modify, inhibit, rate control or block any specific protocols, protocol ports or fields, or any applications or classes of applications. Customers may use any lawful and commercially available application. Provider’s network does not discriminate against particular types of content. Peer to Peer, streaming video, VoIP, and video downloads are all classified as content neutral.

Provider does not normally monitor the contents of the traffic or applications of its customers. It undertakes no obligation to monitor or investigate the lawfulness of the applications used by its customers unless mandated by law that Provider do so.

Device Attachment Rules

In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards and be non-harmful to Provider’s network. Provider reserves the right to disable devices that cause disruptions to Provider’s customers or that are not in compliance with industry standards. In the event that Provider disables a device or denies access to application providers, prompt notice will be given of the decision to deny access to the network or disable a device.

Read more: Open Internet Policy – Security

Intelligent Call Routing | Hosted Business Phone Systems