OPEN INTERNET POLICY
Network Management Practices Policy Disclosure
Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, the policies of Threshold Communications, Inc., (“Provider”) regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.
Network Management Practices
In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.
Congestion is an Internet access service problem that can slow web browsing, downloading, and other activities of the customers during certain peak usage periods. Congestion may be caused by capacity limits and bottlenecks in a service provider’s own network, or by limitations in the capacity of the Middle Mile transport facilities and services that many service providers must purchase from unrelated entities to carry the traffic of their customers between their service areas and the closest Internet nodes.
Provider constantly monitors its network to manage congestion avoiding over utilization of circuits. Provider maintains sufficient bandwidth to service its customers.
Provider does not make use of any application-specific network management practices. Provider does not favor, modify, inhibit, rate control or block any specific protocols, protocol ports or fields, or any applications or classes of applications. Customers may use any lawful and commercially available application. Provider’s network does not discriminate against particular types of content. Peer to Peer, streaming video, VoIP, and video downloads are all classified as content neutral.
Provider does not normally monitor the contents of the traffic or applications of its customers. It undertakes no obligation to monitor or investigate the lawfulness of the applications used by its customers unless mandated by law that Provider do so.
Device Attachment Rules
In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards and be non-harmful to Provider’s network. Provider reserves the right to disable devices that cause disruptions to Provider’s customers or that are not in compliance with industry standards. In the event that Provider disables a device or denies access to application providers, prompt notice will be given of the decision to deny access to the network or disable a device.Intelligent Call Routing | Hosted Business Phone Systems