In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.
Provider periodically monitors aggregate traffic usage on its network. If congestion emerges on the network, Provider will take measures to identify and address the cause, including identifying high volume bandwidth users. In order to reduce instances of congestion, Provider adds capacity to its network when utilization has reached a specific level.
On Provider’s network, all customers have access to all legal services, applications and content online and, in the event of congestion, most Internet activities will be unaffected. Some customers, however, may experience longer download or upload times, or slower surf speeds on the web if instances of congestion do occur on Provider’s network.
Customers using conduct that abuses or threatens the Provider network or which violates the company’s Acceptable Use Policy, Internet service Terms and Conditions, or the Internet Service Agreement will be asked to stop any such use immediately. A failure to respond or to cease any such conduct could result in service suspension or termination.
Provider does not make use of any application-specific network management practices. Provider does not modify protocol fields in ways not prescribed by the protocol standard. Provider does not inhibit or favor certain applications or classes of applications. Provider does not block or rate-control specific protocols or protocol ports, with the exception of blocking certain outbound Transmission Control Protocol (“TCP”) Port 25 or Simple Mail Transfer Protocol (“SMTP”) as a protection and security control mechanism against unsolicited commercial email (“UCE”).
Device Attachment Rules
In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards and be non-harmful to Provider’s network.
For Internet service delivered through Provider’s Fiber-to-the-Home (“FTTH”) technology, connectivity between the subscriber’s device and Provider’s network with either Static Internet Protocol address assignment or Dynamic Host Configuration Protocol (“DHCP”) is available for an additional monthly fee.
Provider offers its customers unrestricted access to all of the lawful content, services, and applications available on the Internet. Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing, and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted.
To protect the integrity of its network and the safety of its users, Provider engages in filtering practices of inbound and outbound email against unsolicited commercial email (“UCE”). Provider also utilizes an Intrusion Prevention System (“IPS”) and Intrusion Detection System (“IDS”) to detect Distributed Denial of Service (“DDoS”) and other denial of service, flooding-type attacks. Additionally, Provider imposes an Access Control List (“ACL”) on bad remote host IP addresses when a response from the remote administer is not forthcoming. The security measures employed by Provider are triggered upon network detection of attacks or malicious activity which could adversely affect customer activity or shared network infrastructure. The security measures employed by Provider to prevent the spread of viruses, malware, spam, harmful and unwanted content or other threats to consumers are intended solely to protect the reliability and safety of Provider’s network and do not prevent end-users from running certain applications.
Provider also deploys spam filters in order to divert spam from an online customer’s email inbox into a quarantine file while allowing the customer to control which emails are identified as spam. Customers may access the spam files through the email. Spam files are automatically deleted if not accessed within 14 days.
To ensure additional security protection for network users, Provider has SecureIT Plus services available for a minimal monthly fee. The SecureIT Plus services available from Provider include automated spyware protection, automated virus protection, automated Windows updates, firewall protection, parental controls, and pop-up blockers for Internet Explorer.
If you have any questions regarding Provider’s Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at:
Dickey Rural Networks
9628 Highway 281
PO Box 69
Ellendale, ND 58436
Telephone Number: 701-344-5000 or 1-877-559-4692
Further, if you believe that Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC.
The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of providers, rights holders, and end users.
Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content.
For additional information, please review Provider’s Acceptable Use Policy at: http://drtel.com/internet/acceptable-use/