Network Management Practices & Policy Disclosure
Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, Jamadots' (“Provider”) policies regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.
1. NETWORK MANAGEMENT PRACTICES
In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.
2. CONGESTION MANAGEMENT
It is possible that a relatively small number of customers may place a disproportionate demand on the network bandwidth resources, causing network congestion and an overall degradation in service quality for other end users. For this reason, if Provider’s network nears a state of congestion, Provider will use congestion management practices to ensure all of Provider’s customers retain access to a “fair share” of bandwidth resources.
The congestion management practices utilized by Provider are “protocol- agnostic” meaning that the network does not manage congestion based on the online activities, protocols or applications a customer uses. Rather, Provider’s congestion management practices focus only on the network, as a whole, in real time.
We currently utilize Solar Winds, CYAN, CMS, Nagios, and Cacti congestion management tools to assist us in our congestion management practices.
3. APPLICATION SPECIFIC BEHAVIOR
Provider does not make use of any application-specific network management practices. The following ports are being blocked by the Provider due to known exploits, security holes, trojan activity, and computer worm activity.
-Windows Messenger pop up spam exploit.
-Known Microsoft Exploits for the following ports.
--TCP & UDP 135
--TCP & UDP 445
-Trinoo Flood Attack - Botnets which conducts distributed denial of service attacks on the following ports.
--TCP & UDP 13155
--TCP & UDP 27765
--TCP & UDP 25532
-Slammer MS SQL - Computer worm that causes distributed denial of service attack on the following ports.
--TCP & UDP 1433-1434
-MyDoom - Computer Worm used to commit distributed denial of service attacks on the following ports.
--TCP & UDP 3127-3198
-BackOrifice - Malware which is used to remotely control someone's computer that utilizes the following ports.
--TCP & UDP 1349
--TCP & UDP 54320-54321
-Sasser - Computer Worm that spreads through the following port.
-SoBig - Computer Worm that uses the following port.
-Nachi - Computer Worm that utlizes the following port for malicious activities.
-Blaster - Computer Worm that uses the following port.
4. DEVICE ATTACHMENT RULES
In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards and be non-harmful to Provider’s network.
Provider offers its customers unrestricted access to all of the lawful content, services, and applications available on the Internet. Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing, and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted.
Our current service provider utilizes Spam Assassin and Magic Mail devices for spam and virus filtering.
6. PERFORMANCE CHARACTERISTICS
Provider offers broadband Internet access service via FTTH and Digital Subscriber Line (“DSL”). DSL is a wireline transmission technology that transmits data faster over traditional copper telephone lines already installed to homes and businesses.
The advertised speed of Provider’s Internet service is the maximum speed achievable with the technology utilized by Provider. While the maximum advertised speed is attainable for end users, several factors may affect the actual speed of Provider’s Internet service offerings, including, but not limited to: the distance of the consumer’s home or office from Provider’s central office (i.e., the further away the customer is from the central office, the slower the broadband speed), the end user’s computer, modem or router, activity during peak usage periods, and other Internet traffic.
The below tables reflect the Service Technologies and Advertised Speeds offered by the Provider and the Mean Speeds achieved during Business and Peak Usage Hours.
7. COMMERCIAL TERMS
In order to meet the usage and budgetary needs of all of our customers, Provider offers a wide selection of broadband Internet access plan options, including promotional offerings, bundled service choices, and a la carte alternatives.
To see Provider’s current promotions and pricing on broadband Internet access service, please visit our website www.jamadots.com, or call 1-800-562-9741 to speak with a customer service representative.
b. EARLY TERMINATION FEES
If a customer previously entered into a service agreement with Provider for broadband Internet access service for a defined service term, and customer desires to terminate the service agreement prior to the expiration of that term, Provider may charge a reasonable early termination fee if such fee is clearly indicated in the service agreement.
c. USAGE-BASED FEES
Provider’s Internet service is priced on a flat-fee basis (plus taxes). Provider does not charge end users a usage-based fee for Internet service.
For additional information on Provider’s fee schedule for additional network services, visit the Provider’s website at: www.jamadots.com.
Provider affords full access to all lawful content, services and applications available on the Internet and does not routinely monitor, inspect or store the network activity and traffic of its Internet service users. However, Provider reserves the right to monitor bandwidth, usage, transmissions and content for purposes of protecting the integrity of the network and Provider’s Internet access service through reasonable network management practices.
Provider may collect equipment information to identify the equipment customer is using on the network, including, but not limited to: equipment type, serial number, settings, configuration and software. Provider may also collect performance information to examine the operation of the equipment, services and applications the customer may use on the network, including, but not limited to: IP addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources customer is using in connections with uploading, downloading or streaming data to and from the Internet.
Network traffic, activity, performance information, and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network management purposes.
The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our network and its users from spam, viruses, phishing, and other unwanted or harmful online content and activities. Provider’s network management practices are not intended, nor implemented, to block consumers from accessing the content and applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic. End users with questions, concerns or complaints regarding Provider’s network management practices are encouraged to contact Provider for issue resolution.
9. CONTACT US
If you have any questions regarding Provider’s Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at:
108 W. Superior St.
Munising, MI 49862
Local Phone: 906-387-9911
Toll Free Phone: 1-800-562-9741
Further, if you believe that Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC.http://esupport.fcc.gov/complaints.htm
10. ADDITIONAL DISCLAIMERS
The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of providers, rights holders, and end users.
Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content.