Network Management Practices & Policy Disclosure

 

Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, Jamadots' (“Provider”) policies regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.

 

1. NETWORK MANAGEMENT PRACTICES

 

In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource  for  broadband  Internet  service  providers,  it  is  essential  that  Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers.   By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten  to  degrade  service. The  network  management  practices  employed  by Provider are consistent with industry standards.

 

2. CONGESTION MANAGEMENT

 

It is possible that a relatively small number of customers may place a disproportionate demand on the network bandwidth resources, causing network congestion and an overall degradation in service quality for other end users.   For this reason, if Provider’s network nears a state of congestion, Provider will use congestion management practices to ensure all of Provider’s customers retain access to a “fair share” of bandwidth resources.

 

The congestion management practices utilized by Provider are “protocol- agnostic” meaning that the network does not manage congestion based on the online activities, protocols or applications a customer uses.  Rather, Provider’s congestion management practices focus only on the network, as a whole, in real time.

 

We currently utilize Solar Winds, CYAN, CMS, Nagios, and Cacti congestion management tools to assist us in our congestion management practices.

 

3. APPLICATION SPECIFIC BEHAVIOR

 

Provider does not make use of any application-specific network management practices. The following ports are being blocked by the Provider due to known exploits, security holes, trojan activity, and computer worm activity.

 

-Windows Messenger pop up spam exploit.

--UDP 1027

 

-Known Microsoft Exploits for the following ports.

--TCP & UDP 135

--TCP 138

--TCP 139

--TCP & UDP 445

--UDP 593

 

-Trinoo Flood Attack - Botnets which conducts distributed denial of service attacks on the following ports.

--TCP & UDP 13155

--TCP & UDP 27765

--TCP & UDP 25532

 

-Slammer MS SQL - Computer worm that causes distributed denial of service attack on the following ports.

--TCP & UDP 1433-1434

 

-MyDoom - Computer Worm used to commit distributed denial of service attacks on the following ports.

--TCP & UDP 3127-3198

 

-BackOrifice - Malware which is used to remotely control someone's computer that utilizes the following ports.

--TCP & UDP 1349

--TCP & UDP 54320-54321

 

-Sasser - Computer Worm that spreads through the following port.

--TCP 5554

 

-SoBig - Computer Worm that uses the following port.

--UDP 8998

 

-Nachi - Computer Worm that utlizes the following port for malicious activities.

--TCP 707

 

-Blaster - Computer Worm that uses the following port.

--TCP 4444

 

4. DEVICE ATTACHMENT RULES

 

In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards and be non-harmful to Provider’s network.

 

5. SECURITY

 

Provider offers its customers unrestricted access to all of the lawful content, services, and applications available on the Internet.   Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing, and other unwanted or harmful online content and activities.  In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted.

 

Our current service provider utilizes Spam Assassin and Magic Mail devices for spam and virus filtering.

 

6. PERFORMANCE CHARACTERISTICS

 

Provider offers broadband Internet access service via FTTH and Digital Subscriber Line (“DSL”). DSL is a wireline transmission technology that transmits data faster over traditional copper telephone lines already installed to homes and businesses.

 

The advertised speed of Provider’s Internet service is the maximum speed achievable with  the  technology  utilized  by  Provider.    While  the  maximum advertised speed is attainable for end users, several factors may affect the actual speed of Provider’s Internet service offerings, including, but not limited to: the distance of the consumer’s home or office from Provider’s central office (i.e., the further away the customer is from the central office, the slower the broadband speed), the end user’s computer, modem or router, activity during peak usage periods, and other Internet traffic.

 

The below tables reflect the Service Technologies and Advertised Speeds offered by the Provider and the Mean Speeds achieved during Business and Peak Usage Hours.

During Business Hours (8 AM - 5 PM)

FttH

Mean

100 Mbps Down / 25 Mbps Up

101.548 Mbps D / Mbps 31.876 U

100 Mbps Down / 5 Mbps Up

100.989 Mbps D / Mbps 5.561 U

50 Mbps Down / 25 Mbps Up

49.8034 Mbps D / Mbps 31.764 U

50 Mbps Down / 5 Mbps Up

51.0952 Mbps D / Mbps 5.538 U

30 Mbps Down / 20 Mbps Up

29.9334 Mbps D / Mbps 20.0222 U

30 Mbps Down / 4 Mbps Up

29.6536 Mbps D / Mbps 3.414 U

15 Mbps Down / 2 Mbps Up

15.2931 Mbps D / 2.3435 Mbps U

6 Mpbs Down / 1 Mbps Up

6.9808 Mbps D / 1.1327 Mbps U

3 Mpbs Down /512 Kbps Up

3.3683 Mbps D / 583.2 Kbps U

1.5 Mpbs Down /386 Kbps Up

1.582 Mbps D / 475.2 Kbps U

Please reload

During Business Hours (8 AM - 5 PM)

DSL

Mean

30 Mbps Down / 4 Mbps Up

29.012 Mbps D / 4.686 Mbps U

15 Mbps Down / 2 Mbps Up

15.1042 Mbps D / 2.0479 Mbps U

6 Mpbs Down / 1 Mbps Up

6.1354 Mbps D / 1.0292 Mbps U

3 Mpbs Down / 512 Kbps Up

3.0952 Mbps D / 518.8 Kbps U

1.5 Mpbs Down / 386 Kbps Up

1.582 Mbps D / 475.2 Kbps U

Please reload

During Peak Usage (6 PM - 12 AM)

FttH

Mean

100 Mbps Down / 25 Mbps Up

100.898 Mbps D / 30.125 Mbps U

100 Mbps Down / 5 Mbps Up

101.126 Mbps D / 5.613 Mbps U

50 Mbps Down / 25 Mbps Up

50.167 Mbps D / 27.122 Mbps U

50 Mbps Down / 5 Mbps Up

50.888 Mbps D / 5.677 Mbps U

30 Mbps Down / 20 Mbps Up

30.123 Mbps D / 20.0125 Mbps U

30 Mbps Down / 4 Mbps Up

30.676 Mbps D / 3.414 Mbps U

15 Mbps Down / 2 Mbps Up

15.18 Mbps D / 2.06 Mbps U

6 Mpbs Down / 1 Mbps Up

6.1159 Mbps D / 1.005 Mbps U

3 Mpbs Down / 512 Kbps Up

3.0793 Mbps D / 517.8 Kbps U

1.5 Mpbs Down / 386 Kbps Up

1.5083 Mbps D / 374.4 Kbps U

Please reload

During Peak Usage (6 PM - 12 AM)

DSL

Mean

30 Mbps Down / 4 Mbps Up

29.984 Mbps D / 4.682 Mbps U

15 Mbps Down / 2 Mbps Up

14.9647 Mbps D / 2.057 Mbps U

6 Mpbs Down / 1 Mbps Up

6.1159 Mbps D / 1.0054 Mbps U

3 Mpbs Down / 512 Kbps Up

3.0793 Mbps D / 517.8 Kbps U

1.5 Mpbs Down / 386 Kbps Up

1.5083 Mbps D / 374.4 Kbps U

Please reload

7. COMMERCIAL TERMS

a. PRICING

In order to meet the usage and budgetary needs of all of our customers, Provider offers a wide selection of broadband Internet access plan options, including promotional offerings, bundled service choices, and a la carte alternatives.

To see Provider’s current promotions and pricing on broadband Internet access service, please visit our website www.jamadots.com, or call 1-800-562-9741 to speak with a customer service representative.

b. EARLY TERMINATION FEES

If a customer previously entered into a service agreement with Provider for broadband Internet access service for a defined service term, and customer desires to terminate the service agreement prior to the expiration of that term, Provider may charge a reasonable early termination fee if such fee is clearly indicated in the service agreement.

c. USAGE-BASED FEES

Provider’s Internet service is priced on a flat-fee basis (plus taxes).   Provider does not charge end users a usage-based fee for Internet service.

For additional information on Provider’s fee schedule for additional network services, visit the Provider’s website at: www.jamadots.com.

8. PRIVACY POLICY

Provider affords full access to all lawful content, services and applications available on the Internet and does not routinely monitor, inspect or store the network activity and traffic of its Internet service users.   However, Provider reserves the right to monitor bandwidth, usage, transmissions and content for purposes of protecting the integrity of the network and Provider’s Internet access service through reasonable network management practices.

Provider may collect equipment information to identify the equipment customer is using on the network, including, but not limited to: equipment type, serial number, settings, configuration and software.  Provider may also collect performance information to examine the operation of the equipment, services and applications the customer may use on the network, including, but not limited to: IP addresses, URLs, data transmission rates and latencies, location information, security characteristics,  and  information  about  the  amount  of  bandwidth  and  other network resources customer is using in connections with uploading, downloading or streaming data to and from the Internet.

Network traffic, activity, performance information, and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network management purposes.

Provider is required to comply with relevant laws, regulations and judicial orders. Information covered under this Privacy Policy, as well as other categories of information, may be disclosed to third parties if Provider determines, in its sole discretion, that such a disclosure is necessary or required.  Provider may also disclose this information if, in its sole discretion, such a disclosure is necessary or required to protect our interests or the interests of our customers.    Provider may also disclose this information in connection with the sale of our business.

The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our network and its users from spam, viruses, phishing, and other unwanted or harmful online content and activities.  Provider’s network management practices are not intended, nor implemented, to block consumers from accessing the content and applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic.  End users with questions, concerns or complaints regarding Provider’s network management practices are encouraged to contact Provider for issue resolution.

9. CONTACT US

If you have any questions regarding Provider’s Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at:

Jamadots
108 W. Superior St.
Munising, MI 49862
Local Phone: 906-387-9911
Toll Free Phone: 1-800-562-9741
email: jamadots@jamadots.com
website: www.jamadots.com


Further, if you believe that Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC.http://esupport.fcc.gov/complaints.htm

10. ADDITIONAL DISCLAIMERS

The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates  the  legitimate  interests  of  providers,  rights  holders,  and  end users.

Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content.