Cap Rock Telephone Cooperative, Inc. (Cap Rock Internet)
NETWORK MANAGEMENT POLICIES
Cap Rock Telephone Cooperative, Inc. (Cap Rock Internet) “Company” is committed to providing high speed internet service based on network management policies that protect and empower our high speed internet customers, and maximize the benefits of the Internet experience for all customers.
II. General Policies
A. “Company” will provide connections and transport services to the public Internet to customers and will manage its network and provide access in accordance with the Federal Communications Commission’s (FCC’s) Open Internet Rules (adopted December 21, 2010) and in compliance with any future Internet policies or rules adopted by the FCC.
B. To ensure Open Access to the High Speed Internet, “Company” will not unjustly or unreasonably:
- Block, interfere with or degrade an end user’s ability to access, use, send, post, receive, or offer lawful content (including fair use), applications, or services of the user’s choice;
- Block, interfere with or degrade an end user’s ability to connect and use the end user’s choice of legal devices that do not harm the network;
- Prevent or interfere with competition among network, application, service or content providers;
- Engage in discrimination against any lawful Internet content, application, service or service provider with respect to network management practices, network performance characteristics, or commercial terms and conditions;
- Give preference to affiliated content, applications, or services with respect to network management practices, network performance characteristics, or commercial terms and conditions;
C. Applicable Laws
- “Company” complies with the Online Copyright Infringement Liability Limitations Act, a portion of the Digital Millennium Copyright Act that allows Internet service providers to remove or disconnect customer access to copyright infringing material;
- “Company” complies with all other applicable laws and regulations, including the Children’s Online Privacy Protection Act.
D. Network Security and Congestion Management Practices
For the safety and privacy of our access customers and with respect for all customers, “Company”
Follows standard best efforts for Internet delivery with respect to allocation of capacity without differentiation among applications, providers, or sources; uses generally accepted technical measures such as application-neutral bandwidth allocation, as well as measures to address service attacks, illegal content and other harmful activities to protect network integrity and reliability to provide acceptable service levels to all customers.
Reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods based on generally accepted technical measures.
Congestion Management: The purpose of Congestion Management is to provide a positive experience for all customers on the network. Network congestion occurs when a link or node’s data capacity is reached or exceeded. When congestion occurs it causes packet loss, slow speeds or the blocking of new internet connections. If a link or node nears a state of congestion, it will be recognized by “Company’s” technicians. They will identify which ports (customer accounts) are causing the issue. The traffic on these ports will then be temporarily managed. This practice will allow all customers to utilize the internet. “Company” manages only those accounts that are using a disproportionate amount of the network.
“Company” does not manage congestion based on online activities, protocols or applications, but only focuses on the heaviest users in real time. This method is referred to as “protocol-agnostic”. Protocol-agnostic allows periods of congestion to be short-lived and intermittent. This process is generally temporary and the affected account(s) will be reset when the network has stabilized or additional resources are added.
Security: “Company” provides its customers unrestricted access to all lawful content, services and applications online. “Company” strictly prohibits the use of the network to send or facilitate spam and takes preventive measures to reduce the amount of unsolicited email our customers receive and discourage spammers from using our network for spam-related activities. These measures include scanning the number of incoming and outgoing email messages and establishing a SMTP email send-rate limit.
“Company’s” congestion and security management approach will evolve and change over time, as the network expands and technology advancements are made.
III. Pricing and Terms and Conditions of Service
Please click on the following website link(s) for information about pricing and terms and conditions of service:
IV. Performance Characteristics
Please click on the following website link(s) for a general description of “Company’s” service, including the service technology, expected and actual access speed and latency, and the suitability of the service for real-time applications:
Redress Options: Company practices for resolving end-user and edge provider complaints, problems and questions will be addressed by our Customer Care Work Group. If the issue(s) cannot be resolved by Customer Care it will be escalated to the appropriate work group or personnel as required.
Contact Us: Questions, Comments, Concerns
If you have any questions about Cap Rock Telephone Cooperative, Inc. (Cap Rock Internet) Network Management Policies, you may contact us by calling our business office at (806) 271-3336 or writing to us at Cap Rock Telephone Cooperative, Inc., P.O. Box 300 Spur, TX 79370, or come by our business offices at Cap Rock Telephone Cooperative, Inc. 121 E. Third St., Spur, TX 79370.