Network Management Policy

PhireLink Network Management Policy

 

The network management information below is intended to provide further information regarding PhireLink’s network management practices. PhireLink has used sound engineering principles in the design and operation of its broadband network to ensure a good user experience for all customers.

The descriptions in this network management section are for informational purposes only and may be changed at any time.

 

How does PhireLink manage its network?

PhireLink uses various tools and techniques to manage its network, deliver the service, and ensure compliance with this policy and subscriber agreements. These tools and techniques are dynamic, like the network and its usage, and can and do change frequently. For example, these network management activities may include (i) identifying spam and preventing its delivery to customer email accounts, (ii) detecting malicious Internet traffic and preventing the distribution of viruses or other harmful code or content, (iii) temporarily lowering the priority of traffic for users who are the top contributors to current network congestion, and (iv) using other tools and techniques that PhireLink may be required to implement in order to meet its goal of delivering the best possible broadband Internet experience to all of its customers.

 

How does PhireLink manage congestion?

PhireLink does not affirmatively manage congestion on the network through mechanisms such as real-time throttling, blocking, or dropping of specific end user traffic based on source or content. There are no usage caps applicable to PhireLink’s internet access services.

Bandwidth is provided on a per-connection (not a per-device) basis. The speed of the service may vary based on network or internet congestion, your computer configuration,  and the condition of your wiring inside your location, among other factors.

 

What security measures has PhireLink deployed?

PhireLink follows network security policies and practices intended to address threats to our network and customers. Broadband activity that violates our terms of service or otherwise is targeted at or threatens to undermine the integrity or normal operation of our networks or services, or the security of our networks or our customers, may result in suspension or termination of service. We reserve the right at any time to take action to protect the integrity and normal operation of our networks and to safeguard our customers from internet threats, including fraud and other forms of abuse. Such actions may include, but are not limited to, blocking, redirecting, or rate-limiting traffic using specific protocols, delivered over specific protocol ports, or destined for particular domain names or IP addresses associated with malicious activity.

 

Does PhireLink block, throttle or modify any specific protocols?

PhireLink does not limit, block or -control specific protocols or protocol ports based on the source or content, other than for security reasons as set forth below. We do not modify protocol fields in ways not prescribed by the protocol standard, or otherwise inhibit or favor certain applications or classes of applications of traffic on our Internet access service.

 

What are PhireLink’s conduct and information restrictions?

  • Undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening or defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, or otherwise violate any local, state, federal, or non-U.S. law, order, or regulation;
  • Post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be unlawful;
  • Upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the service or otherwise that is protected by copyright or other proprietary right, without obtaining any required permission of the owner;
  • Transmit unsolicited bulk or commercial messages commonly known as “spam;”
  • Send very large numbers of copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupts a server, account, blog, newsgroup, chat, or similar service;
  • Initiate, perpetuate, or in any way participate in any pyramid or other illegal scheme;
  • Participate in the collection of very large numbers of email addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;
  • Collect responses from unsolicited bulk messages;
  • Falsify, alter, or remove message headers;
  • Falsify references to PhireLink or its network, by name or other identifier, in messages;
  • Impersonate any person or entity, engage in sender address falsification, forge anyone else’s digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”);
  • Violate the rules, regulations, terms of service, or policies applicable to any network, server, computer database, service, application, system, or website that you access or use.

 

What are PhireLink’s technical restrictions?

  • Access any other person’s computer or computer system, device, sensor, camera, network, software, or data without his or her knowledge and consent;
  • Breach the security of another user or system or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so;
  • Use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited;
  • Copy, distribute, or sublicense any proprietary software provided in connection with the service by PhireLink or any third party, except that you may make one copy of each software program for back-up purposes only;
  • Distribute programs that make unauthorized changes to software (cracks);
  • Use or run dedicated, stand-alone equipment or servers from the premises that provide network content or any other services to anyone outside of your premises local area network (“premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, email, web hosting, file sharing, and proxy services and servers;
  • Use or run programs, devices, or equipment from residential services that provide network content or any other services to anyone outside of your premises LAN, except for your personal and non-commercial residential use; or
  • Service, alter, modify, or tamper with the PhireLink equipment or service or permit any other person to do the same who is not authorized by PhireLink.

 

What are PhireLink’s network and usage restrictions?

  • Use the residential service for any purpose other than personal and non-commercial residential use (except for your individual use for telecommuting);
  • Use the service for operation as an Internet service provider or use residential service for any business, other legal entity, or organization purpose (whether or not for profit);
  • Restrict, inhibit, or otherwise interfere, regardless of intent, purpose or knowledge, with the ability of any other person to use or enjoy the service (except for tools for safety and security functions such as parental controls, for example), including, without limitation, posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or o impede others’ ability to use, send, or retrieve information using the service;
  • Restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the service or any PhireLink (or PhireLink supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any PhireLink (or PhireLink supplier) facilities used to deliver the Service;
  • Resell the service or otherwise make available to anyone outside the premises the ability to use the service (for example, through Wi-Fi or other methods of networking), in whole or in part, directly or indirectly, with the sole exception of your use of PhireLink-provided Wi-Fi service in accordance with its then-current terms and policies;
  • Connect the PhireLink equipment to any computer or device outside of your premises;
  • Interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host; or
  • Access and use the service with anything other than a dynamic Internet Protocol (“IP”) address that adheres to the dynamic host configuration protocol (“DHCP”). You may not configure the service or any related equipment to access or use a static IP address or use any protocol other than DHCP unless you are subject to a service plan that expressly permits you to do so.

 

Does PhireLink allow consumers to use non-branded devices and applications?

You may attach any lawful device to the network as long as it does not harm the network or the provision of internet access service, facilitate theft of service or any terms of service, or harm other users of the service.

Some individual devices may not support specific applications. You should investigate the capabilities and functions of any device before buying it to determine whether it supports the applications that you want to use.

 

How can customers who have concerns or questions about their Broadband Internet Access Services contact PhireLink?

If you have concerns or questions about the performance characteristics, network management practices, or the terms and conditions for these services, you can contact PhireLink through the methods detailed in the Contact Us section of our website.