October 18, 2024

Network Management Policy

Prentiss Connect (“Prentiss” or “Company”) is committed to providing our Subscribers with the best online experience possible. Prentiss uses reasonable network management practices consistent with industry standards and uses minimally invasive tools and technologies. Just as the Internet continues to evolve, so too, will our network management policies. Should Prentiss not apply reasonable network management practices, our Subscribers could be subject to the negative effects of, among other risks, security attacks, viruses, and spam, resulting in possible degradation of services. You may also access our most current Acceptable Use Policy (AUP) on our website.

Network Overview

Prentiss operates a state-of-the-art broadband network whereby fiber optic cable is brought past each home and business. Prentiss builds a fiber drop from the street to connect to any home or business that purchases services and where access is granted. (It should be noted that not all residential apartment buildings and multi-tenant office buildings allow access.) The broadband network enables us to bring the benefits of the extraordinary bandwidth carrying capacity to our community.

Information Regarding Our Network Practices

The FCC requires us to provide descriptions of our Network Management Practices to include Application-Specific Behavior Practices, Device Attachment Rules, Security Practices, Performance Characteristics, Privacy Policies, and Customer Redress Options.

Congestion Management:

Given the current bandwidth capacity, no congestion management practice is required nor is a practice being employed today other than network monitoring. Prentiss reserves the right to employ congestion management practices in the future.

Application-Specific Behavior:

Does Prentiss block or rate-control specific protocols?

  • We block certain traffic to protect our broadband Subscribers from malicious applications such as spam, viruses, bots, hackers and other malicious activities. We block traffic network sources that are known by the industry to spread malware and from applications that are known to propagate these malicious activities.
  • If we did not block and/or control these types of activities, our high-speed Internet Subscribers’ computers could become infected with all manner of viruses and other malware that could in-turn affect other networks through the Internet.
  • We do not block any other kinds of traffic. We apply the philosophy of complete network neutrality, and we treat traffic to and from all broadband internet Subscribers the same.

Does Prentiss modify protocol fields in ways not prescribed by protocol standard?

  • We do not modify protocol fields not prescribed by protocol standards.

Does Prentiss inhibit or favor certain applications or classes of applications?

  • We do not inhibit or favor applications or classes of application over its High-Speed Internet/broadband data network. All traffic is treated in a “protocol-agnostic” manner, which means management is not based on the applications and is also content neutral.

Device Attachment Rules:

Does Prentiss restrict the types of devices that it allows to connect to the network?

  • We do not allow Customers to connect switches or hubs directly to the IP port. A Customer is limited to one (1) MAC address per service port.

If there are restrictions, is there an approval procedure for devices connecting to the network?

  • For any questions regarding the types of devices allowed or required, Subscribers should contact Customer Service. While there are no formal approval procedures to get a specific device approved for connection to the network, all devices must be UL certified and carry the FCC Part 64 certification.

Security:

What are the practices used to ensure end-user security or security of the network?

  • Prentiss uses the following practices to ensure end-user security and network security:
    • We employ protocols that can identify traffic on the network and what part of the network the traffic originated on and the portion of the network the traffic is trying to reach. The use of these types of protocols helps us to understand the flow of network traffic in order to best engineer the network as well as to troubleshoot the network.
    • We utilize anti-spoof software which is intended to identify and isolate one user’s hardware from impersonating another user’s hardware.
    • We utilize the industry practice of blacklisting and blocking access from other ISP networks that are spreading malicious software.
    • Our network utilizes encryption to stop unlawful access to specific traffic.
  • Prentiss utilizes protocols and practices to protect and secure Subscriber data as well as to protect the broadband network for the benefit of all Subscribers. These protocols allow us to comply with federal CALEA and other Law Enforcement requirements.

What conditions trigger a security mechanism to be invoked?

  • Prentiss monitors the network many times per second, and a trigger would be finding any instance of unwanted network intrusion on the network. Prentiss would react immediately to such an intrusion and would refer to Law Enforcement Agencies as needed.

Performance Characteristics:

A general description of the service offered, including Service Technology, Expected and Actual Speeds, Expected and Actual Latency, Suitability of the Service for Real-time Applications follows:

  • Service Technology
    • Prentiss uses a FTTH access system to deliver broadband services to Customers.
    • In the network, there are no electronics between the fiber hut and the Customer. No electronics means that there are fewer failure points in the network and superior service quality for our Subscribers.
  • Expected and Actual Speeds
    • The expected speeds for our products are at the advertised rates, and the actual speeds are within a reasonable variance as advertised. It is possible for Customers to experience slower speeds on the open Internet due to the nature of the open Internet and not due to any blockage or congestion on the network.
  • Expected and Actual Latency
    • Latency is another measure of Internet performance. Latency is the time delay in transmitting or receiving packets on a network. Latency is primarily a function of the distance between two (2) points of transmission and is typically measured in milliseconds. Our network is designed so that the actual latency is generally around 30 milliseconds or less.
  • Suitability of the Service for Real-time Applications
    • Customers can achieve the speeds on our network that they subscribe to, 24/7, without slowdowns or blockages on our networks.

System and Network Security:

Subscribers and/or Users are prohibited from violating or attempting to violate the security of our network, including, without limitation, (a) accessing data not intended for such Subscriber and/or User or logging into a server or account which such Subscriber and/ or User is not authorized to access, (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization, (c) attempting to interfere with, disrupt or disable service to any user, host or network, including, without limitation, via means of overloading, flooding, mail bombing or crashing, (d) forging any packet header or any part of the header information in any E-mail or newsgroup posting, or (e) taking any action in order to obtain services to which such Subscriber and/or User is not entitled. Violations of system or network security may result in civil or criminal liability. We may investigate occurrences that may involve such violations, and we may involve and cooperate with law enforcement authorities in prosecuting Users who are alleged to be involved in such violations. Additional requirements and/or penalties apply as found in the Prentiss Connect AUP.

Suspension or Termination:

Any Subscriber or User which we determine, in our sole discretion, to have violated any element of this Network Management Policy shall receive a written warning, and may be subject at our discretion to a temporary suspension of service pending such Subscriber’s agreement in writing to refrain from any further violations; provided that Prentiss may immediately suspend or terminate such Subscribers or User’s service without issuing such a warning if, in our sole discretion we deem such action necessary. If we determine that a Subscriber or User has committed a second violation of any element of this Network Management Policy, such Subscriber or User shall be subject to immediate suspension or termination of service without further notice, and we may take such further action as we determine to be appropriate under the circumstances to eliminate or preclude such violation. Prentiss shall not be liable for any damages of any nature suffered by any Subscriber, Customer, User, or any third party resulting in whole or in part from Prentiss’s exercise of its rights under this Policy. Additional requirements and/or penalties apply as found in our AUP.

Service Monitoring:

We have no obligation to monitor the services but may do so and disclose information regarding the use of the services for any reason if we, in our sole discretion, believe that it is reasonable to do so, including to satisfy laws, regulations, or other governmental or legal requirements or requests; to operate the services properly, or to protect itself and its Subscribers.

Network Inspection:

Do network management practices entail inspection of network traffic?

  • We examine traffic to the extent needed to utilize the network safety features listed earlier such as eliminating spam or intercepting malware. We do not inspect traffic for any purpose other than to keep track at the network level, where traffic flows to make certain that the network is adequate for the demands of our Subscribers.

Is traffic information stored, provided to 3rd parties or used by the ISP for non-network management purposes?

  • The only time that any stored information is provided to any 3rd party is in response to a court order from a valid and qualified law enforcement agency.

Complaint Redress Options:

What is the Company’s practices for resolving end-user and edge provider complaints and questions?

  • We first log all complaints of trouble as a trouble ticket in a trouble log system. This allows for identification of each trouble reported on the network.
  • We assign a priority to each trouble ticket based upon the perceived severity of the problem.
  • We attempt to identify and address problems from its Network Operations Center (NOC). If the NOC is unable to clear a reported problem, then a technician in a truck is dispatched to address the problem.
  • If the problem is of such severity that a field technician cannot solve the problem, the problem is escalated to an engineer. If the engineer is unable to solve the problem, it is generally escalated to an external engineer or consultant or to the vendor that made the equipment in question. We contract with experienced vendors for as-needed troubleshooting and resolution in support of the network.
  • The Customer may be notified depending upon the severity and type of problem.
  • Trouble tickets are retained indefinitely so that we can view a history of trouble at a specific Customer site, a specific neighborhood or with a specific brand or piece of equipment.

Prohibited Uses and Activities:

Our AUP prohibits uses and activities of the service that interfere with or diminish the use and enjoyment of the service by others, infringe on the rights of others or that are illegal. The AUP is posted on our website.

No Waiver/Severability:

Any failure of Prentiss Connect to enforce this Policy shall not be construed as a waiver of any right to do so at any time. If any portion of this Policy is held invalid or unenforceable, that portion will be construed consistent with applicable law, and any remaining portions will remain in full force and effect.

Prentiss Connect reserves the right to modify this Network Management Policy at any time. We will notify you of any material changes via written, electronic, or other means permitted by law, including by posting it on our website. If you find the changes unacceptable, you have the right to cancel the Services. If you continue to use the Services after receiving notice of such changes, we will consider that as your acceptance of the changes.

Version 1 Effective: October 1, 2024