Network Management Policy

Bulloch Solutions (“We”, “Our”, “Us”) provides this Network Management Policy (“Policy”) in accordance with Federal Communications Commission (“FCC”) requirements to disclose certain network management practices, performance characteristics, and commercial terms. Additional information about our broadband policies and practices is available at URL (“Website”).

Network Practices

We engage in network management practices that are tailored and appropriate for achieving optimization on our network considering the particular network architecture and technology of our broadband Internet access service. Our goal is to ensure that all our customers experience a safe and secure broadband Internet environment that is fast, reliable, and affordable. We want our customers to experience all the Internet offers, whether it is social networking, streaming videos, listening to music, or communicating through email and videoconferencing.

Our network practices include congestion- and security-protocol-management. Such protocols and practices generally will not impact our customers’ user experience. We use various tools and industry-standard techniques to manage our network to ensure fast, secure, and reliable Internet service.

  • Blocking: We do not block or discriminate against lawful Internet content, applications, services, or non-harmful devices. We conduct only reasonable network management.
  • Throttling: We do not throttle, impair, or degrade lawful Internet traffic based on content, application, service, user, or use of a non-harmful device. We engage in only reasonable network management practices.
  • Affiliated Prioritization: We do not favor any Internet traffic over others, including through the use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate, and we have no plans to do so.
  • Paid Prioritization: We do not favor or prioritize any Internet traffic over others, and we do not prioritize Internet websites over others in exchange for any consideration to benefit any content, applications, services, or devices.

Network Management Practices

Our network management practices are intended to ensure that we provide our customers with the best possible Internet access. To achieve this goal, we employ network management techniques such as identifying spam and preventing its delivery to customer email accounts, detecting malicious Internet traffic, and preventing the distribution of, or inadvertent access to, malware, phishing, viruses, or other harmful code or content.

Congestion Management

We monitor the connections on our network in the aggregate for all types of traffic to determine the utilization rate. We may take appropriate measures to relieve undue congestion if it occurs on the network.

Our network and congestion management practices do not discriminate based on the type of application being used, nor are they based on any particular customer’s aggregate monthly data usage. We examine only current network conditions, not our customers’ online activities.

Customer conduct that abuses or threatens our network or violates our Acceptable Use Policy or Subscriber Agreement will be asked to stop immediately. If a customer fails to respond or cease such conduct, we may suspend service or terminate the user’s account.

We also check for abnormal traffic flows, network security breaches, malware, loss, and damage to the network. If a breach is detected or high-volume users are brought to light by complaint, we provide notification to the customer via email or phone. If a customer violates the Acceptable Use Policy or other policies and such a violation is not remedied, we will seek to suspend or terminate that customer’s service.

If we take any congestion management actions, the vast majority of our customers’ Internet activities will be unaffected. Some customers may, however, experience more extended download or upload times or slower surf speeds.

Application-Specific Behavior

Except as may be provided elsewhere herein, we do not engage in any application-specific network management activities on our network. Customers may use any lawful application as part of their Internet usage.

Device Attachment Rules

Customer devices must use either DHCP to connect to our network as indicated at the time of service installation. There is a limit of one (1) public IP address per account. Additional public IP addresses may be provided upon customer request at the current billing rate. For best results, modems, wireless modems, or other proprietary network gateways used on our broadband network should be provided by us. Customers may, however, attach their own devices to their modems, including wired or wireless routers, laptops, desktop computers, video game systems, televisions, or other network-enabled electronics equipment. Customers are responsible for ensuring that their equipment does not harm our network or impair other customers’ service. We are not responsible for the functionality or compatibility of any equipment provided by our customers. Customers are responsible for securing their own equipment to prevent third parties from unauthorized access to our broadband network and will be held responsible for the actions of such third parties who gain unauthorized access through unsecured customer equipment. If we discover a customer device is harmful to our network, we have the right to request that the customer remove such device.

Security

We know the importance of securing our network and customers from network threats and annoyances. We promote the security of our network and our customers by protecting them from threats like spam, viruses, firewall issues, and phishing schemes.

We also deploy spam filters for our email service to divert spam from an online customer’s email inbox into a quarantine file while allowing the customer to control which emails are identified as spam. Customers may access spam files through the email program. Spam files are automatically deleted if not accessed within 30 days.

As normal practice, we do not block protocols, content, or traffic for network management, but we may block or limit traffic such as spam, viruses, malware, or denial-of-service attacks to protect network integrity and the security of our customers.

These tools and practices may change from time to time to keep up with changing network technologies and new and innovative ways our customers use the network.

Performance Characteristics

Service Description

We offer broadband service over Fiber-to-the-Home (FTTH). Information about our different service offerings can be found at URL. All of our broadband services can support real-time applications.

Network Performance

We make every effort to support advertised speeds and will dispatch repair technicians to customer sites to perform speed tests as needed to troubleshoot and resolve speed and application performance caused by our network. We measure availability, latency, and aggregate utilization on the network and strive to meet internal service level targets.

The actual speed that a customer will experience while using the Internet depends upon a variety of conditions, many of which are beyond our control. These conditions include but are not limited to i) performance of a customer’s broadband device, including its age, processing capability, its operating system, the number of applications running simultaneously, and the presence of any adware and viruses; ii) type of connection between a customer’s computer and modem. For example, wireless connections may be slower than direct connections into a router or modem. iii) the distance packets travel (round trip time of packets) between a customer’s computer and its final destination on the Internet; iv) Congestion or high usage levels at the website or destination; and v) gating of speeds or access by the website or destination deployed by the site owners to manage traffic or performance.

All services are best effort. We test each service for actual and expected access speeds at the time of network installation to demonstrate that the service is capable of supporting the advertised speed. Customers may also test their actual speeds using the speed test located at URL and may request assistance by calling our business office at (912) 865-1100.

Impact of Non-BIAS Data Services

The FCC defines Non-Broadband Internet Access Services (Non-BIAS) to include services offered by broadband providers that share capacity with Broadband Internet Access Services (BIAS) (previously known as “Specialized Services”) also offered by the provider over the last-mile facilities.

Real time non-BIAS services offered by us, such as Internet Protocol (IP) Voice Service, command optimal bandwidth. As Non-BIAS traffic is combined with general Internet traffic on our network, broadband customers could experience service delays, although very unlikely, if there is an occurrence of congestion on our network. In any such event, the Non-BIAS traffic is given priority over general Internet traffic.

Commercial Terms

Pricing

We offer multiple levels of internet service, all with no monthly data cap. Our pricing for our different service offerings and other terms can be found at URL. Prices do not include applicable federal, state, or local taxes and regulatory fees. Prices and packages are subject to change.

Privacy Policies

We value the privacy of our internet service customers. Like most companies, we collect certain information about our customers and use it to provide our services. We collect information when our customers interact with us, when our customers use our internet service, and when our customers visit our website. This information is used to deliver, provide, and repair our services and establish and maintain customer records and billing accounts. We protect the information we have about our customers and require those we share it with to protect it. We do not sell, license, or share information that individually identifies our customers with others without your consent, except as necessary when working with vendors and partners for business purposes and when necessary for them to do work on our behalf. Additional details about our Privacy Policy can be found at URL.

Redress Options

We strive to provide excellent customer service and resolve any issues promptly. If you have questions, complaints, or requests for additional information, please call 912-865-1100 or email us at [email protected]. We take all such questions and complaints seriously.

In addition to this Policy, customers may also find links to the following on our Website: