top of page

KTCI POLICIES

Copyright Infringement Policy

Copyright infringement most commonly involves the possession, downloading, or sharing of electronic copies of music, movies, or videos without the permission or approval of the copyright holder. To protect their interests, copyright holders frequently monitor websites and other popular download locations to record the title, date, time, and Internet Protocol (IP) address associated with infringing activity. It is the policy of our company to discourage the use of its network and services, to download materials in violation of copyright, trademark or other intellectual property laws. Based on the IP address involved, the copyright holder determines the Internet Service Provider (ISP) that manages the IP address and sends them a notice describing the event. When we receive such notices, we determine what customer was assigned the IP address at the date (s) and time (s) listed in the notice (s). We only track IP address assignment and not how or where the IP address is used. We do not monitor or track customer activity on the internet. If we are able to identify a customer with the IP address, we will contact the customer so they are aware of the allegation (s) of copyright infringement and to provide them with an opportunity to prevent the activity or remove the material. We do not release a customer’s identity to the copyright holder unless we are required to do so by a court order or subpoena. If we receive repeated copyright infringement notifications for the customer over a period of time, we will escalate our response to ensure the customer is aware of the situation and to provide suggestions that may help resolve the problem. If we continue to receive copyright infringement notifications against the customer, we will take appropriate action, which could include, but not limited to, reducing the

customer’s bandwidth, or suspending or terminating their internet service. If the customer feels a mistake has been made or that the copyright for the material mentioned is not being infringed upon, they may file a counter-notification with the copyright holder or work with them directly. Customers may wish to seek legal advice from an attorney if they receive a copyright infringement notice.

Network Management Practices

Network Management Practices Policy Disclosure Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, the policies of Kennebec Telephone Co., Inc. regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.

Network Management Practices

In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.

Congestion Management Provider does not employ any congestion management tools, practices and/or software on

network traffic. Application-Specific Behavior Provider does not make use of any application-specific network management

practices. Provider does not favor, modify, inhibit, rate control or block any specific protocols, protocol ports or fields, or any applications or classes of applications.

Device Attachment Rules In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards and be non-harmful to Provider’s network.

Security Provider offers its customers unrestricted access to all of the lawful content, services, and applications available on the Internet. Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing, and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted.

Performance Characteristics

Provider offers broadband Internet access service via Digital Subscriber Line. “DSL” and Fiber-to-the-home (“FTTH”) is a wireline transmission technology that transmits data faster over traditional copper telephone lines already installed to homes and businesses. FTTH utilizes fiber optic cable to deliver telephone, data and video services. Fiber optic cables have the capacity for an indefinite amount of data and will allow subscribers to receive better quality voice, data and video services in their homes. The advertised speed of Provider’s Internet service is the maximum speed achievable with the technology utilized by Provider. While the maximum advertised speed is attainable for end users, several factors may affect the actual speed of Provider’s Internet service offerings, including, but not limited to: the distance of the consumer’s home or office from Provider’s central office (i.e., the further away the customer is from the central office, the slower the broadband speed), the end user’s computer, modem or router, activity during peak usage periods, and other Internet traffic. The actual speeds achieved with Provider’s Internet service offering make Provider’s Internet service suitable for real-time applications, such as Voice over Internet Protocol (“VoIP”). Provider does not offer any specialized services.

Commercial Terms Pricing In order to meet the usage and budgetary needs of all of our customers, Provider offers a wide selection of broadband Internet access plan options, including promotional offerings, bundled service choices, and ala carte alternatives. To see Provider’s current promotions and pricing on broadband Internet access service, please visit our website www.kennebectelephone.com or call (605) 869-2220 to speak with a customer service representative. Usage-Based Fees Provider’s Internet service is priced on a flat-fee basis (plus taxes). Provider does not charge end users a usage-based fee for Internet service.

Privacy Policy The various network management tools and techniques utilized by Provider do not monitor, inspect or store the network activity and traffic of its Internet service users. Further, as part of its network management practices, Provider does not distribute information on network activity and/or traffic to any third party, or use network traffic information for any non-network management purpose. Provider affords full access to all lawful content, services and applications available on the Internet and does not

routinely monitor, inspect or store the network activity and traffic of its Internet service users. However, Provider reserves the right to monitor bandwidth, usage, transmissions and content for purposes of protecting the integrity of the network and Provider’s

Internet access service through reasonable network management practices. Provider may collect equipment information to identify the equipment customer is using on the network, including, but not limited to: equipment type, serial number, settings, configuration and software. Provider may also collect performance information to examine the operation of the equipment, services and applications the customer may use on the network, including, but not limited to: IP addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources customer is using in connections with uploading, downloading or streaming data to and from the Internet. Network traffic, activity, performance information, and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network

management purposes. Provider is required to comply with relevant laws, regulations and judicial orders. Information covered under this Privacy Policy, as well as other categories of information, may be disclosed to third parties if Provider determines, in its

sole discretion, that such a disclosure is necessary or required. Provider may also disclose this information if, in its sole discretion, such a disclosure is necessary or required to protect our interests or the interests of our customers. Provider may also

disclose this information in connection with the sale of our business. The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our

network and its users from spam, viruses, phishing, and other unwanted or harmful online content and activities. Provider’s network management practices are not intended, nor implemented, to block consumers from accessing the content and

applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic. End users with questions, concerns or complaints regarding Provider’s network management practices are

encouraged to contact Provider for issue resolution.

Contact Us

If you have any questions regarding Provider’s Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at:

Kennebec Telephone Co., Inc.

220 S. Main Street

PO Box 158

Kennebec, SD 57544

(605)869-2220

(605)869-2221

knbctel@kennebectelephone.com

www.kennebectelephone.com

Further, if you believe that Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC. http://esupport.fcc.gov/complaints.htm

Additional Disclaimers

The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service

providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of providers, rights holders, and end users. Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to

address the transfer of unlawful content or unlawful transfers of content. For additional information, please review Provider’s Acceptable Internet Use Policy/Subscriber Agreement at: www.kennebectelephone.com.

bottom of page